× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: ff8db9e24406c33c68286c3a5c00d757897c4afe0cb13d2500913da80a995bfe
File name: JumpshareInstaller.exe
Detection ratio: 0 / 49
Analysis date: 2014-02-28 07:02:07 UTC ( 1 year, 2 months ago ) View latest
Antivirus Result Update
AVG 20140228
Ad-Aware 20140228
Agnitum 20140227
AhnLab-V3 20140228
AntiVir 20140228
Antiy-AVL 20140227
Avast 20140228
Baidu-International 20140227
BitDefender 20140228
Bkav 20140227
ByteHero 20140228
CAT-QuickHeal 20140228
CMC 20140220
ClamAV 20140227
Commtouch 20140228
Comodo 20140228
DrWeb 20140228
ESET-NOD32 20140228
Emsisoft 20140228
F-Prot 20140228
F-Secure 20140228
Fortinet 20140228
GData 20140228
Ikarus 20140228
Jiangmin 20140228
K7AntiVirus 20140227
K7GW 20140227
Kaspersky 20140228
Kingsoft 20140228
Malwarebytes 20140228
McAfee 20140228
McAfee-GW-Edition 20140228
MicroWorld-eScan 20140228
Microsoft 20140228
NANO-Antivirus 20140228
Norman 20140228
Panda 20140227
Qihoo-360 20140228
Rising 20140227
SUPERAntiSpyware 20140228
Sophos 20140228
Symantec 20140228
TheHacker 20140226
TotalDefense 20140227
TrendMicro 20140228
TrendMicro-HouseCall 20140228
VBA32 20140227
VIPRE 20140228
ViRobot 20140228
nProtect 20140227
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block
Copyright
Copyright© 2014, Jumpshare, Inc.

