GamesRockit Ads
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Popularity Rank: | 5,137 |
| Threat Level: | 20 % (Normal) |
| Infected Computers: | 17,599 |
| First Seen: | September 15, 2015 |
| Last Seen: | January 15, 2026 |
| OS(es) Affected: | Windows |
The GamesRockit software is developed by EpicPlay LLC as a tool to help PC users join the gaming community at GamesRockit.com that is dedicated to Adobe Flash Games in the Arcade genre. The premium games at GamesRockit.com are offered for free to users that have installed the GamesRockit software on their computers, and you may want to know that it is adware. The GamesRockit adware is used by EpicPlay LLC to earn affiliate revenue from showing ads in the Web browsers of infected users. Security investigators note that the GamesRockit adware might display in-image ads, banners, pop-up and pop-under windows loaded with marketing content. Moreover, your computer resource may be hijacked by the GamesRockit adware to aid cloud computing tasks carried out by EpicPlay LLC. The GamesRockit adware is very similar to Arcade Twist and Arcade Yum and may use tracking cookies, Web data, geo-IP localization and read your software configuration to load customized marketing offers in your Interment client. Security investigators underline that the ads by GamesRockit might lead users to visit compromised websites and urge them to install fake software updates from sites like Instantpcupdate.info and JavaPlayer.info. You may want to seek the help of a credible anti-spyware application to remove the GamesRockit adware from your computer securely.
Table of Contents
Analysis Report
General information
| Family Name: | Adware.Dealply.FF |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
dae6f6b89dff7ab49d6e3ad76c153c89
SHA1:
b8e36eaddd1403a63e5a5380d755d32c6ac27b6b
File Size:
2.06 MB, 2056704 bytes
|
|
MD5:
c36139bcd5e89397869747d5adc81b76
SHA1:
9634d0ad2ac3ae49bf2c86854131d6c5b384a58a
File Size:
2.29 MB, 2293760 bytes
|
|
MD5:
154d543ee98767a60d532afe8c87376a
SHA1:
c1f779ab0dbf9cb1324f1885632f61a7df052722
File Size:
2.23 MB, 2233344 bytes
|
|
MD5:
ecbcc66a95e2a8bd3fc411bcbad8d057
SHA1:
32742b31d28163e119c3b63808b99422397d710f
File Size:
2.03 MB, 2033152 bytes
|
|
MD5:
1eeefd03d62499129f18a071ffa44ef6
SHA1:
f5651c563129a7ef44f4d4cbb5c2cb5a40bed013
SHA256:
4922E83B57431CAF33394D7FE83C0DD8C2249E2F20BB0A08D3373D977BE97CBC
File Size:
2.97 MB, 2968064 bytes
|
Show More
|
MD5:
13eee510293c198045cba739a1ba0320
SHA1:
021430421db633f207af9d455be8a3b99e2b5d4c
SHA256:
EB76F928BE0BAE17E2247AC12CB1C58ED434194EC40C2B42A7F24DC60D1A8038
File Size:
2.05 MB, 2051072 bytes
|
|
MD5:
5e2eb991d1f8432a621e7dd4f5420edb
SHA1:
5ea2ac247352b4d626fe8422817f677e420159ee
SHA256:
DCD04C229F2811EF3631E683D1F35D320398405423C85F83E9FB857DD5BE6624
File Size:
2.38 MB, 2379264 bytes
|
|
MD5:
52e8dc67c2ee83b4231518d91df2cbe2
