× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 3cb8233678f041e66af7aee3598ff1a1bd47630ff138e90c97d9b1b58f8b78f7
File name: No Hands Proxies Trial.exe
Detection ratio: 1 / 55
Analysis date: 2015-12-15 16:32:12 UTC ( 3 years, 3 months ago )
Antivirus Result Update
CMC Trojan.Win32.Swizzor.2!O 20151215
Ad-Aware 20151215
AegisLab 20151215
Yandex 20151214
AhnLab-V3 20151215
Alibaba 20151208
ALYac 20151215
Antiy-AVL 20151215
Arcabit 20151215
Avast 20151215
AVG 20151215
Avira (no cloud) 20151215
AVware 20151215
Baidu-International 20151215
BitDefender 20151215
Bkav 20151215
ByteHero 20151215
CAT-QuickHeal 20151215
ClamAV 20151215
Comodo 20151215
Cyren 20151215
DrWeb 20151215
Emsisoft 20151215
ESET-NOD32 20151215
F-Prot 20151215
F-Secure 20151215
Fortinet 20151215
GData 20151215
Ikarus 20151215
Jiangmin 20151214
K7AntiVirus 20151215
K7GW 20151215
Kaspersky 20151215
Malwarebytes 20151215
McAfee 20151215
McAfee-GW-Edition 20151215
Microsoft 20151215
eScan 20151215
NANO-Antivirus 20151215
nProtect 20151215
Panda 20151213
Qihoo-360 20151215
Rising 20151215
Sophos AV 20151215
SUPERAntiSpyware 20151215
Symantec 20151215
Tencent 20151215
TheHacker 20151215
TrendMicro 20151215
TrendMicro-HouseCall 20151215
VBA32 20151215
VIPRE 20151215
ViRobot 20151215
Zillya 20151214
Zoner 20151215
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Publisher Pure Business Logic Ltd
Product No Hands Proxies Install Program
File version 2, 0, 0, 43
Signature verification Signed file, verified signature
Signing date 1:37 PM 7/4/2015
Signers
[+] Pure Business Logic Ltd
Status Valid
Issuer None
Valid from 1:00 AM 3/27/2015
Valid to 12:59 AM 3/27/2016
Valid usage Code Signing
Algorithm 1.2.840.113549.1.1.11
Thumbprint 8A43C32070E375870E3DD5E81B43384FB9379A5C
Serial number 00 88 10 D5 65 09 91 45 51 EA 16 C0 01 58 33 21 61
[+] COMODO RSA Code Signing CA
Status Valid
Issuer None
Valid from 1:00 AM 5/9/2013
Valid to 12:59 AM 5/9/2028
Valid usage Code Signing
Algorithm 1.2.840.113549.1.1.12
Thumbprint B69E752BBE88B4458200A7C0F4F5B3CCE6F35B47
Serial number 2E 7C 87 CC 0E 93 4A 52 FE 94 FD 1C B7 CD 34 AF
[+] COMODO SECURE?
Status Valid
Issuer None
Valid from 1:00 AM 1/19/2010
Valid to 12:59 AM 1/19/2038
Valid usage Server Auth, Client Auth, Email Protection, Code Signing, Timestamp Signing, EFS, IPSEC Tunnel, IPSEC User
Algorithm 1.2.840.113549.1.1.12
Thumbprint AFE5D244A8D1194230FF479FE2F897BBCD7A8CB4
Serial number 4C AA F9 CA DB 63 6F E0 1F F7 4E D8 5B 03 86 9D
Counter signers
[+] COMODO Time Stamping Signer
Status Valid
Issuer None
Valid from 1:00 AM 5/5/2015
Valid to 12:59 AM 1/1/2016
Valid usage Timestamp Signing
Algorithm SHA1
Thumbrint DF946A5E503015777FD22F46B5624ECD27BEE376
Serial number 00 9F EA C8 11 B0 F1 62 47 A5 FC 20 D8 05 23 AC E6
[+] UTN-USERFirst-Object
Status Valid
Issuer None
Valid from 9:09 AM 6/7/2005
Valid to 11:48 AM 5/30/2020
Valid usage All
Algorithm SHA1
Thumbrint 8AD5C9987E6F190BD6F5416E2DE44CCD641D8CDA
Serial number 42 1A F2 94 09 84 19 1F 52 0A 4B C6 24 26 A7 4B
[+] The USERTrust Network?
Status Valid
Issuer None
Valid from 11:48 AM 5/30/2000
Valid to 11:48 AM 5/30/2020
Valid usage Server Auth, Client Auth, Email Protection, Code Signing, Timestamp Signing, EFS, IPSEC Tunnel, IPSEC User
Algorithm SHA1
Thumbrint 02FAF3E291435468607857694DF5E45B68851868
Serial number 01
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2011-12-08 07:35:06
Entry Point 0x0001BCF2
Number of sections 4
PE sections
Overlays
MD5 ee65e21e9ecbe9e29a864405f4cf02a2
File type data
Offset 1863680
Size 6103640
Entropy 8.00
PE imports
RegDeleteKeyA
LookupPrivilegeValueA
RegOpenKeyA
RegCloseKey
OpenProcessToken
RegSetValueExA
RegQueryValueA
RegQueryValueExA
AdjustTokenPrivileges
RegDeleteValueA
RegCreateKeyExA
RegOpenKeyExA
RegCreateKeyA
RegEnumKeyExA
AddFontResourceA
GetSystemPaletteEntries
CreateHalftonePalette
CreateFontIndirectA
SetStretchBltMode
GetDeviceCaps
DeleteDC
SetBkMode
CreateDIBPatternBrush
BitBlt
RealizePalette
SetTextColor
CreatePalette
GetStockObject
SelectPalette
ExtTextOutA
CreateCompatibleDC
StretchDIBits
SetBrushOrgEx
RemoveFontResourceA
SelectObject
CreateSolidBrush
SetBkColor
DeleteObject
CreateCompatibleBitmap
GetStdHandle
FileTimeToSystemTime
GetFileAttributesA
GetDriveTypeA
HeapDestroy
GetLocalTime
FreeEnvironmentStringsA
GetCurrentProcess
lstrcatA
SetErrorMode
FreeEnvironmentStringsW
SetFileAttributesA
GetTempPathA
WideCharToMultiByte
GetStringTypeA
WriteFile
GetDiskFreeSpaceA
GetStringTypeW
GetFullPathNameA
GetOEMCP
MoveFileA
GetExitCodeProcess
GetEnvironmentVariableA
FindClose
FormatMessageA
CopyFileA
HeapAlloc
GetModuleFileNameA
LoadLibraryExA
GetPrivateProfileStringA
UnhandledExceptionFilter
MultiByteToWideChar
GetModuleHandleA
SetUnhandledExceptionFilter
GetSystemDirectoryA
MoveFileExA
SetEnvironmentVariableA
TerminateProcess
GlobalAlloc
GetVersion
SetCurrentDirectoryA
HeapFree
SetHandleCount
FreeLibrary
GetTickCount
IsBadWritePtr
GetVersionExA
LoadLibraryA
RtlUnwind
GetStartupInfoA
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
GetCPInfo
GetProcAddress
CompareStringW
FindFirstFileA
CompareStringA
FindNextFileA
GlobalLock
GetTimeZoneInformation
GetFileType
CreateFileA
ExitProcess
GetLastError
LCMapStringW
lstrlenA
GlobalFree
LCMapStringA
HeapReAlloc
GetEnvironmentStringsW
GlobalUnlock
RemoveDirectoryA
GetShortPathNameA
HeapCompact
FileTimeToLocalFileTime
GetEnvironmentStrings
WritePrivateProfileStringA
SetFileTime
GetCurrentDirectoryA
WinExec
GetCommandLineA
SetFilePointer
OpenFile
ReadFile
CloseHandle
GetACP
CreateProcessA
HeapCreate
VirtualFree
Sleep
IsBadReadPtr
IsBadCodePtr
FindResourceA
VirtualAlloc
DragFinish
DragAcceptFiles
SHGetSpecialFolderLocation
SHBrowseForFolderA
DragQueryFileA
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteA
SetFocus
RedrawWindow
RegisterClassA
GetParent
UpdateWindow
EndDialog
BeginPaint
CheckRadioButton
KillTimer
PostQuitMessage
DefWindowProcA
FindWindowA
GetClipboardData
SendDlgItemMessageA
GetSystemMetrics
GetWindowRect
DispatchMessageA
EndPaint
SetDlgItemTextA
PostMessageA
GetDlgItemTextA
MessageBoxA
PeekMessageA
SetWindowPos
AdjustWindowRectEx
TranslateMessage
DialogBoxParamA
GetWindow
GetSysColor
CheckDlgButton
SetWindowLongA
DrawTextA
SetWindowTextA
wsprintfA
ShowWindow
GetLastActivePopup
IsWindowVisible
SendMessageA
IsWindowEnabled
GetClientRect
CreateWindowExA
GetDlgItem
CreateDialogParamA
BringWindowToTop
IsIconic
ScreenToClient
SendMessageTimeoutA
InvalidateRect
GetWindowLongA
IsClipboardFormatAvailable
SetTimer
LoadCursorA
LoadIconA
GetMessageA
FillRect
IsDlgButtonChecked
ValidateRect
CallWindowProcA
GetClassNameA
GetFocus
EnableWindow
CloseClipboard
DestroyWindow
ExitWindowsEx
IsDialogMessageA
OpenClipboard
GetFileVersionInfoSizeA
VerFindFileA
GetFileVersionInfoA
VerQueryValueA
GetOpenFileNameA
OleUninitialize
CoCreateInstance
CoGetMalloc
OleInitialize
Number of PE resources by type
RT_ICON 11
RT_DIALOG 4
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 18
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
6.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
2.0.0.43

