× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 35fe78f76b08a6c53f70ee480ef1f9413d7143ba36e13b0168f914c5febf81ae
File name: Pilsu.exe
Detection ratio: 20 / 55
Analysis date: 2016-12-13 18:19:07 UTC ( 2 years, 4 months ago ) View latest
Antivirus Result Update
AegisLab Uds.Dangerousobject.Multi!c 20161213
ALYac Trojan.Downloader.Andromeda 20161213
AVG PSW.Generic13.SFM 20161213
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9999 20161207
Bkav HW32.Packed.61BE 20161213
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20161024
ESET-NOD32 Win32/PSW.Papras.EJ 20161213
Ikarus Trojan.Win32.PSW 20161213
Sophos ML virus.win32.ramnit.ah 20161202
K7GW Password-Stealer ( 004cd4f51 ) 20161213
Kaspersky Trojan.Win32.Bublik.eula 20161213
McAfee Generic PWS.o 20161213
McAfee-GW-Edition Generic PWS.o 20161213
Microsoft Backdoor:Win32/Vawtrak.E 20161213
Qihoo-360 HEUR/QVM20.1.C78B.Malware.Gen 20161213
Rising Trojan.Bublik!8.2E1-j8pdv63eAfD (cloud) 20161213
Sophos AV Troj/Vawtrak-IB 20161213
Symantec Trojan.Snifula.F 20161213
TrendMicro BKDR_VAWTRAK.YUYAMN 20161213
TrendMicro-HouseCall BKDR_VAWTRAK.YUYAMN 20161213
Ad-Aware 20161213
AhnLab-V3 20161213
Alibaba 20161213
Antiy-AVL 20161213
Arcabit 20161213
AVware 20161213
BitDefender 20161213
CAT-QuickHeal 20161213
ClamAV 20161213
CMC 20161213
Comodo 20161213
Cyren 20161213
DrWeb 20161213
Emsisoft 20161213
F-Prot 20161213
F-Secure 20161213
Fortinet 20161213
GData 20161213
Jiangmin 20161213
K7AntiVirus 20161213
Kingsoft 20161213
Malwarebytes 20161213
eScan 20161213
NANO-Antivirus 20161213
nProtect 20161213
Panda 20161213
SUPERAntiSpyware 20161213
Tencent 20161213
TheHacker 20161212
TotalDefense 20161213
Trustlook 20161213
VBA32 20161213
VIPRE 20161213
ViRobot 20161213
WhiteArmor 20161212
Yandex 20161213
Zillya 20161213
Zoner 20161213
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright © 2005-2015

