regzooka_99795394967492717451.exe

RegZooka

ZookaWare

The application regzooka_99795394967492717451.exe by ZookaWare has been detected as a potentially unwanted program by 5 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. The file has been seen being downloaded from zookaware.com and multiple other hosts.
Publisher:
ZookaWare  (signed and verified)

Product:
RegZooka

Version:
3.22

MD5:
a0ec96084579d819fb15f62e139acf44

SHA-1:
d269f0a9ecdd820fe3e68760948ea41ece1e6179

SHA-256:
a6e78e9a311ba271ce4f882357405c217ad0a68c4cdd73a6340d33317a5b70dd

Scanner detections:
5 / 68

Status:
Potentially unwanted

Analysis date:
11/5/2024 9:29:51 AM UTC  (today)

Scan engine
Detection
Engine version

Emsisoft Anti-Malware
Adware.Win32.RegGenie.AMN!A2
8.14.07.21.10

ESET NOD32
Win32/Adware.RegGenie (variant)
8.7391

Reason Heuristics
PUP.Optional.ZookaWare.DD
14.7.21.10

Trend Micro House Call
ADW_KRADARE
7.2.202

Trend Micro
ADW_KRADARE
10.465.21

File size:
5.4 MB (5,623,936 bytes)

Product version:
3.22

Copyright:
ZookaWare

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\regzooka_99795394967492717451.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
7/4/2011 8:00:00 PM

Valid to:
7/4/2013 7:59:59 PM

Subject:
CN=ZookaWare, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=ZookaWare, L=Mesa, S=Arizona, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
5C919F843F8BEFEEEEDBC47E1EBC96A8

File PE Metadata
Compilation timestamp:
12/5/2009 5:50:29 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
98304:2l9xmg+/uCbKJimu40YhY0m4JfpqQ+zVwgSNHsNe4HcOoSYgIQ06wPWQ:O98Nmi3BYhYj4tpq5j8sN78ny06w

Entry address:
0x30DE

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 58, 27, 7A, 00, E8, F1, 2B, 00, 00, A3, A4, 26, 7A, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 68, DC, 79, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, A0, 1E, 7A, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 80, 7A, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Entropy:
7.9989

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The file regzooka_99795394967492717451.exe has been seen being distributed by the following 2 URLs.

Remove regzooka_99795394967492717451.exe - Powered by Reason Core Security