× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: fa670a0f03bdc418327796f9f9605179d27c7355f59ce508d4b4cb37e0ca7a9e
File name: maxtsdm.exe
Detection ratio: 10 / 72
Analysis date: 2019-04-22 08:02:05 UTC ( 1 month ago ) View latest
Antivirus Result Update
Antiy-AVL GrayWare/Win32.MaxSecure 20190419
Avast Win32:PUP-gen [PUP] 20190422
AVG FileRepMalware [PUP] 20190422
DrWeb Program.Unwanted.2262 20190422
eGambit Unsafe.AI_Score_94% 20190422
Endgame malicious (high confidence) 20190403
Ikarus PUA.MaxPCTuner 20190421
Malwarebytes PUP.Optional.MaxSecureSoftware 20190422
Microsoft PUA:Win32/MaxSecure 20190422
VBA32 BScope.Trojan.FakeAlert 20190419
Acronis 20190419
Ad-Aware 20190422
AegisLab 20190422
AhnLab-V3 20190422
Alibaba 20190401
ALYac 20190422
Arcabit 20190422
Avast-Mobile 20190415
Avira (no cloud) 20190422
Baidu 20190318
BitDefender 20190422
Bkav 20190420
CAT-QuickHeal 20190421
ClamAV 20190421
CMC 20190321
Comodo 20190422
CrowdStrike Falcon (ML) 20190212
Cybereason 20190417
Cylance 20190422
Cyren 20190422
Emsisoft 20190422
ESET-NOD32 20190422
F-Prot 20190422
F-Secure 20190421
FireEye 20190422
Fortinet 20190422
GData 20190422
Sophos ML 20190313
Jiangmin 20190422
K7AntiVirus 20190422
K7GW 20190422
Kaspersky 20190422
Kingsoft 20190422
MAX 20190422
MaxSecure 20190420
McAfee 20190422
McAfee-GW-Edition 20190422
eScan 20190422
NANO-Antivirus 20190422
Palo Alto Networks (Known Signatures) 20190422
Panda 20190421
Qihoo-360 20190422
Rising 20190422
SentinelOne (Static ML) 20190420
Sophos AV 20190422
SUPERAntiSpyware 20190418
Symantec 20190422
Symantec Mobile Insight 20190418
TACHYON 20190422
Tencent 20190422
TheHacker 20190421
TotalDefense 20190416
Trapmine 20190325
TrendMicro 20190422
TrendMicro-HouseCall 20190422
Trustlook 20190422
VIPRE 20190422
ViRobot 20190422
Webroot 20190422
Yandex 20190419
Zillya 20190419
ZoneAlarm by Check Point 20190422
Zoner 20190421
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
(c) Max Secure Software. All rights reserved.

