× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 01e70a17d75c8d92b4ba590f9bce72d7f23bf379190f613fc84c04197dd134b1
File name: zuma-deluxe-3455.exe
Detection ratio: 0 / 69
Analysis date: 2018-09-30 02:45:40 UTC ( 6 months, 3 weeks ago ) View latest
Antivirus Result Update
Ad-Aware 20180930
AegisLab 20180930
AhnLab-V3 20180929
Alibaba 20180921
ALYac 20180930
Antiy-AVL 20180930
Arcabit 20180930
Avast 20180930
Avast-Mobile 20180928
AVG 20180930
Avira (no cloud) 20180929
AVware 20180925
Babable 20180918
Baidu 20180929
BitDefender 20180930
Bkav 20180928
CAT-QuickHeal 20180929
ClamAV 20180930
CMC 20180929
Comodo 20180930
CrowdStrike Falcon (ML) 20180723
Cybereason 20180225
Cylance 20180930
Cyren 20180930
DrWeb 20180930
eGambit 20180930
Emsisoft 20180930
Endgame 20180730
ESET-NOD32 20180929
F-Prot 20180930
F-Secure 20180929
Fortinet 20180930
GData 20180930
Ikarus 20180929
Sophos ML 20180717
Jiangmin 20180930
K7AntiVirus 20180929
K7GW 20180929
Kaspersky 20180930
Kingsoft 20180930
Malwarebytes 20180930
MAX 20180930
McAfee 20180930
McAfee-GW-Edition 20180930
Microsoft 20180930
eScan 20180930
NANO-Antivirus 20180930
Palo Alto Networks (Known Signatures) 20180930
Panda 20180929
Qihoo-360 20180930
Rising 20180929
SentinelOne (Static ML) 20180926
Sophos AV 20180930
SUPERAntiSpyware 20180907
Symantec 20180929
Symantec Mobile Insight 20180924
TACHYON 20180930
Tencent 20180930
TheHacker 20180927
TotalDefense 20180929
TrendMicro 20180929
TrendMicro-HouseCall 20180930
Trustlook 20180930
VBA32 20180928
VIPRE 20180930
ViRobot 20180929
Webroot 20180930
Yandex 20180927
Zillya 20180928
ZoneAlarm by Check Point 20180925
Zoner 20180927
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Signature verification Signed file, verified signature
Signing date 2:20 AM 2/20/2008
Signers
[+] PopCap Games
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer VeriSign Class 3 Code Signing 2004 CA
Valid from 12:00 AM 09/01/2006
Valid to 11:59 PM 09/21/2009
Valid usage Code Signing
Algorithm sha1RSA
Thumbprint B1F4990C76941CFCE42088B7C4A415BD750A2063
Serial number 3C 61 DF 38 D5 BB 38 36 A8 B4 4B 98 5C 50 44 79
[+] VeriSign Class 3 Code Signing 2004 CA
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer Class 3 Public Primary Certification Authority
Valid from 12:00 AM 07/16/2004
Valid to 11:59 PM 07/15/2014
Valid usage Client Auth, Code Signing
Algorithm sha1RSA
Thumbprint 197A4AEBDB25F0170079BB8C73CB2D655E0018A4
Serial number 41 91 A1 5A 39 78 DF CF 49 65 66 38 1D 4C 75 C2
[+] VeriSign Class 3 Public Primary CA
Status Valid
Issuer Class 3 Public Primary Certification Authority
Valid from 01:00 AM 01/29/1996
Valid to 11:59 PM 08/01/2028
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm md2RSA
Thumbprint 742C3192E607E424EB4549542BE1BBC53E6174E2
Serial number 70 BA E4 1D 10 D9 29 34 B6 38 CA 7B 03 CC BA BF
Counter signers
[+] VeriSign Time Stamping Services Signer - G2
Status This certificate or one of the certificates in the certificate chain is not time valid., The revocation status of the certificate or one of the certificates in the certificate chain is unknown., Error 65536 (0x10000), The revocation status of the certificate or one of the certificates in the certificate chain is either offline or stale.
Issuer VeriSign Time Stamping Services CA
Valid from 12:00 AM 06/15/2007
Valid to 11:59 PM 06/14/2012
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint ADA8AAA643FF7DC38DD40FA4C97AD559FF4846DE
Serial number 38 25 D7 FA F8 61 AF 9E F4 90 E7 26 B5 D6 5A D5
[+] VeriSign Time Stamping Services CA
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer Thawte Timestamping CA
Valid from 01:00 AM 12/04/2003
Valid to 12:59 AM 12/04/2013
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint F46AC0C6EFBB8C6A14F55F09E2D37DF4C0DE012D