SHA1:
a4a84590305b4ac6a5b817251bf41660156a4a8e
SHA256:
66EC2F8A7BC3FA3BDCB456623788228186E9E9DAD8879B7836A3D1FDDFE18366
File Size:
2.09 MB, 2092544 bytes
|
|
MD5:
a4a6cb3db384f08a5a0e8b2ab75ada86
SHA1:
1adf96b56434178e07f6c75d951c7f24bdba5e80
SHA256:
0C7DF24AC159FA39B1B7D98231A7445149063852F9C04A5AF87A05F6D41AE20E
File Size:
2.03 MB, 2031616 bytes
|
|
MD5:
83f9c1479063b57dadf327031d968049
SHA1:
6fbbafcc5a0c16b6a2dfa55505e994d03578dff7
SHA256:
62F7CAE980E1137E67C27091D2038CA8D1E2A9B3554403C5C3A86850433C3480
File Size:
638.98 KB, 638976 bytes
|
|
MD5:
02eda1490751ab8b03b75d035e6b83a3
SHA1:
ff5ff6fe3d8261956b9056b980caeaf35550d23b
SHA256:
BB5E71303DDC3FB7FDFB42E54B3BC83BFA1851E9C4B4A7B32873252DDD9F5F71
File Size:
2.24 MB, 2241536 bytes
|
|
MD5:
0db0fa4372f6767882a0512fa7c25b44
SHA1:
eb2a709477b004325280adf6e7ae1d582bd0e81e
SHA256:
83F50F85CE72AD96C447013400A55CD1435FC5526920C31C06714A2450001D67
File Size:
2.08 MB, 2081792 bytes
|
|
MD5:
63dcb0b1b8806e7a076b8de2fe624c25
SHA1:
602d2185acf7bb6359badd9fb8b07f3afc0b5a99
SHA256:
42372E8F3DB229E11E8D8770D41AC30B738C062A225A7ABDC3E428A4351EF7A0
File Size:
2.04 MB, 2036736 bytes
|
|
MD5:
2db290f718a36bdcc1fec11df9884155
SHA1:
b346e081b07d54cb95ead73db8cb1131d69020ef
SHA256:
43A7EB6EE5B6693853AE2D453878CFCA58043D10190C2747A4AB1D145978B70F
File Size:
2.08 MB, 2080768 bytes
|
|
MD5:
e491284e937940c9c8db2940f08142eb
SHA1:
953897cc1f5b1f5c6c8c9025e3f052f626405ee8
SHA256:
D990789AECF193611EB04BBFA30DFF962542678CFB5A19B73F6448E1F9359AAD
File Size:
707.07 KB, 707072 bytes
|
|
MD5:
9185cff2ff6365515e6bdec23d16b559
SHA1:
34b8281869ebf2786e1ac2deae85b7f744a4a837
SHA256:
CFA0B3D6E62AC18D645EDBF334B8BB63A643A88B57ADD3C5BF040148CE38FE6E
File Size:
2.05 MB, 2046464 bytes
|
|
MD5:
1686106c883158c39f47dc98ae337244
SHA1:
2a7a59c02aa6bd360b7d42b1de5923a99bc43a39
SHA256:
64D1AB43A3578DA00F1B02B7ED63A4B16F15A1E50D05A2A4B3775751B8F33066
File Size:
2.09 MB, 2088960 bytes
|
|
MD5:
923544a4c1aa826a5ef40a80f6bf918e
SHA1:
7c7af10aef918d5552da7081645823b64e76c791
SHA256:
7ABA3ED352C70DB8EC9EE5F9D712982778D326686036E0A9A3CFF3B344F4EE31
File Size:
2.70 MB, 2699776 bytes
|
|
MD5:
d5ec7c1e44a504d2de05deccacf7e058
SHA1:
a11baed350dd40bbb26d5aa01bdb9328309e2096
SHA256:
C5BCB852CE83649C8774CF084C8667DA25EF9B377AC7DCCC85D0100295522112
File Size:
2.08 MB, 2079232 bytes
|
|
MD5:
aa8134e96d4ec36a62f7ece706205b3c
SHA1:
e77a5060404ffa3b52ebce2ee830d9a0b78a7ecb
SHA256:
7999D912EB3814A85C5C3255A787D7F23F87D2FDCF704D5416B46A897DE5FA39
File Size:
2.26 MB, 2259968 bytes
|
|
MD5:
cf4f908685fca29bb869abe10d13f83c
SHA1:
cc57cc25e33f70860dfdaa378f28b12303685869
SHA256:
1EA2EE9D3786137B34BE9E0D914856105ECB9281F479247BEDC3462990121F7C
File Size:
2.30 MB, 2295296 bytes
|
|
MD5:
fd65c80afb7968620c6eff3e9afd2a2f
SHA1:
7af1c00a60ae51282ee6b4f68d8bdfc5a61bc252
SHA256:
93E21E9A54D5A3A85C25090D814770485F0E2159DFA7318D897B94DB44C1F84C
File Size:
