0pljatvnq1.exe

4274_2sq_oursurfing

Shulan Hou

The application 0pljatvnq1.exe, “Windows GUI symbolic debugger” by Shulan Hou has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. This is a setup program which is used to install the application. It is also typically executed from the user's temporary directory. The file has been seen being downloaded from d2drfrdurj6mvo.cloudfront.net.
Publisher:
Windows GUI symbolic debugger  (signed by Shulan Hou)

Product:
4274_2sq_oursurfing

Description:
Windows GUI symbolic debugger

Version:
6.3.7700.1021

MD5:
c95135587f5cd86d5a67eeca2787e3aa

SHA-1:
2909ad7d76768736ebf23013aa8195f79380e821

SHA-256:
d2c59a23c7a7ec87812d1bdc0c6a9656c821326e6b67510767258dfe8eef1cea

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
5/16/2024 8:46:51 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.ELEX.ShulanHou (M)
15.8.11.19

File size:
446.1 KB (456,800 bytes)

Product version:
6.3.7700.1021

Copyright:
Windows GUI symbolic debugger

Original file name:
Debuger.exe

File type:
Executable application (Win32 EXE)

Language:
Ingilizce (Birlesik Krallik)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\0pljatvnq1.exe

Digital Signature
Signed by:

Authority:
DigiCert Inc

Valid from:
12/24/2014 2:00:00 AM

Valid to:
1/6/2016 2:00:00 PM

Subject:
CN=Shulan Hou, O=Shulan Hou, L=Dingzhou, S=Hebei, C=CN

Issuer:
CN=DigiCert SHA2 Assured ID Code Signing CA, OU=www.digicert.com, O=DigiCert Inc, C=US

Serial number:
0F53BEA8A702FF6F4D98547A190C3464

File PE Metadata
Compilation timestamp:
8/11/2015 5:41:58 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
3072:uiX05p7fYAkIEHE4fFxG2iE5/6l9rhiUdf0y4i7fFxG2iEc/6l9rhAUYEHEtPf6J:hX05h5d7Zrzuili7kqoRq1kpVa8

Entry address:
0x3763D

Entry point:
E8, C0, BA, 00, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 56, 8B, 75, 08, 83, 3C, F5, 30, 11, 46, 00, 00, 75, 13, 56, E8, 71, 00, 00, 00, 59, 85, C0, 75, 08, 6A, 11, E8, 07, FB, FF, FF, 59, FF, 34, F5, 30, 11, 46, 00, FF, 15, 24, E1, 44, 00, 5E, 5D, C3, 56, 57, BE, 30, 11, 46, 00, 8B, FE, 53, 8B, 1F, 85, DB, 74, 17, 83, 7F, 04, 01, 74, 11, 53, FF, 15, 2C, E1, 44, 00, 53, E8, DC, A6, FF, FF, 83, 27, 00, 59, 83, C7, 08, 81, FF, 50, 12, 46, 00, 7C, D8, 5B, 83, 3E, 00, 74, 0E, 83, 7E, 04, 01, 75, 08, FF, 36, FF, 15...
 
[+]

Code size:
308 KB (315,392 bytes)

The file 0pljatvnq1.exe has been seen being distributed by the following URL.

Remove 0pljatvnq1.exe - Powered by Reason Core Security