Android Newtab

By GoldSparrow in Browser Hijackers

Threat Scorecard

Popularity Rank: 16,505
Threat Level: 80 % (High)
Infected Computers: 507
First Seen: June 4, 2014
Last Seen: February 7, 2026
OS(es) Affected: Windows

Android Newtab is a browser hijacker that is associated with the generic search engine site start.androidnewtab.com. Android Newtab may have associated files that load on your computer causing your default home page to redirect to start.androidnewtab.com. Usually the installation of Android Newtab takes place when installing a random freeware program. Once loaded, Android Newtab will start to load its plugin or add-on files causing you to be redirected to an unwanted site each time you open your web browser application. Removal of all Android Newtab files is necessary to stop the redirects form taking place.

Analysis Report

General information

Family Name: Trojan.MSIL.Dropper
Signature status: No Signature

Known Samples

MD5: 538c8e16cfde995be38eec802cc5647c
SHA1: 741b828bba90c98d37bf2f1b6e3288dd5666cd2a
SHA256: 142B8233B8633F7C326018DF0D6A8E7438FF970CC7B3B288140A06D4DFA605E2
File Size: 1.77 MB, 1766912 bytes
MD5: 7b9b5639b1c77a54e7c615f7948e731f
SHA1: ce7162d3345c92445a048b87e620cee979997c03
SHA256: 11A6E96E77FA445E2225FE03C0515D2C91A238DF8CBA613F337ECB5B98A7E4AB
File Size: 298.50 KB, 298496 bytes
MD5: 749cd5911b60cc86f71f6260f8bdb37b
SHA1: 67080a5cb034e45266dff4f82d66afd040cde5af
SHA256: 73C4B568C3B796A493A49B59134844C4401B6AEAB8B7EB4E0560D35A31DDC998
File Size: 268.29 KB, 268288 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have exports table
  • File doesn't have security information
  • File is .NET application
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Assembly Version
  • 1.0.2.0
  • 1.0.0.0
Company Name Студия GamesVoice
File Description
  • BM_GV_Rus
  • unins000
File Version
  • 1.0.2.0
  • 1.0.0.0
Internal Name
  • BM_GV_Rus.exe
  • unins000.exe
Legal Copyright
  • Copyright © 2023
  • Copyright © Студия GamesVoice 2023г
Legal Trademarks © Студия GamesVoice
Original Filename
  • BM_GV_Rus.exe
  • unins000.exe
Product Name
  • BM_GV_Rus
  • unins000
Product Version
  • 1.0.2.0
  • 1.0.0.0

File Traits

  • .NET
  • HighEntropy
  • No Version Info
  • x86

Block Information

Total Blocks: 152
Potentially Malicious Blocks: 54
Whitelisted Blocks: 96
Unknown Blocks: 2

Visual Map

0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 0 0 x x 0 x x x x 0 x x 0 0 x x x 0 0 x x x x x x x x x x 0 x x x x x x ? ? x x 0 0 0 0 0 x x 0 0 0 x x 0 0 x x 0 0 x x 0 x x 0 x 0 0 0 x 0 0 0 0 0 0 0 0 0 x x 0 0 0 0 x x x x x x x x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • MSIL.Downloader.Agent.CAD
  • MSIL.Padpin.B
  • MSIL.Padpin.C
  • MSIL.Padpin.D
  • MSIL.Padpin.E
Show More
  • MSIL.Padpin.F
  • MSIL.Padpin.G

Files Modified

File Attributes
\device\namedpipe Generic Read,Write Attributes
\device\namedpipe Generic Write,Read Attributes
c:\users\user\appdata\roaming\6s5d4f65ds4g65d47gfd684gfd_0022.sys Generic Write,Read Attributes
c:\users\user\appdata\roaming\my works.exe Generic Write,Read Attributes

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAlertThreadByThreadId
  • ntdll.dll!NtAlpcConnectPort
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtApphelpCacheControl
  • ntdll.dll!NtClearEvent
  • ntdll.dll!NtClose
  • ntdll.dll!NtConnectPort
  • ntdll.dll!NtCreateEvent
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateMutant
Show More
  • ntdll.dll!NtCreatePrivateNamespace
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtCreateSemaphore
  • ntdll.dll!NtCreateThreadEx
  • ntdll.dll!NtDeviceIoControlFile
  • ntdll.dll!NtDuplicateObject
  • ntdll.dll!NtEnumerateKey
  • ntdll.dll!NtEnumerateValueKey
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenDirectoryObject
  • ntdll.dll!NtOpenEvent
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenKeyEx
  • ntdll.dll!NtOpenProcess
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtOpenSection
  • ntdll.dll!NtOpenSemaphore
  • ntdll.dll!NtOpenThreadToken
  • ntdll.dll!NtProtectVirtualMemory
  • ntdll.dll!NtQueryAttributesFile
  • ntdll.dll!NtQueryDefaultLocale
  • ntdll.dll!NtQueryDirectoryFileEx
  • ntdll.dll!NtQueryFullAttributesFile
  • ntdll.dll!NtQueryInformationFile
  • ntdll.dll!NtQueryInformationJobObject
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationThread
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQueryKey
  • ntdll.dll!NtQueryLicenseValue
  • ntdll.dll!NtQueryPerformanceCounter
  • ntdll.dll!NtQuerySecurityAttributesToken
  • ntdll.dll!NtQuerySecurityObject
  • ntdll.dll!NtQuerySystemInformation
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtQueryWnfStateData
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtReadRequestData
  • ntdll.dll!NtReleaseMutant
  • ntdll.dll!NtReleaseSemaphore
  • ntdll.dll!NtReleaseWorkerFactoryWorker
  • ntdll.dll!NtRequestWaitReplyPort
  • ntdll.dll!NtResumeThread
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationFile
  • ntdll.dll!NtSetInformationKey
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationThread
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtSubscribeWnfStateChange
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtUnmapViewOfSectionEx
  • ntdll.dll!NtWaitForAlertByThreadId
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWaitForWorkViaWorkerFactory
  • ntdll.dll!NtWaitLowEventPair
  • ntdll.dll!NtWorkerFactoryWorkerReady
  • ntdll.dll!NtWriteFile
  • UNKNOWN
User Data Access
  • GetComputerNameEx
  • GetUserDefaultLocaleName
  • GetUserObjectInformation
Other Suspicious
  • AdjustTokenPrivileges
Anti Debug
  • IsDebuggerPresent
Encryption Used
  • BCryptOpenAlgorithmProvider
  • CryptAcquireContext
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess

Shell Command Execution

"C:\Users\Zptajvdg\AppData\Roaming\my works.exe" c:\users\user\downloads\67080a5cb034e45266dff4f82d66afd040cde5af_0000268288

Trending

Most Viewed

Loading...