newtabs_v9.dll

Proxy Help

Beijing ELEX Technology Co.,Ltd

The library newtabs_v9.dll by Beijing ELEX Technology Co.,Ltd has been known to be a potentially unwanted program that has been detected by 1 anti-malware scanner. It is installed within the context of Internet Explore as a BHO (Browser Helper Object) under the name ‘Proxy Help’.
Publisher:
Newtabs. inc  (signed by Beijing ELEX Technology Co.,Ltd)

Product:
Proxy Help

Description:
Newtabs. inc

Version:
1.0.0.1

MD5:
cc48874ab12824e03338656720971a77

SHA-1:
ab7e5e15539876a548bac526ba50287b81a957cf

SHA-256:
1c4697740592711673c280dde43c08382cb3fb0c0a5ce449f793c38c8ffe0a3e

Scanner detections:
1 / 68

Status:
Inconclusive but possibly unwanted  (There is not enough data for a 100% detection)

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
7/10/2014 6:12:07 AM UTC  (13 days ago)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.BHO.BeijingELEXTechnologyCoLtd.K
14.7.10.2

File size:
65.4 KB (66,984 bytes)

Product version:
1.0.0.1

Copyright:
Copyright (C) 2012

Original file name:
Newtabs.dll

File type:
Dynamic link library (Win32 DLL)

Language:
Chinese (Simplified, PRC)

Common path:
C:\windows\syswow64\newtabs_v9.dll

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
5/25/2012 7:00:00 AM

Valid to:
7/25/2013 6:59:59 AM

Subject:
CN="Beijing ELEX Technology Co.,Ltd", OU=Digital ID Class 3 - Microsoft Software Validation v2, O="Beijing ELEX Technology Co.,Ltd", L=Beijing, S=Beijing, C=CN

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
27BF924EA3BB364A9C0278C0BA682879

File PE Metadata
Compilation timestamp:
6/29/2012 4:42:13 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
768:6eeWDkBRV0lH5s5WqO0hUcCEvq+hSbEDZn26bwopopUaNt6BC79IILrJEs:6UwR2lgUcCe7bwVxt6B0t2s

Entry address:
0x3660

Entry point:
8B, FF, 55, 8B, EC, 83, 7D, 0C, 01, 75, 05, E8, A9, 29, 00, 00, FF, 75, 08, 8B, 4D, 10, 8B, 55, 0C, E8, EC, FE, FF, FF, 59, 5D, C2, 0C, 00, 8B, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A3, 70, EE, 00, 10, 89, 0D, 6C, EE, 00, 10, 89, 15, 68, EE, 00, 10, 89, 1D, 64, EE, 00, 10, 89, 35, 60, EE, 00, 10, 89, 3D, 5C, EE, 00, 10, 66, 8C, 15, 88, EE, 00, 10, 66, 8C, 0D, 7C, EE, 00, 10, 66, 8C, 1D, 58, EE, 00, 10, 66, 8C, 05, 54, EE, 00, 10, 66, 8C, 25, 50, EE, 00, 10, 66, 8C, 2D, 4C, EE, 00, 10, 9C, 8F, 05, 80, EE...
 
[+]

Code size:
33 KB (33,792 bytes)

Internet Explorer BHO
CLSID:
{F386E548-C533-472E-8C61-C026FB14FEA9}

CLSID name:
Proxy Help


3 / 68      (PUP)
bnd_ar_v9.exe  (474d13c266341253f6f9b8005eb5f42991b251c5)

42 / 68    (PUP)
bnd_ar_20131018175329.exe  (b6ef7c220d5b1fdb8c5b52a25180acde78d0406d)

2 / 68      (inconclusive)
newtab-v9.exe  (8bde547942fc47be99e395587d54479adf67a457)

2 / 68      (inconclusive)
v9ht.exe  (95ae3176b7598b282416d4bef99ceb6c63e0b4be)

2 / 68      (inconclusive)
foxit_elex_v9.exe  (0a6edda66b8bbe03ea72b281da69e49f915d553f)

2 / 68      (inconclusive)
v9sof.exe  (6db1e56d4532a67c93d3a6f02143e20f745fb106)

1 / 68      (inconclusive)
V9-ToolBar.DLL  (fc86793b6211dbf6845c8c10c264ee2205e5b532)

1 / 68      (inconclusive)
V9Loader.dll  (20f312fdf49770d4ee525ebf51ae7a709b391d37)

1 / 68      (inconclusive)
goplayer.exe  (0ab7256efd1078979768e109118e817484ae5e4f)

34 / 68    (PUP)
bnd_ar_2013425112757_env9.exe  (9beed8aaa18980f1affcc851416505d4c01f388f)

3 / 68      (PUP)
v9formalavida.exe (by SoftStud)  (e8be36d1b50898c0882af14d1309ddee50724d0a)

4 / 68      (PUP)
downloader.exe  (b725eb0854a392141a7f6a4fda6a8f99e3e3ded2)

18 / 68    (PUP)
v9hpnt_v2.exe (by SoftStud)  (3c79c4a93631015397eda612fdb79fd3ed3cfb07)

9 / 68      (PUP)
bnd_ar_2013829182326_env9.exe  (d76bba6106f650486b022120fcf22e11d5f1fad7)

1 / 68      (inconclusive)
v9hp_sof_20120921181728.exe (by elex)  (350c7130d9cd09b3cb899f40bee8f16634af1418)

1 / 68      (inconclusive)
bombom.exe  (d1139a40516848784dc924667c8c6ea82aef63d3)

Distribution by Country