Product Max Secure Software DownloadManager Application
Original name DownloadManager.exe
Internal name DownloadManager.exe
File version 1.0.0.1
Description Max Secure Software DownloadManager Application
Comments Download component used for downloading Products
Signature verification Signed file, verified signature
Signing date 8:06 AM 7/26/2018
Signers
[+] Max Secure Software India Private Ltd.
Status Valid
Issuer GlobalSign Extended Validation CodeSigning CA - SHA256 - G3
Valid from 09:13 AM 07/17/2018
Valid to 07:08 AM 09/23/2019
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint A853EA59BBEB83336BB28EFC71A89C9F9762B3F6
Serial number 4C 3B 78 BE A2 07 5C 50 FA 9B 98 F3
[+] GlobalSign Extended Validation CodeSigning CA - SHA256 - G3
Status Valid
Issuer GlobalSign
Valid from 12:00 AM 06/15/2016
Valid to 12:00 AM 06/15/2024
Valid usage Code Signing, OCSP Signing
Algorithm sha256RSA
Thumbprint 87A63D9ADB627D777836153C680A3DFCF27DE90C
Serial number 48 1B 6A 07 A9 42 4C 1E AA FE F3 CD F1 0F
[+] GlobalSign
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer GlobalSign Root CA
Valid from 10:00 AM 11/18/2009
Valid to 10:00 AM 03/18/2019
Valid usage All
Algorithm sha256RSA
Thumbprint 4765557AF418C68A641199146A7E556AA8242996
Serial number 04 00 00 00 00 01 25 07 1D F9 AF
[+] GlobalSign Root CA - R1
Status Valid
Issuer GlobalSign Root CA
Valid from 12:00 PM 09/01/1998
Valid to 12:00 PM 01/28/2028
Valid usage Server Auth, Client Auth, Code Signing, Email Protection, Timestamp Signing, OCSP Signing, EFS, IPSEC Tunnel, IPSEC User, IPSEC IKE Intermediate
Algorithm sha1RSA
Thumbprint B1BC968BD4F49D622AA89A81F2150152A41D829C
Serial number 04 00 00 00 00 01 15 4B 5A C3 94
Counter signers
[+] GlobalSign TSA for MS Authenticode - G2
Status Valid
Issuer GlobalSign Timestamping CA - G2
Valid from 12:00 AM 05/24/2016
Valid to 12:00 AM 06/24/2027
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 63B82FAB61F583909695050B00249C502933EC79
Serial number 11 21 D6 99 A7 64 97 3E F1 F8 42 7E E9 19 CC 53 41 14
[+] GlobalSign Timestamping CA - G2
Status Valid
Issuer GlobalSign Root CA
Valid from 10:00 AM 04/13/2011
Valid to 12:00 PM 01/28/2028
Valid usage All
Algorithm sha1RSA
Thumbrint C0E49D2D7D90A5CD427F02D9125694D5D6EC5B71
Serial number 04 00 00 00 00 01 2F 4E E1 52 D7
[+] GlobalSign Root CA - R1
Status Valid
Issuer GlobalSign Root CA
Valid from 12:00 PM 09/01/1998
Valid to 12:00 PM 01/28/2028
Valid usage Server Auth, Client Auth, Code Signing, Email Protection, Timestamp Signing, OCSP Signing, EFS, IPSEC Tunnel, IPSEC User, IPSEC IKE Intermediate
Algorithm sha1RSA
Thumbrint B1BC968BD4F49D622AA89A81F2150152A41D829C
Serial number 04 00 00 00 00 01 15 4B 5A C3 94
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-07-26 07:03:59
Entry Point 0x00032BFC
Number of sections 5
PE sections
Overlays
MD5 8a743dfc7dec47d6149b326d79714f6d
File type data
Offset 567296
Size 15320
Entropy 7.39
PE imports
RegCreateKeyExW
RegDeleteValueW
RegCloseKey
RegSetValueExW
RegOpenKeyExW
RegEnumKeyW
RegOpenKeyW
RegDeleteKeyW
RegQueryValueExW
RegQueryValueW
InitCommonControlsEx
_TrackMouseEvent
GetFileTitleW
GetWindowExtEx
SetMapMode
TextOutW
CreateFontIndirectW
SetBkMode
GetRgnBox
SaveDC
CreateRectRgnIndirect
CombineRgn
GetClipBox
GetPixel
GetDeviceCaps
OffsetViewportOrgEx
DeleteDC
RestoreDC
GetMapMode
DeleteObject
GetObjectW
BitBlt
SetTextColor
ExtTextOutW
CreateBitmap
RectVisible
EnumFontFamiliesExW
SetViewportOrgEx
ScaleWindowExtEx
SetBkColor
PtVisible
ExtSelectClipRgn
SelectClipRgn
CreateCompatibleDC
StretchBlt
GetBkColor
ScaleViewportExtEx
CreateRectRgn
SelectObject
SetWindowExtEx
GetTextColor
CreateSolidBrush
SetViewportExtEx
GetStockObject
Escape
GetViewportExtEx
GetTextExtentPoint32W
CreateCompatibleBitmap
GetStdHandle
GetConsoleOutputCP
ReleaseMutex
FileTimeToSystemTime
WaitForSingleObject
GetDriveTypeA
GetFileAttributesW
lstrcmpW
GetLocalTime
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
LocalAlloc
GetVolumeInformationW
SetErrorMode
FreeEnvironmentStringsW
GetLocaleInfoW
EnumResourceLanguagesW
GetFileTime
WideCharToMultiByte
GetStringTypeA
GetSystemTimeAsFileTime
InterlockedExchange
WriteFile
SetStdHandle
HeapReAlloc
GetStringTypeW
FreeLibrary
LocalFree
FormatMessageW
ResumeThread
InitializeCriticalSection
OutputDebugStringW
GlobalHandle
FindClose
TlsGetValue
GetFullPathNameW
GetCurrentThread
SetLastError
DeviceIoControl
GlobalFindAtomW
LoadResource
GetModuleFileNameW
IsDebuggerPresent
ExitProcess
GetVersionExA
GetModuleFileNameA
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
GetPrivateProfileStringW
