× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 36175133de5e376b6ee8cdd04bea652fcc80443cbbaa857c42e8b909b564cbc9
File name: IDMan622.exe
Detection ratio: 0 / 57
Analysis date: 2015-02-16 20:13:01 UTC ( 3 years, 9 months ago ) View latest
Antivirus Result Update
Ad-Aware 20150216
AegisLab 20150216
Yandex 20150216
AhnLab-V3 20150216
Alibaba 20150216
ALYac 20150216
Antiy-AVL 20150216
Avast 20150216
AVG 20150216
Avira (no cloud) 20150216
AVware 20150216
Baidu-International 20150216
BitDefender 20150216
Bkav 20150213
ByteHero 20150216
CAT-QuickHeal 20150216
ClamAV 20150216
CMC 20150214
Comodo 20150216
Cyren 20150216
DrWeb 20150216
Emsisoft 20150216
ESET-NOD32 20150216
F-Prot 20150216
F-Secure 20150216
Fortinet 20150216
GData 20150216
Ikarus 20150216
Jiangmin 20150216
K7AntiVirus 20150216
K7GW 20150216
Kaspersky 20150216
Kingsoft 20150216
Malwarebytes 20150216
McAfee 20150216
McAfee-GW-Edition 20150215
Microsoft 20150216
eScan 20150216
NANO-Antivirus 20150216
Norman 20150216
nProtect 20150216
Panda 20150216
Qihoo-360 20150216
Rising 20150216
Sophos AV 20150216
SUPERAntiSpyware 20150215
Symantec 20150216
Tencent 20150216
TheHacker 20150216
TotalDefense 20150216
TrendMicro 20150216
TrendMicro-HouseCall 20150216
VBA32 20150216
VIPRE 20150216
ViRobot 20150216
Zillya 20150216
Zoner 20150216
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
(C) 1999-2015. Tonec, Inc. All rights reserved.

Publisher Yanu|CCAV1.COM
Product Internet Download Manager Chinese
File version 6.22.1.1
Description Internet Download Manager Chinese
Comments Internet Download Manager Chinese
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2015-01-02 05:09:31
Entry Point 0x000039F3
Number of sections 6
PE sections
PE imports
RegCreateKeyExW
RegDeleteValueW
RegCloseKey
RegSetValueExW
RegEnumValueW
RegOpenKeyExW
RegEnumKeyW
RegDeleteKeyW
RegQueryValueExW
ImageList_Create
Ord(17)
ImageList_Destroy
ImageList_AddMasked
GetDeviceCaps
CreateFontIndirectW
SetBkMode
CreateBrushIndirect
SelectObject
SetBkColor
DeleteObject
SetTextColor
GetLastError
WriteFile
CopyFileW
GetShortPathNameW
LoadLibraryA
lstrlenA
GetModuleFileNameW
GlobalFree
WaitForSingleObject
GetVersionExW
GetExitCodeProcess
FindFirstFileW
ExitProcess
GlobalUnlock
GetFileAttributesW
lstrlenW
GetCurrentProcess
CompareFileTime
FindNextFileW
GetFileSize
OpenProcess
SetFileTime
GetCommandLineW
GetWindowsDirectoryW
SetErrorMode
MultiByteToWideChar
CreateDirectoryW
SetFilePointer
GlobalLock
GetPrivateProfileStringW
WritePrivateProfileStringW
GetTempFileNameW
lstrcpynW
RemoveDirectoryW
ExpandEnvironmentStringsW
lstrcpyW
GetFullPathNameW
lstrcmpiA
CreateThread
LoadLibraryW
GetModuleHandleA
GetSystemDirectoryW
GetDiskFreeSpaceW
ReadFile
GetTempPathW
CloseHandle
DeleteFileW
lstrcmpA
lstrcmpW
GetModuleHandleW
lstrcatW
lstrcpynA
FreeLibrary
SearchPathW
WideCharToMultiByte
lstrcmpiW
SetCurrentDirectoryW
lstrcpyA
CreateFileW
GlobalAlloc
CreateProcessW
FindClose
Sleep
MoveFileW
SetFileAttributesW
GetTickCount
GetVersion
GetProcAddress
LoadLibraryExW
MulDiv
SHBrowseForFolderW
SHFileOperationW
ShellExecuteW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHGetFileInfoW
EmptyClipboard
GetMessagePos
EndPaint
EndDialog
LoadBitmapW
SetClassLongW
DefWindowProcW
CharPrevW
PostQuitMessage
ShowWindow
SetWindowPos
wvsprintfW
GetSystemMetrics
SetWindowLongW
IsWindow
PeekMessageW
GetWindowRect
EnableWindow
GetDC
CharUpperW
DialogBoxParamW
GetClassInfoW
AppendMenuW
CharNextW
IsWindowEnabled
GetDlgItemTextW
MessageBoxIndirectW
GetSysColor
CheckDlgButton
DispatchMessageW
GetAsyncKeyState
BeginPaint
CreatePopupMenu
SendMessageW
SetCursor
SetClipboardData
GetWindowLongW
FindWindowExW
IsWindowVisible
SetForegroundWindow
SetWindowTextW
GetDlgItem
SystemParametersInfoW
LoadImageW
EnableMenuItem
ScreenToClient
InvalidateRect
CreateDialogParamW
wsprintfA
SetTimer
CallWindowProcW
TrackPopupMenu
RegisterClassW
FillRect
IsDlgButtonChecked
CharNextA
SetDlgItemTextW
LoadCursorW
GetSystemMenu
SendMessageTimeoutW
CreateWindowExW
wsprintfW
CloseClipboard
GetClientRect
DrawTextW
DestroyWindow
ExitWindowsEx
OpenClipboard
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
OleUninitialize
CoTaskMemFree
OleInitialize
CoCreateInstance
Number of PE resources by type
RT_DIALOG 3
RT_ICON 2
RT_GROUP_ICON 1
RT_VERSION 1
RT_MANIFEST 1
Number of PE resources by language
ENGLISH US 7
CHINESE SIMPLIFIED 1
PE resources
ExifTool file metadata
FileDescription
Internet Download Manager Chinese

