avgantivirusfreeedition_telechargement_01net.exe

GetRightToGo

Headlight Software, Inc.

This is a setup program which is used to install the application. The file has been seen being downloaded from web.avanquest.com.
Publisher:
Headlight Software, Inc.

Product:
GetRightToGo

Version:
1.0.0

MD5:
ce942cc3ea3939573bf5f2c0ef756943

SHA-1:
12985b312d6b2ec106dd41fefd28f4cd0aa06f76

SHA-256:
4d1ea128297c59da667244cf9da259c7f6c4b4e600ab28ac47f467bce74c604a

Scanner detections:
2 / 68

Status:
Clean  (2 probable false positive detections)

Explanation:
These detections are probably false positives (erroneous), the file is probably malware free.

Analysis date:
11/27/2024 1:38:31 AM UTC  (today)

Scan engine
Detection
Engine version

Clam AntiVirus
Trojan.ZAccess-708
0.98/18155

Vba32 AntiVirus
Backdoor.ZAccess.bze
3.12.16.4

File size:
423.6 KB (433,767 bytes)

Product version:
1.0.0

Copyright:
© Headlight Software, Inc.

Original file name:
telechargement_01net.exe

File type:
Executable application (Win32 EXE)

Language:
French (France)

Common path:
C:\users\{user}\downloads\avgantivirusfreeedition_telechargement_01net.exe

File PE Metadata
Compilation timestamp:
11/28/2011 7:40:46 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
6144:oxJ61E0Fg0C7pzNZT3KUDEeuH4RU0yDaytuxcz7TPUhKuh9EOSTsoSS6d:oxgvC79NZTaGuwiuxu7Tkf9E9TsoSh

Entry address:
0x1250E0

Entry point:
60, BE, 00, 70, 4D, 00, 8D, BE, 00, A0, F2, FF, 57, 89, E5, 8D, 9C, 24, 80, C1, FF, FF, 31, C0, 50, 39, DC, 75, FB, 46, 46, 53, 68, 46, 3C, 12, 00, 57, 83, C3, 04, 53, 68, D4, E0, 04, 00, 56, 83, C3, 04, 53, 50, C7, 03, 03, 00, 02, 00, 90, 90, 90, 90, 90, 55, 57, 56, 53, 83, EC, 7C, 8B, 94, 24, 90, 00, 00, 00, C7, 44, 24, 74, 00, 00, 00, 00, C6, 44, 24, 73, 00, 8B, AC, 24, 9C, 00, 00, 00, 8D, 42, 04, 89, 44, 24, 78, B8, 01, 00, 00, 00, 0F, B6, 4A, 02, 89, C3, D3, E3, 89, D9, 49, 89, 4C, 24, 6C, 0F, B6, 4A...
 
[+]

Code size:
316 KB (323,584 bytes)

The file avgantivirusfreeedition_telechargement_01net.exe has been seen being distributed by the following URL.