× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 01e70a17d75c8d92b4ba590f9bce72d7f23bf379190f613fc84c04197dd134b1
File name: zuma-deluxe-3455-jetelecharge.exe
Detection ratio: 0 / 57
Analysis date: 2017-01-02 03:16:54 UTC ( 1 year, 7 months ago ) View latest
Antivirus Result Update
Ad-Aware 20170102
AegisLab 20161231
AhnLab-V3 20170101
Alibaba 20161223
ALYac 20170102
Antiy-AVL 20170102
Arcabit 20170102
Avast 20170102
AVG 20170101
Avira (no cloud) 20170101
AVware 20170102
Baidu 20161207
BitDefender 20170102
Bkav 20161229
CAT-QuickHeal 20161231
ClamAV 20170102
CMC 20170101
Comodo 20170102
CrowdStrike Falcon (ML) 20161024
Cyren 20170102
DrWeb 20170102
Emsisoft 20170102
ESET-NOD32 20170101
F-Prot 20170102
F-Secure 20170102
Fortinet 20170102
GData 20170102
Ikarus 20170101
Sophos ML 20161216
Jiangmin 20170102
K7AntiVirus 20170101
K7GW 20170102
Kaspersky 20170102
Kingsoft 20170102
Malwarebytes 20170102
McAfee 20170102
McAfee-GW-Edition 20170102
Microsoft 20170102
eScan 20170102
NANO-Antivirus 20170102
nProtect 20170102
Panda 20170101
Qihoo-360 20170102
Rising 20170102
Sophos AV 20170102
SUPERAntiSpyware 20170101
Symantec 20170102
Tencent 20170102
TheHacker 20161229
TotalDefense 20170101
TrendMicro 20170102
TrendMicro-HouseCall 20170102
Trustlook 20170102
VBA32 20161229
VIPRE 20170102
ViRobot 20170101
WhiteArmor 20161221
Yandex 20161230
Zillya 20161231
Zoner 20161231
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Signature verification Signed file, verified signature
Signing date 1:20 AM 2/20/2008
Signers
[+] PopCap Games
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer VeriSign Class 3 Code Signing 2004 CA
Valid from 1:00 AM 9/1/2006
Valid to 12:59 AM 9/22/2009
Valid usage Code Signing
Algorithm sha1RSA
Thumbprint B1F4990C76941CFCE42088B7C4A415BD750A2063
Serial number 3C 61 DF 38 D5 BB 38 36 A8 B4 4B 98 5C 50 44 79
[+] VeriSign Class 3 Code Signing 2004 CA
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer Class 3 Public Primary Certification Authority
Valid from 1:00 AM 7/16/2004
Valid to 12:59 AM 7/16/2014
Valid usage Client Auth, Code Signing
Algorithm sha1RSA
Thumbprint 197A4AEBDB25F0170079BB8C73CB2D655E0018A4
Serial number 41 91 A1 5A 39 78 DF CF 49 65 66 38 1D 4C 75 C2
[+] VeriSign Class 3 Public Primary CA
Status Valid
Issuer Class 3 Public Primary Certification Authority
Valid from 1:00 AM 1/29/1996
Valid to 12:59 AM 8/2/2028
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm md2RSA
Thumbprint 742C3192E607E424EB4549542BE1BBC53E6174E2
Serial number 70 BA E4 1D 10 D9 29 34 B6 38 CA 7B 03 CC BA BF
Counter signers
[+] VeriSign Time Stamping Services Signer - G2
Status This certificate or one of the certificates in the certificate chain is not time valid., The revocation status of the certificate or one of the certificates in the certificate chain is unknown., Error 65536 (0x10000), The revocation status of the certificate or one of the certificates in the certificate chain is either offline or stale.
Issuer VeriSign Time Stamping Services CA
Valid from 1:00 AM 6/15/2007
Valid to 12:59 AM 6/15/2012
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint ADA8AAA643FF7DC38DD40FA4C97AD559FF4846DE
Serial number 38 25 D7 FA F8 61 AF 9E F4 90 E7 26 B5 D6 5A D5
[+] VeriSign Time Stamping Services CA
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer Thawte Timestamping CA
Valid from 1:00 AM 12/4/2003
Valid to 12:59 AM 12/4/2013
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint F46AC0C6EFBB8C6A14F55F09E2D37DF4C0DE012D
Serial number 47 BF 19 95 DF 8D 52 46 43 F7 DB 6D 48 0D 31 A4
[+] Thawte Timestamping CA
Status Valid
Issuer Thawte Timestamping CA
Valid from 1:00 AM 1/1/1997
Valid to 12:59 AM 1/1/2021
Valid usage Timestamp Signing
Algorithm md5RSA
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
Packers identified
F-PROT CAB, appended, UTF-8
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2007-12-12 20:43:35
Entry Point 0x0002D9BE
Number of sections 4
PE sections
Overlays
MD5 b439b1aa217679f93960737941f78f35
File type data
Offset 368640
Size 5992736
Entropy 8.00
PE imports
RegDeleteKeyA
RegOpenKeyA
RegCloseKey
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegCreateKeyA
GetDeviceCaps
GetObjectA
BitBlt
DeleteDC
SetBkMode
CreateFontA
GetStockObject
GetTextMetricsA
CreateSolidBrush
DeleteObject
SelectObject
SetBkColor
CreateCompatibleDC
GetTextExtentPoint32W
SetTextColor
GetStdHandle
GetConsoleOutputCP
GetFileAttributesA
WaitForSingleObject
FindNextFileA
HeapDestroy
GetExitCodeProcess
FreeEnvironmentStringsA
DeleteCriticalSection
GetDiskFreeSpaceA
GetConsoleMode
GetLocaleInfoA
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
GetCPInfo
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
SetFileAttributesA
GetOEMCP
LocalFree
ResumeThread
InitializeCriticalSection
FindClose
TlsGetValue
SetLastError
InterlockedDecrement
CopyFileA
ExitProcess
GetVersionExA
GetModuleFileNameA
EnumSystemLocalesA
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
SetFilePointer
CreateThread
SetUnhandledExceptionFilter
GetCurrentProcess
MulDiv
GetSystemDirectoryA
SetEnvironmentVariableA
TerminateProcess
WriteConsoleA
LocalFileTimeToFileTime
SetEndOfFile
GetCurrentThreadId
LeaveCriticalSection
WriteConsoleW
HeapFree
EnterCriticalSection
SetHandleCount
SetEvent
QueryPerformanceCounter
GetTickCount
TlsAlloc
FlushFileBuffers
LoadLibraryA
RtlUnwind
ExitThread
FreeLibrary
GetStartupInfoA
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
GetUserDefaultLCID
GetProcessHeap
CompareStringW
ExpandEnvironmentStringsW
FindNextFileW
CompareStringA
FindFirstFileW
IsValidLocale
GetProcAddress
CreateEventA
IsDebuggerPresent
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
InterlockedIncrement
GetLastError
DosDateTimeToFileTime
LCMapStringW
lstrlenA
GetConsoleCP
LCMapStringA
GetEnvironmentStringsW
RemoveDirectoryA
GetEnvironmentStrings
GetCurrentProcessId
SetFileTime
WideCharToMultiByte
HeapSize
GetCommandLineA
InterlockedCompareExchange
RaiseException
TlsFree
GetModuleHandleA
ReadFile
FindFirstFileA
CloseHandle
GetACP
IsValidCodePage
HeapCreate
VirtualFree
Sleep
VirtualAlloc
ResetEvent
SysFreeString
VariantClear
VariantInit
SysAllocString
ShellExecuteExA
SHBrowseForFolderW
SHGetPathFromIDListW
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteA
MapWindowPoints
ReleaseDC
EndDialog
BeginPaint
SetWindowTextW
KillTimer
EnumChildWindows
SetWindowPos
SendDlgItemMessageA
BeginDeferWindowPos
MessageBoxW
SendMessageW
EndPaint
LoadImageA
DialogBoxParamW
AdjustWindowRectEx
DialogBoxParamA
GetSysColor
DeferWindowPos
GetDC
EndDeferWindowPos
DrawTextA
SetWindowTextA
DestroyIcon
GetWindowLongA
DrawIconEx
GetSystemMetrics
SendMessageA
LoadStringW
GetClientRect
CreateWindowExA
GetDlgItem
DrawFocusRect
SetTimer
FillRect
IsDlgButtonChecked
GetSysColorBrush
GetWindowTextW
GetDesktopWindow
IsWindowUnicode
EnableWindow
GetWindowTextA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
CoUninitialize
CoInitialize
CoCreateGuid
CoCreateInstance
CoInitializeSecurity
StringFromGUID2
Number of PE resources by type
RT_ICON 9
RT_DIALOG 8
RT_GROUP_ICON 1
RT_MANIFEST 1
Number of PE resources by language
ENGLISH US 19
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2007:12:12 21:43:35+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
270336