Publisher Jumpshare
Product Jumpshare
Original name JumpshareInstaller.exe
Internal name setup
File version 1.0.17
Description Jumpshare
Signature verification Signed file, verified signature
Signing date 4:38 PM 2/26/2014
Signers
[+] Jumpshare
Status Valid
Valid from 1:00 AM 1/24/2014
Valid to 12:59 AM 1/25/2019
Valid usage Code Signing
Algorithm SHA1
Thumbprint 8FD38F0B185B345E1E548D0D8FC0F3F489ABDECC
Serial number 5F D2 03 FA 0F 1A 90 C3 B4 A5 9F C4 90 6A 3A C3
[+] COMODO Code Signing CA 2
Status Valid
Valid from 1:00 AM 8/24/2011
Valid to 11:48 AM 5/30/2020
Valid usage Code Signing
Algorithm SHA1
Thumbprint B64771392538D1EB7A9281998791C14AFD0C5035
Serial number 10 70 9D 4F F5 54 08 D7 30 60 01 D8 EA 91 75 BB
[+] USERTrust
Status Valid
Valid from 7:31 PM 7/9/1999
Valid to 7:40 PM 7/9/2019
Valid usage EFS, Timestamp Signing, Code Signing
Algorithm SHA1
Thumbprint E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46
Serial number 44 BE 0C 8B 50 00 24 B4 11 D3 36 2D E0 B3 5F 1B
Counter signers
[+] Symantec Time Stamping Services Signer - G4
Status Valid
Valid from 1:00 AM 10/18/2012
Valid to 12:59 AM 12/30/2020
Valid usage Timestamp Signing
Algorithm SHA1
Thumbrint 65439929B67973EB192D6FF243E6767ADF0834E4
Serial number 0E CF F4 38 C8 FE BF 35 6E 04 D8 6A 98 1B 1A 50
[+] Symantec Time Stamping Services CA - G2
Status Valid
Valid from 1:00 AM 12/21/2012
Valid to 12:59 AM 12/31/2020
Valid usage Timestamp Signing
Algorithm SHA1
Thumbrint 6C07453FFDDA08B83707C09B82FB3D15F35336B1
Serial number 7E 93 EB FB 7C C6 4E 59 EA 4B 9A 77 D4 06 FC 3B
[+] Thawte Timestamping CA
Status Valid
Valid from 1:00 AM 1/1/1997
Valid to 12:59 AM 1/1/2021
Valid usage Timestamp Signing
Algorithm MD5
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
Packers identified
F-PROT CAB, UTF-8, CAB, CAB, CAB, CAB, CAB, CAB, CAB, Unicode, CAB, CAB
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-11-28 14:14:28
Entry Point 0x000267A5
Number of sections 7
PE sections
PE imports
SetSecurityDescriptorOwner
RegCreateKeyExW
RegCloseKey
OpenServiceW
AdjustTokenPrivileges
InitializeAcl
LookupPrivilegeValueW
RegDeleteKeyW
CryptHashData
CheckTokenMembership
DecryptFileW
RegQueryValueExW
CryptCreateHash
SetSecurityDescriptorDacl
CloseServiceHandle
ConvertStringSecurityDescriptorToSecurityDescriptorW
CreateWellKnownSid
OpenProcessToken
QueryServiceStatus
RegOpenKeyExW
QueryServiceConfigW
GetTokenInformation
CryptReleaseContext
GetUserNameW
RegQueryInfoKeyW
SetEntriesInAclW
RegEnumKeyExW
CryptAcquireContextW
CryptDestroyHash
InitializeSecurityDescriptor
RegDeleteValueW
RegSetValueExW
CryptGetHashParam
OpenSCManagerW
RegEnumValueW
AllocateAndInitializeSid
InitiateSystemShutdownExW
SetEntriesInAclA
ChangeServiceConfigW
SetSecurityDescriptorGroup
SetNamedSecurityInfoW
CertGetCertificateContextProperty
CryptHashPublicKeyInfo
Ord(23)
Ord(20)
Ord(22)
DeleteDC
SelectObject
GetObjectW
CreateCompatibleDC
DeleteObject
StretchBlt
GetVolumePathNameW
GetStdHandle
ReleaseMutex
WaitForSingleObject
EncodePointer
ProcessIdToSessionId
GetFileAttributesW
VerifyVersionInfoW
GetProcessId
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
LoadLibraryExW
FreeEnvironmentStringsW
SetStdHandle
GetCPInfo
InterlockedExchange
GetTempPathW
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetExitCodeProcess
LocalFree
FormatMessageW
ConnectNamedPipe
InitializeCriticalSection
OutputDebugStringW
FindClose
TlsGetValue
SetFileAttributesW
SetLastError
GetSystemTime
CopyFileW
GetUserDefaultLangID
RemoveDirectoryW
IsDebuggerPresent
HeapAlloc
VerSetConditionMask
HeapSetInformation
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
SystemTimeToTzSpecificLocalTime
SetFilePointerEx
CreateEventW
GetFullPathNameW
CreateThread
MoveFileExW
GetSystemDirectoryW
GetExitCodeThread
SetNamedPipeHandleState
SetUnhandledExceptionFilter
CreateMutexW
IsProcessorFeaturePresent
DecodePointer
TerminateProcess
GetModuleHandleExW
SetCurrentDirectoryW
GlobalAlloc
LocalFileTimeToFileTime
SetEndOfFile
GetCurrentThreadId
LeaveCriticalSection
WriteConsoleW
GetSystemWow64DirectoryW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
LoadLibraryW
GetVersionExW
FreeLibrary
QueryPerformanceCounter
TlsAlloc
FlushFileBuffers
RtlUnwind
SystemTimeToFileTime
GetWindowsDirectoryW
LCMapStringW
OpenProcess
GetDateFormatW
GetStartupInfoW
SetEvent
DeleteFileW
GetProcAddress
GetProcessHeap
GetTempFileNameW
GetComputerNameW
CompareStringW
GetFileSizeEx
GetModuleFileNameW
ExpandEnvironmentStringsW
FindNextFileW
GetModuleHandleA
CreateDirectoryW
CompareStringA
FindFirstFileW
DuplicateHandle
WaitForMultipleObjects
GetTimeZoneInformation
CreateFileW
GetFileType
TlsSetValue
CreateFileA
ExitProcess
InterlockedIncrement
GetLastError
DosDateTimeToFileTime
CreateFileMappingW
CreateNamedPipeW
lstrlenA
GlobalFree
GetConsoleCP
GetThreadLocale
GetEnvironmentStringsW
lstrlenW
CreateProcessW
GetCurrentDirectoryW
GetCurrentProcessId
SetFileTime
GetCommandLineW
WideCharToMultiByte
HeapSize
CopyFileExW
InterlockedCompareExchange
GetSystemDefaultLangID
RaiseException
MapViewOfFile
TlsFree
SetFilePointer
ReadFile
CloseHandle
GetACP
GetModuleHandleW
SetThreadExecutionState
GetLocalTime
IsValidCodePage
UnmapViewOfFile
WriteFile
VirtualFree
Sleep
VirtualAlloc
GetOEMCP
ResetEvent
SysFreeString
VariantClear
VariantInit
SysAllocString
UuidCreate
SHGetFolderPathW
ShellExecuteExW
CommandLineToArgvW
GetMonitorInfoW
LoadBitmapW
DefWindowProcW
GetMessageW
PostQuitMessage
SetWindowLongW
MessageBoxW
PeekMessageW
TranslateMessage
PostMessageW
DispatchMessageW
GetCursorPos
RegisterClassW
UnregisterClassW
IsWindow
IsDialogMessageW
MonitorFromPoint
WaitForInputIdle
PostThreadMessageW
LoadCursorW
CreateWindowExW
MsgWaitForMultipleObjects
GetWindowLongW
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
HttpQueryInfoW
InternetConnectW
InternetReadFile
InternetCloseHandle
InternetCrackUrlW
InternetSetOptionW
HttpSendRequestW
InternetErrorDlg
InternetOpenW
HttpOpenRequestW
HttpAddRequestHeadersW
CryptCATAdminCalcHashFromFileHandle
WTHelperProvDataFromStateData
WTHelperGetProvSignerFromChain
WinVerifyTrust
Ord(190)
Ord(70)
Ord(205)
Ord(171)
Ord(45)
Ord(173)
Ord(90)
Ord(111)
Ord(125)
Ord(169)
Ord(17)
Ord(141)
Ord(116)
Ord(118)
Ord(238)
Ord(115)
Ord(8)
Ord(88)
Ord(137)
CoInitializeEx
CLSIDFromProgID
CoInitialize
CoCreateInstance
CoInitializeSecurity
CoUninitialize
CoTaskMemFree
StringFromGUID2
Number of PE resources by type
RT_ICON 4
RT_GROUP_ICON 1
RT_MESSAGETABLE 1
RT_VERSION 1
RT_MANIFEST 1
Number of PE resources by language
ENGLISH US 8
ExifTool file metadata
SubsystemVersion
5.1

