× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 7a1cf9f5310ba36fb659d2324329591ab9e299458320b8179958a0af47365dae
File name: Adobe Download Manager
Detection ratio: 51 / 67
Analysis date: 2019-04-09 05:34:15 UTC ( 2 weeks, 2 days ago )
Antivirus Result Update
Ad-Aware Trojan.GenericKD.40758055 20190409
AegisLab Trojan.Win32.Propagate.4!c 20190409
AhnLab-V3 Malware/Win32.Generic.C2835063 20190408
Alibaba TrojanDownloader:Win32/Propagate.f84e0574 20190402
ALYac Trojan.SmokeLoader 20190409
Antiy-AVL Trojan[Ransom]/Win32.Blocker 20190409
Arcabit Trojan.Generic.D26DEB27 20190409
Avast Win32:Trojan-gen 20190409
AVG Win32:Trojan-gen 20190409
Avira (no cloud) TR/Crypt.XPACK.stnkw 20190408
BitDefender Trojan.GenericKD.40758055 20190409
CAT-QuickHeal Trojan.Propagate 20190407
Comodo Malware@#wa5gep61p0sw 20190409
Cybereason malicious.433331 20190403
Cyren W32/Trojan.VMBI-5143 20190409
DrWeb Trojan.PWS.Spy.21017 20190409
Emsisoft Trojan.Agent (A) 20190409
Endgame malicious (high confidence) 20190403
ESET-NOD32 Win32/TrojanDownloader.Zurgop.DA 20190409
F-Secure Trojan.TR/Crypt.XPACK.stnkw 20190408
FireEye Trojan.GenericKD.40758055 20190409
Fortinet W32/GenKryptik.CKDY!tr.ransom 20190409
GData Win32.Trojan-Downloader.SmokeLoader.YERLSQ 20190409
Ikarus Trojan.Inject 20190408
Sophos ML heuristic 20190313
K7AntiVirus Trojan ( 0053fb461 ) 20190409
K7GW Trojan ( 0053fb461 ) 20190409
Kaspersky Trojan.Win32.Propagate.bki 20190409
Malwarebytes Trojan.SmokeLoader 20190409
MAX malware (ai score=100) 20190409
McAfee Generic.buk 20190409
McAfee-GW-Edition Generic.buk 20190409
Microsoft VirTool:Win32/CeeInject.BDE!bit 20190409
eScan Trojan.GenericKD.40758055 20190409
NANO-Antivirus Trojan.Win32.Propagate.fkejop 20190409
Palo Alto Networks (Known Signatures) generic.ml 20190409
Panda Trj/WLT.E 20190408
Qihoo-360 Win32/Trojan.dfe 20190409
Rising Trojan.Win32.Generic.1A0C1432 (RDM+:cmRtazooJaacqvsVzRqLkZ87NOqF) 20190409
Sophos AV Mal/Generic-L 20190409
TACHYON Trojan/W32.Propagate.917504 20190409
Tencent Win32.Trojan.Inject.Auto 20190409
Trapmine malicious.high.ml.score 20190325
TrendMicro-HouseCall TROJ_GEN.R002C0DKF18 20190409
VBA32 BScope.TrojanPSW.Azorult 20190408
VIPRE Trojan.Win32.Generic!BT 20190409
ViRobot Trojan.Win32.Agent.917504.L 20190409
Yandex Trojan.Propagate! 20190408
Zillya Trojan.Azorult.Win32.18 20190408
ZoneAlarm by Check Point Trojan.Win32.Propagate.bki 20190409
Zoner Trojan.Win32.72599 20190409
Acronis 20190409
Avast-Mobile 20190408
Babable 20180918
Baidu 20190318
Bkav 20190408
ClamAV 20190408
CMC 20190321
CrowdStrike Falcon (ML) 20190212
eGambit 20190409
Jiangmin 20190409
Kingsoft 20190409
SentinelOne (Static ML) 20190407
SUPERAntiSpyware 20190404
Symantec Mobile Insight 20190408
TheHacker 20190405
TotalDefense 20190408
Trustlook 20190409
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright 2015 Adobe Systems Incorporated. All rights reserved.