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
1720320

EntryPoint
0x1bcf2

MIMEType
application/octet-stream

FileVersion
2, 0, 0, 43

TimeStamp
2011:12:08 08:35:06+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
2, 0, 0, 43

SubsystemVersion
4.0

OSVersion
4.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
139264

ProductName
No Hands Proxies Install Program

ProductVersionNumber
2.0.0.43

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 c559f21d1011dcbf9f8236c5a622ce5c
SHA1 33968cdf2bc4b7a1cd3b5ced29c1614f7a455c50
SHA256 3cb8233678f041e66af7aee3598ff1a1bd47630ff138e90c97d9b1b58f8b78f7
ssdeep
196608:hD0+kxlqVaiv8Dab48UXSLo2XQ/EpfDOLpTPTa9ixHh:2lxQP8D+478o2XQMpipTPrxB

authentihash 9ac6f7178448d6d5b43e48bbf5423d0899820340a931442b6b5abb326261b32e
imphash f82ad31b4d63082b50c9f9f3441f4120
File size 7.6 MB ( 7967320 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (52.5%)
Windows screen saver (22.0%)
Win32 Dynamic Link Library (generic) (11.0%)
Win32 Executable (generic) (7.5%)
Generic Win/DOS Executable (3.3%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2015-12-15 16:32:12 UTC ( 3 years, 3 months ago )
Last submission 2015-12-15 16:32:12 UTC ( 3 years, 3 months ago )
File names No Hands Proxies Trial.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Searched windows
Runtime DLLs
Additional details
The file uses the IsDebuggerPresent Windows API function in order to see whether it is being debugged.