LinkerVersion
11.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
1.0.17.0

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Windows, Latin1

InitializedDataSize
177664

FileOS
Win32

MIMEType
application/octet-stream

LegalCopyright
Copyright 2014, Jumpshare, Inc.

FileVersion
1.0.17

TimeStamp
2013:11:28 15:14:28+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
setup

FileAccessDate
2014:02:28 11:14:12+01:00

ProductVersion
1.0.17

FileDescription
Jumpshare

OSVersion
5.1

FileCreateDate
2014:02:28 11:14:12+01:00

OriginalFilename
JumpshareInstaller.exe

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Jumpshare

CodeSize
235008

ProductName
Jumpshare

ProductVersionNumber
1.0.17.0

EntryPoint
0x267a5

ObjectFileType
Executable application

File identification
MD5 0f9ce0efeb2a9ba5a066f6c3e873f02c
SHA1 6b40b123a87346288229c09cfd21b06cb6be9c6f
SHA256 ff8db9e24406c33c68286c3a5c00d757897c4afe0cb13d2500913da80a995bfe
ssdeep
24576:33wDfTJxCXvbJR8kA7HJAtxaFQw30JJQvPppdQANK8mkpn+4VvXEA4h4KBs2gncs:QB4XTJ2JAuQggJaPjdo8v/VAhHbGcs

imphash 67715e556e3a78ea78c756db800102a3
File size 1.9 MB ( 1999120 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (67.3%)
Win32 Dynamic Link Library (generic) (14.2%)
Win32 Executable (generic) (9.7%)
Generic Win/DOS Executable (4.3%)
DOS Executable Generic (4.3%)
Tags
peexe signed

VirusTotal metadata
First submission 2014-02-27 13:50:14 UTC ( 1 year, 2 months ago )
Last submission 2014-02-28 10:14:14 UTC ( 1 year, 2 months ago )
File names setup
JumpshareInstaller.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!