Comments
Internet Download Manager Chinese

InitializedDataSize
445952

ImageVersion
6.0

ProductName
Internet Download Manager Chinese

FileVersionNumber
6.22.1.1

UninitializedDataSize
16896

LanguageCode
Chinese (Simplified)

FileFlagsMask
0x0000

CharacterSet
Unicode

LinkerVersion
10.0

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
6.22.1.1

TimeStamp
2015:01:02 06:09:31+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
6.22.1.1

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Win32

LegalCopyright
(C) 1999-2015. Tonec, Inc. All rights reserved.

MachineType
Intel 386 or later, and compatibles

CompanyName
Yanu|CCAV1.COM

CodeSize
28672

FileSubtype
0

ProductVersionNumber
6.22.1.1

EntryPoint
0x39f3

ObjectFileType
Executable application

File identification
MD5 04fef108b2d9a1e587c81c43f43a93a0
SHA1 a03f9a2780f2f98177013bda4d4ab3210564e3f7
SHA256 36175133de5e376b6ee8cdd04bea652fcc80443cbbaa857c42e8b909b564cbc9
ssdeep
98304:f9lcHuLPNE2Eu5mo0kNVQbKzp8rcN4ROIWKNbQC9gYme:sAWBuEGHQ+zp8SuOfmQC9gY5

authentihash b1742548a0031bf5fe510330ea8712a640d6e5501fbf9c39cae2f65a857022bf
imphash 32f3282581436269b3a75b6675fe3e08
File size 4.4 MB ( 4636198 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (67.3%)
Win32 Dynamic Link Library (generic) (14.2%)
Win32 Executable (generic) (9.7%)
Generic Win/DOS Executable (4.3%)
DOS Executable Generic (4.3%)
Tags
peexe

VirusTotal metadata
First submission 2015-02-09 13:50:28 UTC ( 3 years, 9 months ago )
Last submission 2015-02-21 22:13:07 UTC ( 3 years, 9 months ago )
File names IDMan622-Yanu.exe
IDMan622.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Copied files
Moved files
Deleted files
Created processes
Shell commands
Created mutexes
Opened mutexes
Searched windows
Runtime DLLs
Additional details
The file uses the IsDebuggerPresent Windows API function in order to see whether it is being debugged.
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.