Product Adobe Download Manager
Original name Adobe Download Manager
Internal name Adobe Download Manager
File version 2.0.0.269s
Description Adobe Download Manager
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-12-06 11:24:33
Entry Point 0x0000A41C
Number of sections 5
PE sections
PE imports
RegOpenKeyExA
RegSetValueExA
RegCloseKey
RegCreateKeyExA
AddFontResourceA
SetMapMode
PatBlt
SaveDC
TextOutA
CreateFontIndirectA
GetClipBox
GetDeviceCaps
OffsetViewportOrgEx
DeleteDC
RestoreDC
SetBkMode
DeleteObject
IntersectClipRect
BitBlt
SetTextColor
GetObjectA
CreateBitmap
RectVisible
GetStockObject
CreateDIBitmap
SetViewportOrgEx
ScaleWindowExtEx
ExtTextOutA
PtVisible
GetTextExtentPointA
EnumFontFamiliesExA
ScaleViewportExtEx
RemoveFontResourceA
SelectObject
SetWindowExtEx
CreateSolidBrush
DPtoLP
Escape
SetBkColor
SetViewportExtEx
CreateCompatibleDC
GetStdHandle
FileTimeToSystemTime
GetFileAttributesA
HeapDestroy
IsBadCodePtr
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
LocalAlloc
lstrcatA
SetErrorMode
FreeEnvironmentStringsW
SetStdHandle
GetFileTime
GetCPInfo
GetStringTypeA
InterlockedExchange
WriteFile
HeapReAlloc
GetStringTypeW
GetFullPathNameA
FreeLibrary
LocalFree
InitializeCriticalSection
LoadResource
GlobalHandle
FindClose
TlsGetValue
SetLastError
GlobalFindAtomA
HeapAlloc
FlushFileBuffers
GetModuleFileNameA
GetVolumeInformationA
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
SetFilePointer
GlobalAddAtomA
SetUnhandledExceptionFilter
MulDiv
SetEnvironmentVariableA
TerminateProcess
GlobalAlloc
SetEndOfFile
GetCurrentThreadId
InterlockedIncrement
HeapFree
EnterCriticalSection
SetHandleCount
lstrcmpiA
GetOEMCP
IsBadWritePtr
TlsAlloc
VirtualProtect
GetVersionExA
LoadLibraryA
RtlUnwind
GetStartupInfoA
UnlockFile
GetFileSize
GlobalDeleteAtom
DeleteFileA
GetWindowsDirectoryA
GlobalLock
CompareStringW
GlobalReAlloc
lstrcmpA
FindFirstFileA
lstrcpyA
GetProfileStringA
CompareStringA
DuplicateHandle
GetProcAddress
GetTimeZoneInformation
GetFileType
TlsSetValue
CreateFileA
ExitProcess
LeaveCriticalSection
GetLastError
LocalReAlloc
LCMapStringW
lstrlenA
GlobalFree
LCMapStringA
GlobalGetAtomNameA
GetEnvironmentStringsW
GlobalUnlock
LockFile
FileTimeToLocalFileTime
GetEnvironmentStrings
WritePrivateProfileStringA
LockResource
WideCharToMultiByte
HeapSize
GetCommandLineA
GetCurrentThread
RaiseException
TlsFree
GetModuleHandleA
ReadFile
GlobalFlags
CloseHandle
lstrcpynA
GetACP
GetVersion
SizeofResource
HeapCreate
VirtualFree
Sleep
IsBadReadPtr
GetProcessVersion
FindResourceA
VirtualAlloc
SetFocus
GetMessagePos
SetMenuItemBitmaps
DestroyMenu
PostQuitMessage
GetForegroundWindow
LoadBitmapA
SetWindowPos
IsWindow
DispatchMessageA
EndPaint
GrayStringA
GetMessageTime
SetActiveWindow
GetDC
GetCursorPos
DrawTextA
GetDlgCtrlID
GetClassInfoA
GetMenu
UnregisterClassA
SendMessageA
GetClientRect
GetNextDlgTabItem
CallNextHookEx
GetWindowTextLengthA
GetActiveWindow
ExcludeUpdateRgn
GetTopWindow
GetWindowTextA
EnumWindowStationsW
DestroyWindow
GetMessageA
GetParent
UpdateWindow
SetPropA
ShowWindow
GetPropA
ValidateRect
EnableWindow
PeekMessageA
TranslateMessage
IsWindowEnabled
GetWindow
CharUpperA
LoadStringA
GetWindowPlacement
EnableMenuItem
RegisterClassA
TabbedTextOutA
GetWindowLongA
CreateWindowExA
CopyRect
GetSysColorBrush
IsWindowUnicode
PtInRect
IsDialogMessageA
MapWindowPoints
BeginPaint
OffsetRect
RegisterWindowMessageA
DefWindowProcA
DrawFocusRect
SendDlgItemMessageA
GetSystemMetrics
IsIconic
GetWindowRect
InflateRect
PostMessageA
DrawIcon
SetWindowLongA
RemovePropA
SetWindowTextA
CheckMenuItem
GetSubMenu
GetLastActivePopup
GetDlgItem
GetMenuCheckMarkDimensions
ClientToScreen
GetClassLongA
CreateDialogIndirectParamA
LoadCursorA
LoadIconA
SetWindowsHookExA
GetMenuItemCount
GetMenuState
GetMenuItemID
SetForegroundWindow
ReleaseDC
IntersectRect
EndDialog
HideCaret
CharNextA
GetCapture
ScreenToClient
ShowCaret
UnhookWindowsHookEx
MessageBoxA
GetWindowDC
AdjustWindowRectEx
GetSysColor
GetKeyState
SystemParametersInfoA
IsWindowVisible
WinHelpA
InvalidateRect
wsprintfA
DefDlgProcA
CallWindowProcA
GetClassNameA
GetFocus
ModifyMenuA
SetCursor
OpenPrinterA
DocumentPropertiesA
ClosePrinter
GetFileTitleA
Number of PE resources by type
RT_STRING 11
RT_ICON 9
RT_BITMAP 4
RT_DIALOG 2
FONTS 2
RT_CURSOR 2
RT_GROUP_CURSOR 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 23
NEUTRAL 10
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
6.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
2.0.0.269