Product IObit Surfing Protection
File version 1.0.0.3
Description IObit Surfing Protection
Comments This installation was built with Inno Setup.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2015-07-19 21:39:46
Entry Point 0x000045C3
Number of sections 7
PE sections
PE imports
GetStockObject
SetThreadAffinityMask
GetLastError
InitializeCriticalSectionAndSpinCount
CopyFileW
LCMapStringW
DebugActiveProcessStop
LoadLibraryA
GetProcessWorkingSetSize
LoadLibraryW
CreateSemaphoreA
GetVersionExW
VirtualProtect
IsDebuggerPresent
CopyFileA
IsBadWritePtr
CallNamedPipeA
CreateTimerQueue
FlushFileBuffers
GetFileAttributesW
FlushViewOfFile
WaitForSingleObjectEx
QueueUserAPC
Process32Next
GetVolumePathNamesForVolumeNameW
CreatePipe
GetStartupInfoA
GetDateFormatA
SizeofResource
CommConfigDialogW
GetCurrentProcessId
WriteProfileStringA
MapViewOfFileEx
ChangeTimerQueueTimer
ContinueDebugEvent
lstrlenW
GetSystemDefaultLangID
GetLocalTime
FindVolumeMountPointClose
GetProcAddress
GetSystemPowerStatus
AddAtomW
GetCurrentThread
GetTimeFormatW
WriteFile
GetFileSizeEx
GetDefaultCommConfigW
SetFilePointer
DeleteVolumeMountPointW
ReadFile
CreateFileA
lstrcpyA
ResetEvent
GetMailslotInfo
UnlockFile
GetVolumeInformationA
DuplicateHandle
LockFile
ConnectNamedPipe
GetFullPathNameA
MoveFileA
GetProcessAffinityMask
RemoveDirectoryA
LCMapStringA
FindFirstVolumeMountPointW
GlobalHandle
FindAtomA
GetLongPathNameA
MoveFileW
GetFullPathNameW
GetUserGeoID
CloseHandle
ExitProcess
GetModuleHandleA
GetVolumePathNameA
ChangeDisplaySettingsW
GetCursorInfo
LoadBitmapW
EnumDesktopsW
GetClipboardOwner
GetClassInfoA
LoadMenuW
GetClipboardFormatNameA
GrayStringW
GetWindowRect
RegisterClassExW
LoadIconW
IsMenu
IsWindowEnabled
GetWindow
GetSysColor
GetMenuItemID
GetCursorPos
CreatePopupMenu
ShowCaret
GetMenu
OemToCharW
GetKeyNameTextA
GetClassInfoW
GetKeyboardLayoutList
CreateDialogParamA
IsWindow
IsIconic
GetSubMenu
OemToCharA
GetMenuItemCount
GetDesktopWindow
LoadCursorW
IsCharUpperW
GetFocus
LoadAcceleratorsW
GetGUIThreadInfo
DefDlgProcW
getservbyport
WSCUnInstallNameSpace
htonl
getsockopt
send
ntohl
WSAWaitForMultipleEvents
WSACleanup
WSAEnumNetworkEvents
freeaddrinfo
inet_ntoa
connect
getsockname
sendto
WSAResetEvent
getpeername
WSAStringToAddressW
WSCGetProviderPath
WSALookupServiceNextW
WSASend
WSASocketW
_amsg_exit
exit
_wassert
Number of PE resources by type
RT_ICON 6
RT_STRING 6
RT_RCDATA 4
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 9
ENGLISH US 9
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

Comments
This installation was built with Inno Setup.

LinkerVersion
14.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
1.0.0.3

LanguageCode
Neutral

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
172032

EntryPoint
0x45c3

MIMEType
application/octet-stream

LegalCopyright
Copyright 2005-2015

FileVersion
1.0.0.3

TimeStamp
2015:07:19 22:39:46+01:00

FileType
Win32 EXE

PEType
PE32

SubsystemVersion
6.0

ProductVersion
1.3

FileDescription
IObit Surfing Protection

OSVersion
6.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
IObit

CodeSize
22016

ProductName
IObit Surfing Protection

ProductVersionNumber
1.0.0.3

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 3868082e4daa93d34a3fe5d7df9d1d72
SHA1 1db3cfda5d1898b2e3963c07a1451def8d9f595a
SHA256 35fe78f76b08a6c53f70ee480ef1f9413d7143ba36e13b0168f914c5febf81ae
ssdeep
6144:+wa3Kg+6+BKQb80dNIScacfmN+I+U888888888888W88888888888:QKgpC80zIS9t+U888888888888W8888E

authentihash b3b09b890e5395c8cb607fa26eb63e0f1b604a334e5a98d50e09a2804c100315
imphash 422d55f9f62d7b2f227a39c54687077b
File size 250.5 KB ( 256512 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2016-12-12 16:05:55 UTC ( 2 years, 4 months ago )
Last submission 2018-05-18 17:46:43 UTC ( 11 months, 1 week ago )
File names Pilsu.exe
DozvAmpo.exe
inst.exe
artifact-35fe78f76b08a6c53f70ee480ef1f9413d7143ba36e13b0168f914c5febf81ae
HupdElki.exe
BNEDF8.tmp
Xusbo.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
DNS requests
UDP communications