Serial number 47 BF 19 95 DF 8D 52 46 43 F7 DB 6D 48 0D 31 A4
[+] Thawte Timestamping CA
Status Valid
Issuer Thawte Timestamping CA
Valid from 01:00 AM 01/01/1997
Valid to 12:59 AM 01/01/2021
Valid usage Timestamp Signing
Algorithm md5RSA
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
Packers identified
F-PROT CAB, appended, UTF-8
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2007-12-12 20:43:35
Entry Point 0x0002D9BE
Number of sections 4
PE sections
Overlays
MD5 b439b1aa217679f93960737941f78f35
File type data
Offset 368640
Size 5992736
Entropy 8.00
PE imports
RegDeleteKeyA
RegOpenKeyA
RegCloseKey
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegCreateKeyA
GetDeviceCaps
GetObjectA
BitBlt
DeleteDC
SetBkMode
CreateFontA
GetStockObject
GetTextMetricsA
CreateSolidBrush
DeleteObject
SelectObject
SetBkColor
CreateCompatibleDC
GetTextExtentPoint32W
SetTextColor
GetStdHandle
GetConsoleOutputCP
GetFileAttributesA
WaitForSingleObject
FindNextFileA
HeapDestroy
GetExitCodeProcess
FreeEnvironmentStringsA
DeleteCriticalSection
GetDiskFreeSpaceA
GetConsoleMode
GetLocaleInfoA
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
GetCPInfo
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
SetFileAttributesA
GetOEMCP
LocalFree
ResumeThread
InitializeCriticalSection
FindClose
TlsGetValue
SetLastError
InterlockedDecrement
CopyFileA
ExitProcess
GetVersionExA
GetModuleFileNameA
EnumSystemLocalesA
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
SetFilePointer
CreateThread
SetUnhandledExceptionFilter
GetCurrentProcess
MulDiv
GetSystemDirectoryA
SetEnvironmentVariableA
TerminateProcess
WriteConsoleA
LocalFileTimeToFileTime
SetEndOfFile
GetCurrentThreadId
LeaveCriticalSection
WriteConsoleW
HeapFree
EnterCriticalSection
SetHandleCount
SetEvent
QueryPerformanceCounter
GetTickCount
TlsAlloc
FlushFileBuffers
LoadLibraryA
RtlUnwind
ExitThread
FreeLibrary
GetStartupInfoA
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
GetUserDefaultLCID
GetProcessHeap
CompareStringW
ExpandEnvironmentStringsW
FindNextFileW
CompareStringA
FindFirstFileW
IsValidLocale
GetProcAddress
CreateEventA
IsDebuggerPresent
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
InterlockedIncrement
GetLastError
DosDateTimeToFileTime
LCMapStringW
lstrlenA
GetConsoleCP
LCMapStringA
GetEnvironmentStringsW
RemoveDirectoryA
GetEnvironmentStrings
GetCurrentProcessId
SetFileTime
WideCharToMultiByte
HeapSize
GetCommandLineA
InterlockedCompareExchange
RaiseException
TlsFree
GetModuleHandleA
ReadFile
FindFirstFileA
CloseHandle
GetACP
IsValidCodePage
HeapCreate
VirtualFree
Sleep
VirtualAlloc
ResetEvent
SysFreeString
VariantClear
VariantInit
SysAllocString
ShellExecuteExA
SHBrowseForFolderW
SHGetPathFromIDListW
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteA
MapWindowPoints
ReleaseDC
EndDialog
BeginPaint
SetWindowTextW
KillTimer
EnumChildWindows
SetWindowPos
SendDlgItemMessageA
BeginDeferWindowPos
MessageBoxW
SendMessageW
EndPaint
LoadImageA
DialogBoxParamW
AdjustWindowRectEx
DialogBoxParamA
GetSysColor
DeferWindowPos
GetDC
EndDeferWindowPos
DrawTextA
SetWindowTextA
DestroyIcon
GetWindowLongA
DrawIconEx
GetSystemMetrics
SendMessageA
LoadStringW
GetClientRect
CreateWindowExA
GetDlgItem
DrawFocusRect
SetTimer
FillRect
IsDlgButtonChecked
GetSysColorBrush
GetWindowTextW
GetDesktopWindow
IsWindowUnicode
EnableWindow
GetWindowTextA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
CoUninitialize
CoInitialize
CoCreateGuid
CoCreateInstance
CoInitializeSecurity
StringFromGUID2
Number of PE resources by type
RT_ICON 9
RT_DIALOG 8
RT_GROUP_ICON 1
RT_MANIFEST 1
Number of PE resources by language
ENGLISH US 19
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2007:12:12 21:43:35+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
270336

