Android Newtab

By GoldSparrow in Browser Hijackers

Threat Scorecard

Popularity Rank: 14,855
Threat Level: 80 % (High)
Infected Computers: 504
First Seen: June 4, 2014
Last Seen: December 27, 2025
OS(es) Affected: Windows

Android Newtab is a browser hijacker that is associated with the generic search engine site start.androidnewtab.com. Android Newtab may have associated files that load on your computer causing your default home page to redirect to start.androidnewtab.com. Usually the installation of Android Newtab takes place when installing a random freeware program. Once loaded, Android Newtab will start to load its plugin or add-on files causing you to be redirected to an unwanted site each time you open your web browser application. Removal of all Android Newtab files is necessary to stop the redirects form taking place.

Analysis Report

General information

Family Name: Trojan.MSIL.Dropper
Signature status: No Signature

Known Samples

MD5: 538c8e16cfde995be38eec802cc5647c
SHA1: 741b828bba90c98d37bf2f1b6e3288dd5666cd2a
SHA256: 142B8233B8633F7C326018DF0D6A8E7438FF970CC7B3B288140A06D4DFA605E2
File Size: 1.77 MB, 1766912 bytes
MD5: 7b9b5639b1c77a54e7c615f7948e731f
SHA1: ce7162d3345c92445a048b87e620cee979997c03
SHA256: 11A6E96E77FA445E2225FE03C0515D2C91A238DF8CBA613F337ECB5B98A7E4AB
File Size: 298.50 KB, 298496 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have exports table
  • File doesn't have security information
  • File is .NET application
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Assembly Version
  • 1.0.2.0
  • 1.0.0.0
Company Name Студия GamesVoice
File Description
  • BM_GV_Rus
  • unins000
File Version
  • 1.0.2.0
  • 1.0.0.0
Internal Name
  • BM_GV_Rus.exe
  • unins000.exe
Legal Copyright
  • Copyright © 2023
  • Copyright © Студия GamesVoice 2023г
Legal Trademarks © Студия GamesVoice
Original Filename
  • BM_GV_Rus.exe
  • unins000.exe
Product Name
  • BM_GV_Rus
  • unins000
Product Version
  • 1.0.2.0
  • 1.0.0.0

File Traits

  • .NET
  • HighEntropy
  • x86

Block Information

Total Blocks: 32
Potentially Malicious Blocks: 7
Whitelisted Blocks: 17
Unknown Blocks: 8

Visual Map

? 0 0 x x x 0 ? x ? ? ? x 0 ? 0 0 0 0 0 0 0 0 0 0 0 x 0 x ? ? 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • MSIL.Downloader.Agent.CAD

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAlertThreadByThreadId
  • ntdll.dll!NtAlpcConnectPort
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtApphelpCacheControl
  • ntdll.dll!NtClearEvent
  • ntdll.dll!NtClose
  • ntdll.dll!NtConnectPort
  • ntdll.dll!NtCreateEvent
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateMutant
Show More
  • ntdll.dll!NtCreatePrivateNamespace
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtCreateSemaphore
  • ntdll.dll!NtCreateThreadEx
  • ntdll.dll!NtDeviceIoControlFile
  • ntdll.dll!NtDuplicateObject
  • ntdll.dll!NtEnumerateKey
  • ntdll.dll!NtEnumerateValueKey
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenDirectoryObject
  • ntdll.dll!NtOpenEvent
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenKeyEx
  • ntdll.dll!NtOpenProcess
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtOpenSection
  • ntdll.dll!NtOpenSemaphore
  • ntdll.dll!NtOpenThreadToken
  • ntdll.dll!NtProtectVirtualMemory
  • ntdll.dll!NtQueryAttributesFile
  • ntdll.dll!NtQueryDefaultLocale
  • ntdll.dll!NtQueryDirectoryFileEx
  • ntdll.dll!NtQueryFullAttributesFile
  • ntdll.dll!NtQueryInformationFile
  • ntdll.dll!NtQueryInformationJobObject
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationThread
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQueryKey
  • ntdll.dll!NtQueryLicenseValue
  • ntdll.dll!NtQueryPerformanceCounter
  • ntdll.dll!NtQuerySecurityAttributesToken
  • ntdll.dll!NtQuerySecurityObject
  • ntdll.dll!NtQuerySystemInformation
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtQueryWnfStateData
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtReadRequestData
  • ntdll.dll!NtReleaseMutant
  • ntdll.dll!NtReleaseSemaphore
  • ntdll.dll!NtReleaseWorkerFactoryWorker
  • ntdll.dll!NtRequestWaitReplyPort
  • ntdll.dll!NtResumeThread
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationFile
  • ntdll.dll!NtSetInformationKey
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationThread
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtSubscribeWnfStateChange
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtUnmapViewOfSectionEx
  • ntdll.dll!NtWaitForAlertByThreadId
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWaitForWorkViaWorkerFactory
  • ntdll.dll!NtWaitLowEventPair
  • ntdll.dll!NtWorkerFactoryWorkerReady
  • ntdll.dll!NtWriteFile
  • UNKNOWN
User Data Access
  • GetComputerNameEx
  • GetUserDefaultLocaleName
  • GetUserObjectInformation
Other Suspicious
  • AdjustTokenPrivileges
Anti Debug
  • IsDebuggerPresent

Trending

Most Viewed

Loading...