GetModuleHandleA
SetFileAttributesW
GlobalAddAtomW
CreateThread
SetUnhandledExceptionFilter
ConvertDefaultLocale
CreateMutexW
MulDiv
SetEnvironmentVariableA
TerminateProcess
WriteConsoleA
VirtualQuery
CreateEventW
SetEndOfFile
GetCurrentThreadId
InterlockedIncrement
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
TerminateThread
LoadLibraryW
GetVersionExW
GetOEMCP
QueryPerformanceCounter
GetTickCount
TlsAlloc
VirtualProtect
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetStartupInfoA
UnlockFile
GetFileSize
GlobalDeleteAtom
GetStartupInfoW
GetCPInfo
DeleteFileW
GetProcAddress
GetPrivateProfileIntW
GetProcessHeap
CompareStringW
GetFileSizeEx
GlobalReAlloc
lstrcmpA
FindNextFileW
CreateDirectoryW
CompareStringA
FindFirstFileW
DuplicateHandle
WaitForMultipleObjects
GlobalLock
GlobalAlloc
SetEvent
GetTimeZoneInformation
CreateFileW
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
LeaveCriticalSection
GetLastError
LocalReAlloc
LCMapStringW
GetSystemInfo
lstrlenA
GlobalFree
GetConsoleCP
FindResourceW
LCMapStringA
GetThreadLocale
GetEnvironmentStringsW
GlobalUnlock
LockFile
lstrlenW
FileTimeToLocalFileTime
SizeofResource
GetCurrentProcessId
LockResource
GetCommandLineW
GetCurrentDirectoryA
HeapSize
WritePrivateProfileStringW
SuspendThread
RaiseException
TlsFree
SetFilePointer
ReadFile
GlobalFlags
CloseHandle
GetACP
GetModuleHandleW
FreeResource
IsValidCodePage
HeapCreate
GetTempPathW
VirtualFree
Sleep
VirtualAlloc
ResetEvent
VariantChangeType
VariantTimeToSystemTime
SysStringLen
SystemTimeToVariantTime
SysAllocStringLen
OleCreateFontIndirect
VariantClear
SysAllocString
SafeArrayDestroy
VariantCopy
SysFreeString
VariantInit
Shell_NotifyIconW
ShellExecuteW
ShellExecuteExW
SHGetFolderPathW
PathFindFileNameW
PathFileExistsW
PathIsUNCW
PathFindExtensionW
PathStripToRootW
PathIsDirectoryW
MapWindowPoints
GetForegroundWindow
SetWindowRgn
SetMenuItemBitmaps
LoadBitmapW
DestroyMenu
PostQuitMessage
GetMessagePos
SetWindowPos
IsWindow
GrayStringW
EndPaint
WindowFromPoint
GetMessageTime
SetActiveWindow
GetMenuItemID
GetCursorPos
MapDialogRect
GetDlgCtrlID
GetMenu
UnregisterClassW
GetClassInfoW
DrawTextW
GetNextDlgTabItem
CallNextHookEx
GetClientRect
GetTopWindow
GetWindowTextW
CopyAcceleratorTableW
GetWindowTextLengthW
GetActiveWindow
InvalidateRgn
DestroyWindow
DrawEdge
GetClassInfoExW
UpdateWindow
GetPropW
EqualRect
GetMessageW
ShowWindow
GetNextDlgGroupItem
SetPropW
ValidateRect
PeekMessageW
EnableWindow
CharUpperW
TranslateMessage
IsWindowEnabled
GetWindow
RegisterClassW
IsZoomed
GetWindowPlacement
EnableMenuItem
GetSubMenu
IsDialogMessageW
SetWindowContextHelpId
GetSysColorBrush
CreateWindowExW
TabbedTextOutW
GetWindowLongW
CharNextW
IsChild
SetFocus
RegisterWindowMessageW
IsIconic
BeginPaint
OffsetRect
DefWindowProcW
CopyIcon
KillTimer
GetParent
SendDlgItemMessageA
GetSystemMetrics
SetWindowLongW
GetWindowRect
InflateRect
SetCapture
ReleaseCapture
DrawTextExW
SendDlgItemMessageW
PostMessageW
CheckMenuItem
DrawFocusRect
GetClassLongW
GetLastActivePopup
PtInRect
SetWindowTextW
GetDlgItem
GetMenuCheckMarkDimensions
ClientToScreen
PostThreadMessageW
GetMenuItemCount
GetMenuState
SetWindowsHookExW
LoadCursorW
LoadIconW
GetDC
SetForegroundWindow
CreateDialogIndirectParamW
ReleaseDC
IntersectRect
EndDialog
CopyRect
GetCapture
ScreenToClient
MessageBeep
GetWindowThreadProcessId
DeferWindowPos
BeginDeferWindowPos
MessageBoxW
SendMessageW
UnhookWindowsHookEx
MoveWindow
GetWindowDC
AdjustWindowRectEx
GetSysColor
RegisterClipboardFormatW
GetKeyState
EndDeferWindowPos
SystemParametersInfoA
IsWindowVisible
WinHelpW
GetDesktopWindow
DispatchMessageW
SetRect
InvalidateRect
CallWindowProcW
GetClassNameW
ModifyMenuW
IsRectEmpty
GetFocus
wsprintfW
SetCursor
SetMenu
RemovePropW
WinHttpConnect
WinHttpQueryHeaders
WinHttpReadData
WinHttpCloseHandle
WinHttpQueryDataAvailable
WinHttpCrackUrl
WinHttpAddRequestHeaders
WinHttpReceiveResponse
WinHttpOpen
WinHttpOpenRequest
WinHttpSendRequest
ClosePrinter
DocumentPropertiesW
OpenPrinterW
OleUninitialize
CoUninitialize
CoInitialize
CoTaskMemAlloc
StgCreateDocfileOnILockBytes
OleFlushClipboard
CLSIDFromProgID
CoRevokeClassObject
CoFreeUnusedLibraries
CoRegisterMessageFilter
StgOpenStorageOnILockBytes
OleIsCurrentClipboard
CoTaskMemFree
OleInitialize
CLSIDFromString
CreateILockBytesOnHGlobal
CoGetClassObject
OleUIBusyW
Number of PE resources by type
RT_CURSOR 16
RT_GROUP_CURSOR 15
RT_BITMAP 14
RT_STRING 13
RT_ICON 12
RT_DIALOG 4
RT_GROUP_ICON 3
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 79
PE resources
Debug information
ExifTool file metadata
CodeSize
312832