LinkerVersion
8.0

ImageFileCharacteristics
No relocs, Executable, 32-bit

EntryPoint
0x2d9be

InitializedDataSize
94208

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

Execution parents
Compressed bundles
File identification
MD5 20ab045db3d9b8196cdfb413062445f4
SHA1 98d2536c9ab2373c1a702a026993f51710b172f7
SHA256 01e70a17d75c8d92b4ba590f9bce72d7f23bf379190f613fc84c04197dd134b1
ssdeep
196608:HQZ3yhtoBC9O0BnjNh5RKbJtiVIH0cyUC+Urk:HQZwtoBx015RKttHHHuk

authentihash e2056745895cd920965b77e64c3b74e0ec6bed0b12b8cb17426cba2cb70d334f
imphash 8d9abeb48c63383c5e688c3edf84514e
File size 6.1 MB ( 6361376 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID InstallShield setup (36.1%)
Win32 Executable MS Visual C++ (generic) (26.2%)
Win64 Executable (generic) (23.2%)
Win32 Dynamic Link Library (generic) (5.5%)
Win32 Executable (generic) (3.7%)
Tags
peexe overlay signed software-collection

VirusTotal metadata
First submission 2008-07-05 16:39:37 UTC ( 10 years, 9 months ago )
Last submission 2019-03-03 10:36:10 UTC ( 1 month, 2 weeks ago )
File names zuma-deluxe-3455.exe
072ff17a909ed0a0cfab.exe
zuma.exe
20ab045db3d9b8196cdfb413062445f4.98d2536c9ab2373c1a702a026993f51710b172f7
23666238
download-zumasetup-en.exe&u={9744ABB3-7371-4CA0-8BEF-5F7CC6B97CC0}
file-3031152_exe
download-zumasetup-en.exe
zuma-deluxe-1.0.exe
zuma-deluxe-3455-jetelecharge.exe
Zuma_Deluxe_Setup.exe
20AB045DB3D9B8196CDFB413062445F4
ZumaSetup-en.exe_uid_b8f1417e-15b
ZumaSetupen.exe
ZumaSetup-en.exe
zuma-deluxe-3455-jetelecharge.exe
ZumaSetup.exe
6f71e6586f780eaf682c.exe
9207101
file-1343619_exe
20ab045db3d9b8196cdfb413062445f4_ZumaSetup-en.exe
file
1.exe
ZumaSetup-en.exe
141499617190767-ZumaSetup_en.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!