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Adobe Download Manager

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

CharacterSet
Unicode

InitializedDataSize
786432

EntryPoint
0xa41c

OriginalFileName
Adobe Download Manager

MIMEType
application/octet-stream

LegalCopyright
Copyright 2015 Adobe Systems Incorporated. All rights reserved.

FileVersion
2.0.0.269s

TimeStamp
2016:12:06 12:24:33+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Adobe Download Manager

ProductVersion
2.0.0.269s

SubsystemVersion
4.0

OSVersion
4.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Adobe Systems Incorporated

CodeSize
143360

ProductName
Adobe Download Manager

ProductVersionNumber
2.0.0.269

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 2d149b6433331651ece8f65237f13163
SHA1 17dd2ce43cfbda803460bdb312c5db2e75bb62eb
SHA256 7a1cf9f5310ba36fb659d2324329591ab9e299458320b8179958a0af47365dae
ssdeep
6144:bXdpwtyA85HFbtzI6oYE/e69w+oXGq2evCpkp/NfR0e2TrZV14sfiFfuVz0OXjoX:bNpzA4pz5vE/e6CxXGq2erf2zfAa6

authentihash 234ef2b153d8e93b8eb8d0e0474103c14a97a41b187f94177e739002f11de267
imphash 7023b376bde95a1737951316835e8d4f
File size 896.0 KB ( 917504 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (64.5%)
Win32 Dynamic Link Library (generic) (13.6%)
Win32 Executable (generic) (9.3%)
OS/2 Executable (generic) (4.1%)
Generic Win/DOS Executable (4.1%)
Tags
peexe

VirusTotal metadata
First submission 2018-11-14 06:27:39 UTC ( 5 months, 1 week ago )
Last submission 2018-11-16 02:33:37 UTC ( 5 months, 1 week ago )
File names zbetcheckin_tracker_chy.exe
biha.exe
chy.exe
Adobe Download Manager
vcaccueu.exe
7a1cf9f5310ba36fb659d2324329591ab9e299458320b8179958a0af47365dae
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Created processes
Code injections in the following processes
Opened mutexes
Runtime DLLs