LinkerVersion
8.0

ImageFileCharacteristics
No relocs, Executable, 32-bit

EntryPoint
0x2d9be

InitializedDataSize
94208

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

Execution parents
Compressed bundles
File identification
MD5 20ab045db3d9b8196cdfb413062445f4
SHA1 98d2536c9ab2373c1a702a026993f51710b172f7
SHA256 01e70a17d75c8d92b4ba590f9bce72d7f23bf379190f613fc84c04197dd134b1
ssdeep
196608:HQZ3yhtoBC9O0BnjNh5RKbJtiVIH0cyUC+Urk:HQZwtoBx015RKttHHHuk

authentihash e2056745895cd920965b77e64c3b74e0ec6bed0b12b8cb17426cba2cb70d334f
imphash 8d9abeb48c63383c5e688c3edf84514e
File size 6.1 MB ( 6361376 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID InstallShield setup (36.1%)
Win32 Executable MS Visual C++ (generic) (26.2%)
Win64 Executable (generic) (23.2%)
Win32 Dynamic Link Library (generic) (5.5%)
Win32 Executable (generic) (3.7%)
Tags
peexe software-collection signed overlay

VirusTotal metadata
First submission 2008-07-05 16:39:37 UTC ( 10 years, 1 month ago )
Last submission 2018-08-06 04:30:19 UTC ( 1 week, 3 days ago )
File names 072ff17a909ed0a0cfab.exe
zuma.exe
20ab045db3d9b8196cdfb413062445f4.98d2536c9ab2373c1a702a026993f51710b172f7
23666238
download-zumasetup-en.exe&u={9744ABB3-7371-4CA0-8BEF-5F7CC6B97CC0}
file-3031152_exe
download-zumasetup-en.exe
zuma-deluxe-1.0.exe
zuma-deluxe-3455-jetelecharge.exe
20AB045DB3D9B8196CDFB413062445F4
ZumaSetup-en.exe_uid_b8f1417e-15b
ZumaSetupen.exe
ZumaSetup-en.exe
zuma-deluxe-3455-jetelecharge.exe
ZumaSetup.exe
6f71e6586f780eaf682c.exe
9207101
file-1343619_exe
20ab045db3d9b8196cdfb413062445f4_ZumaSetup-en.exe
file
1.exe
ZumaSetup-en.exe
141499617190767-ZumaSetup_en.exe
zuma-deluxe.exe
octet-stream
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!