2.23 MB, 2227712 bytes
|
|
MD5:
5a206e5806d9ec0b454e51f8d4d78b45
SHA1:
fd43cb6e9cedbdbcc8473b41ffde80d6b31ed45e
SHA256:
01EAC822AC0E7CD143B7125C4C27D1C794184C29D8DA2633045354B3EA736AC0
File Size:
2.08 MB, 2084352 bytes
|
|
MD5:
483fb736dfad309f7ec9b5c844f93495
SHA1:
99ee1b6565887736c40ea7eb32161bab98204170
SHA256:
837595BFD33A9E7770B6561F4A4C76D7B9295F50C8441E68473D9D8B1BEB573C
File Size:
655.87 KB, 655872 bytes
|
|
MD5:
61220178edf4583f7ab4a318ce8933cf
SHA1:
e87cb28650577af3ff4de82d486009e373ea3ed9
SHA256:
6BB6FD9E51247DC0440349E630BBC08CA783AD532A3C8A5BFC9FEDBD73998BFC
File Size:
2.05 MB, 2054144 bytes
|
|
MD5:
41115ea3cc75410912f5ed0e268dab1e
SHA1:
2cf4caa95da1181edfd9eea2a73041a487cd218f
SHA256:
52C4C55668C770F42100D6CEBDF9A96A94D1313DD4E4997C2A5171336B78F00C
File Size:
649.22 KB, 649216 bytes
|
|
MD5:
3bfa0322296e050268e316cf270499f8
SHA1:
98a1f15f8f2465b0fd1eebb10226c19092f64a38
SHA256:
4B5B52E3EC2B35BA8FE1B5034FEE958934DCB3C26B2C647D539742BD7BAAA1BB
File Size:
2.08 MB, 2082304 bytes
|
|
MD5:
da6ff0c96d15b26564e7d2105b4a6531
SHA1:
5f15cb3d0a8380e4a4060d644b637c3a36d5220d
SHA256:
BB6CFB5ABB019CF5632D67E87F23E47155FE22A748462E8539C2525EBC7D9D1C
File Size:
691.71 KB, 691712 bytes
|
|
MD5:
1f0a8f29f818bb5dbd7fe7636c81b5d9
SHA1:
444f65a17d2b4eb21c2c0ce262647266ca2477bb
SHA256:
9AFAF8BD9DB712A21F980DD4368D9A406168FEB1B0C29F67A41773AF73691D4B
File Size:
2.05 MB, 2049536 bytes
|
|
MD5:
bda23e4d87dff82f8d57d23f469ffa2e
SHA1:
1614e2dc9fd3a0427492471ff024306c0a87f1c7
SHA256:
082B39E21145A093FD6D2F85355E47542DFB7605B2450B70D104D3339DF2B787
File Size:
2.07 MB, 2072576 bytes
|
|
MD5:
83ee6cb3519b0c980b292b6facc98378
SHA1:
aadc25a47c5ab11904af5369d8fabfa1bfbf55e4
SHA256:
76CB871FDFEACD8DCC977BF1E6DBE988994EF7125E0355A19AA2AE455E7298EC
File Size:
2.22 MB, 2215936 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have relocations information
- File doesn't have security information
- File has been packed
- File has exports table
- File has TLS information
- File is 32-bit executable
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
Show More
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Author | Dr. J. Rathlev |
| Company Name |
Show More
|
| File Description |
|
| File Version |
Show More
|
| Internal Name |
Show More
|
| Legal Copyright |
|
| Legal Trademarks |
|
| Original Filename |
Show More
|
| Product Name |
Show More
|
| Product Version |
Show More
|
File Traits
- 2+ executable sections
- HighEntropy
- No Version Info
- packed
- upx
- UPX!
- VirtualQueryEx
- x86
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 5,448 |
|---|---|
| Potentially Malicious Blocks: | 3 |
| Whitelisted Blocks: | 5,442 |
| Unknown Blocks: | 3 |
Visual Map
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- Agent.DSS
- Agent.PIG
- Babar.AI
- Banker.RG
- Banload.XG
Show More
- Danabot.DI
- DealPly.AS
- Dealply.ACC
- Delf.OD
- Injector.BA
- Ropalidia.D