SubsystemVersion
5.0

Comments
Download component used for downloading Products

LinkerVersion
9.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
1.0.0.1

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Max Secure Software DownloadManager Application

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Windows, Latin1

InitializedDataSize
253440

EntryPoint
0x32bfc

OriginalFileName
DownloadManager.exe

MIMEType
application/octet-stream

LegalCopyright
(c) Max Secure Software. All rights reserved.

FileVersion
1.0.0.1

TimeStamp
2018:07:26 08:03:59+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
DownloadManager.exe

ProductVersion
1.0.0.1

UninitializedDataSize
0

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Max Secure Software

LegalTrademarks
Max Secure Software

ProductName
Max Secure Software DownloadManager Application

ProductVersionNumber
1.0.0.1

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 cb384986622866bba89826085af93f4d
SHA1 e45c964982621cf47c1a98b60bab5ea2df609887
SHA256 fa670a0f03bdc418327796f9f9605179d27c7355f59ce508d4b4cb37e0ca7a9e
ssdeep
12288:68q80hpHZZiVS8P2gnZItUpyXETNB7Nx9szYs:68YpHZkVSrgawTD7dsP

authentihash c14c070859f136703e7cc12da95896c6b6fd1eef7897fa86e30f8ab932e8c732
imphash c9e78fa13df52c18468268be0080112f
File size 569.0 KB ( 582616 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (72.3%)
Win32 Executable (generic) (11.8%)
OS/2 Executable (generic) (5.3%)
Generic Win/DOS Executable (5.2%)
DOS Executable Generic (5.2%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2018-07-28 21:33:09 UTC ( 9 months, 4 weeks ago )
Last submission 2019-05-21 16:46:53 UTC ( 1 day, 16 hours ago )
File names maxtsdm.exe
DownloadManager.exe
MaxTSDM.exe
MaxTSDM.exe
MaxTSDM.exe
maxtsdm.exe
MaxTSDM-CB384986622866BBA89826085AF93F4D.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Created mutexes
Searched windows
Hooking activity
Runtime DLLs
Additional details
The file installs an application-defined hook procedure into a hook chain. You would install a hook procedure to monitor the system for certain types of events. These events are associated either with a specific thread or with all threads in the same desktop as the calling thread. This is done making use of the SetWindowsHook Windows API function.