× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 0f3c7c430d0f6d8f0b9a482cdbac8911cd49b34dac9d4b9f5a657fdbb58a6d3a
File name: 37686e9d80b040b6ebcdc11f47213ea3
Detection ratio: 30 / 43
Analysis date: 2012-10-16 19:51:55 UTC ( 6 years, 7 months ago )
Antivirus Result Update
AntiVir Adware/Zwunzi3.A.1506 20121016
Avast Win32:Zwangi-W [PUP] 20121016
AVG OneStepSearcher.P 20121016
BitDefender Gen:Variant.Adware.Zwangi.2 20121016
CAT-QuickHeal Trojan.NSIS.Zwangi.B 20121016
Comodo UnclassifiedMalware 20121016
DrWeb Trojan.Searcher.243 20121016
eSafe Win32.ADSPYAdSpy 20121014
ESET-NOD32 a variant of Win32/Adware.OneStep.Y 20121016
F-Secure Gen:Variant.Adware.Zwangi.2 20121016
Fortinet Adware/OneStep 20121016
GData Gen:Variant.Adware.Zwangi.2 20121016
Ikarus Gen.Variant.AdWare.Zwangi 20121016
Jiangmin Adware/Zwangi.gxa 20121016
Kaspersky not-a-virus:AdWare.Win32.Zwangi.fip 20121016
Kingsoft VIRUS_UNKNOWN 20121008
McAfee Adware-OneStep.l 20121016
McAfee-GW-Edition Adware-OneStep.l 20121016
Microsoft BrowserModifier:Win32/Zwangi 20121016
eScan Gen:Variant.Adware.Zwangi.2 20121016
Norman W32/Zwangi.V 20121016
Panda Generic Malware 20121016
PCTools Adware.Zwunzi 20121016
Rising Trojan.Win32.Generic.128103CD 20121016
Sophos AV Zwangi 20121016
SUPERAntiSpyware Adware.Zwangi 20121016
Symantec Adware.Zwunzi!gen3 20121016
TrendMicro TROJ_GEN.RCBC8HB 20121016
TrendMicro-HouseCall TROJ_GEN.USHMF21 20121016
VIPRE Onestepsearch 20121016
Yandex 20121016
AhnLab-V3 20121016
Antiy-AVL 20121016
ByteHero 20121016
ClamAV 20121016
Commtouch 20121016
F-Prot 20121016
K7AntiVirus 20121016
nProtect 20121016
TheHacker 20121016
TotalDefense 20121016
VBA32 20121016
ViRobot 20121016
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Signing date 6:21 PM 3/16/2011
Packers identified
F-PROT NSIS
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2007-02-17 12:48:44
Entry Point 0x000032CE
Number of sections 5
PE sections
PE imports
RegDeleteKeyA
RegCloseKey
RegQueryValueExA
RegSetValueExA
RegEnumValueA
RegCreateKeyExA
RegOpenKeyExA
RegEnumKeyA
RegDeleteValueA
ImageList_Create
Ord(17)
ImageList_Destroy
ImageList_AddMasked
GetDeviceCaps
SetBkMode
CreateBrushIndirect
CreateFontIndirectA
SelectObject
SetBkColor
DeleteObject
SetTextColor
GetLastError
lstrlenA
lstrcmpiA
GlobalFree
WaitForSingleObject
GetExitCodeProcess
CopyFileA
GetTickCount
SetFileTime
GlobalUnlock
GetModuleFileNameA
LoadLibraryA
GetShortPathNameA
GetCurrentProcess
LoadLibraryExA
CompareFileTime
GetPrivateProfileStringA
WritePrivateProfileStringA
GetFileSize
lstrcatA
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
SetErrorMode
MultiByteToWideChar
GetCommandLineA
GlobalLock
SetFileAttributesA
SetFilePointer
GetTempPathA
CreateThread
GetFileAttributesA
GetModuleHandleA
lstrcmpA
ReadFile
WriteFile
FindFirstFileA
CloseHandle
GetTempFileNameA
lstrcpynA
FindNextFileA
RemoveDirectoryA
GetSystemDirectoryA
GetDiskFreeSpaceA
ExpandEnvironmentStringsA
GetFullPathNameA
FreeLibrary
MoveFileA
CreateProcessA
GetEnvironmentVariableA
GlobalAlloc
SearchPathA
FindClose
Sleep
CreateFileA
ExitProcess
GetProcAddress
SetCurrentDirectoryA
MulDiv
SHGetFileInfoA
SHGetSpecialFolderLocation
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteA
SHFileOperationA
EmptyClipboard
GetMessagePos
EndPaint
CharPrevA
EndDialog
DestroyWindow
PostQuitMessage
DefWindowProcA
SetWindowTextA
SetClassLongA
LoadBitmapA
SetWindowPos
GetSystemMetrics
IsWindow
AppendMenuA
GetWindowRect
DispatchMessageA
RegisterClassA
SetDlgItemTextA
LoadImageA
GetDlgItemTextA
DialogBoxParamA
MessageBoxA
PeekMessageA
SetWindowLongA
IsWindowEnabled
GetSysColor
CheckDlgButton
GetDC
FindWindowExA
SystemParametersInfoA
BeginPaint
CreatePopupMenu
wsprintfA
ShowWindow
SetClipboardData
IsWindowVisible
GetClassInfoA
SetForegroundWindow
GetClientRect
CreateWindowExA
GetDlgItem
CreateDialogParamA
DrawTextA
ScreenToClient
InvalidateRect
GetWindowLongA
SendMessageTimeoutA
SetTimer
LoadCursorA
TrackPopupMenu
SendMessageA
FillRect
CharNextA
CallWindowProcA
EnableWindow
CloseClipboard
SetCursor
ExitWindowsEx
OpenClipboard
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
OleUninitialize
CoCreateInstance
OleInitialize
Number of PE resources by type
RT_ICON 7
RT_DIALOG 5
RT_MANIFEST 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 14
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2007:02:17 12:48:44+00:00

FileType
Win32 EXE

PEType
PE32

CodeSize
23552

LinkerVersion
6.0

EntryPoint
0x32ce

InitializedDataSize
122368

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
1024

File identification
MD5 37686e9d80b040b6ebcdc11f47213ea3
SHA1 47b7d83bf96c90261b5f5e893e82dd9303d50fa0
SHA256 0f3c7c430d0f6d8f0b9a482cdbac8911cd49b34dac9d4b9f5a657fdbb58a6d3a
ssdeep
12288:dvH4ZuBDRSZzA3c35XdvMeTNpgSWb1QqHPe2xuaQYeFN/WvK760H:dqZdvMANuSWh7HG/aMNOC762

File size 708.1 KB ( 725064 bytes )
File type Win32 EXE
Magic literal
MS-DOS executable PE for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (65.2%)
Win32 Executable Generic (14.7%)
Win32 Dynamic Link Library (generic) (13.1%)
Generic Win/DOS Executable (3.4%)
DOS Executable Generic (3.4%)
Tags
nsis peexe signed

VirusTotal metadata
First submission 2011-03-16 20:51:53 UTC ( 8 years, 2 months ago )
Last submission 2012-10-16 19:51:55 UTC ( 6 years, 7 months ago )
File names 481390904819D52910F30B67A3E36E00D9E80BFB.exe
H1GrE.vsd
Z638l24rae.tif
[3110]questbrowse-setup.exe.#
37686e9d80b040b6ebcdc11f47213ea3
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!