Did you just run into a file that has a digital signature from IObit Information Technology? If so, please read on.
You will typically see IObit Information Technology when double-clicking to run the file. The publisher name is then displayed as the "Verified publisher" in the UAC dialog as the screengrab shows:
You can also view the IObit Information Technology certificate with the following procedure:
Here is a screenshot of a file signed by IObit Information Technology:
As you can see in the screenshot above, Windows states that "This digital signature is OK". This means that the file has been published by IObit Information Technology and that no one has tampered with the file.
If you click the View Certificate button shown in the screenshot above, you can view all the details of the certificate, such as when it was issued, who issued the certificate, how long it is valid, and so on. You can also view the address for IObit Information Technology, such as the street name, city and country.
VeriSign Class 3 Code Signing 2010 CA, Symantec Class 3 SHA256 Code Signing CA, VeriSign Class 3 Code Signing 2004 CA and VeriSign Class 3 Code Signing 2009-2 CA has issued the IObit Information Technology certificates. You can also examine the details of the issuer by clicking the View Certificate button shown in the screenshot above.
The following are the IObit Information Technology files I've collected, thanks to the FreeFixer users.
Here's the detection names for the IObit Information Technology files. I've grouped the detection names by each scanner engine. Thanks to VirusTotal for the scan results.
Scanner | Detection Names |
---|---|
ByteHero | Trojan-PSW.win32.LdPinch.dq |
CMC | Packed.Win32.Obfuscated.10!O |
DrWeb | Program.Unwanted.276, Program.Unwanted.2520, Program.Unwanted.1183, Program.Unwanted.1182, Program.Unwanted.1479, Program.Unwanted.353, Program.Unwanted.1476, Trojan.PWS.Papras.2682, Program.Unwanted.291, Program.Unwanted.2749, Program.Unwanted.1461, Program.Unwanted.2754 |
Emsisoft | Trojan.Generic.8593680 (B) |
GData | Win32.Adware.iObit.A, Win32.Adware.IObit.A, Win32.Application.iObit.B |
Jiangmin | Trojan/PSW.Agent.gik |
K7AntiVirus | Trojan ( 004bf5cb1 ) |
Malwarebytes | PUP.Optional.AdvancedSystemCare |
Rising | PE:Trojan.Win32.Lethic.d!1075352413 |
TrendMicro-HouseCall | Suspicious_GEN.F47V0413, Suspicious_GEN.F47V0126, Suspicious_GEN.F47V0407, Suspicious_GEN.F47V0505, Suspicious_GEN.F47V0404, Suspicious_GEN.F47V0612, Suspicious_GEN.F47V0330 |
Zillya | Adware.BrowseFox.Win32.305167 |
eGambit | malicious_confidence_64%, PUP.Optional.IObit |
The detection percentage is based on the fact that I have gathered 72421 scan results for the IObit Information Technology files. 1264 of these scan reports came up with some sort of detection. If you like, you can view the full details of the scan results by examining the files listed above.
The analysis has been done on certificates with the following serial numbers:
000 C 500 mg 5 mL Caja x 10 amps <a href=https://enhanceyourlife.mom/>priligy for pe</a> darunavir increases levels of lacosamide by affecting hepatic intestinal enzyme CYP3A4 metabolism
# 12 Oct 2024, 0:28
Monnaitte writes