× Les cookies sont désactivés ! Ce site exige que les cookies soient activés pour fonctionner correctement
SHA256: adc20a3d8a99b4e9e44d0957994fca996ec35c31cc37b3be77985eeb5c032907
Nom du fichier : IDMan.exe
Ratio de détection : 0 / 56
Date d'analyse : 2016-11-11 17:40:26 UTC (il y a 6 mois, 2 semaines) Voir les derniers
Antivirus Résultat Mise à jour
Ad-Aware 20161111
AegisLab 20161111
AhnLab-V3 20161111
Alibaba 20161110
ALYac 20161111
Antiy-AVL 20161111
Arcabit 20161111
Avast 20161111
AVG 20161111
Avira (no cloud) 20161111
AVware 20161111
Baidu 20161111
BitDefender 20161111
Bkav 20161111
CAT-QuickHeal 20161111
ClamAV 20161111
CMC 20161111
Comodo 20161111
CrowdStrike Falcon (ML) 20161024
Cyren 20161111
DrWeb 20161111
Emsisoft 20161111
ESET-NOD32 20161111
F-Prot 20161111
F-Secure 20161111
Fortinet 20161111
GData 20161111
Ikarus 20161111
Invincea 20161018
Jiangmin 20161111
K7AntiVirus 20161111
K7GW 20161111
Kaspersky 20161111
Kingsoft 20161111
Malwarebytes 20161111
McAfee 20161111
McAfee-GW-Edition 20161111
Microsoft 20161111
eScan 20161111
NANO-Antivirus 20161111
nProtect 20161111
Panda 20161111
Qihoo-360 20161111
Rising 20161111
Sophos 20161111
SUPERAntiSpyware 20161110
Symantec 20161111
Tencent 20161111
TheHacker 20161111
TrendMicro 20161111
TrendMicro-HouseCall 20161111
VBA32 20161111
VIPRE 20161111
ViRobot 20161111
Yandex 20161111
Zillya 20161111
Zoner 20161111
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Tonec Inc., Copyright © 1999 - 2016

Product Internet Download Manager (IDM)
Original name IDMan.exe
Internal name Internet Download Manager
File version 6, 26, 9, 2
Description Internet Download Manager (IDM)
Comments http://www.internetdownloadmanager.com
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-11-11 07:17:05
Entry Point 0x001DD95F
Number of sections 4
PE sections
Overlays
MD5 c484a42618d6ddf95220f4645e5b8257
File type ASCII text
Offset 3985408
Size 56
Entropy 4.52
PE imports
RegDeleteKeyA
RegCreateKeyExW
LookupPrivilegeValueA
RegCloseKey
RegCreateKeyExA
OpenServiceA
GetUserNameA
RegQueryValueExA
AdjustTokenPrivileges
RegNotifyChangeKeyValue
RegQueryValueExW
CloseServiceHandle
RegFlushKey
GetSidSubAuthority
OpenProcessToken
SetTokenInformation
RegEnumKeyA
RegEnumValueA
GetTokenInformation
DuplicateTokenEx
RegLoadKeyA
RegRestoreKeyA
GetUserNameW
RegOpenKeyExA
GetSidSubAuthorityCount
GetLengthSid
RegEnumKeyExA
RegQueryInfoKeyA
CreateProcessAsUserW
RegDeleteValueW
RegSaveKeyA
RegSetValueExW
RegSetValueExA
RegDeleteValueA
OpenSCManagerA
PropertySheetA
ImageList_BeginDrag
ImageList_Destroy
ImageList_AddMasked
ImageList_Create
ImageList_Draw
DestroyPropertySheetPage
ImageList_DragLeave
ImageList_DragShowNolock
ImageList_DragMove
ImageList_Remove
Ord(17)
ImageList_EndDrag
ImageList_GetIcon
CreatePropertySheetPageA
Ord(8)
ImageList_DragEnter
ImageList_Add
GetWindowExtEx
SetMapMode
CreateFontIndirectW
SetBkMode
PatBlt
SetStretchBltMode
SaveDC
TextOutA
CreateFontIndirectA
GetTextMetricsA
CreateRectRgnIndirect
LPtoDP
CombineRgn
GetClipBox
GetObjectA
SetViewportExtEx
CreateCompatibleDC
DeleteDC
RestoreDC
GetMapMode
SelectObject
IntersectClipRect
BitBlt
GetCharWidthA
CreateDIBSection
SetTextColor
CreatePatternBrush
GetDeviceCaps
CreateFontA
ExcludeClipRect
CreateBitmap
RectVisible
GetStockObject
CreateDIBitmap
SetViewportOrgEx
ScaleWindowExtEx
SetBkColor
ExtTextOutA
PtVisible
GetDIBits
GetTextExtentPointA
SelectClipRgn
EnumFontFamiliesExA
StretchBlt
StretchDIBits
ScaleViewportExtEx
OffsetViewportOrgEx
CreateRectRgn
DeleteObject
GetTextExtentPoint32A
CreateCompatibleBitmap
SetWindowExtEx
GetTextColor
CreateSolidBrush
DPtoLP
Escape
GetViewportExtEx
CopyMetaFileA
GetBkColor
SetRectRgn
GetStdHandle
GetDriveTypeW
ReleaseMutex
FileTimeToSystemTime
CreateWaitableTimerA
GetFileAttributesA
WaitForSingleObject
HeapDestroy
GetFileAttributesW
GetLocalTime
FreeEnvironmentStringsA
DeleteCriticalSection
HeapReAlloc
GetLocaleInfoA
LocalAlloc
lstrcatA
UnhandledExceptionFilter
SetErrorMode
GetFileInformationByHandle
SetStdHandle
GetFileTime
FindResourceExA
GetCPInfo
LoadLibraryW
GetStringTypeA
GetDiskFreeSpaceW
WriteFile
GetSystemTimeAsFileTime
GetDiskFreeSpaceA
GetStringTypeW
GetFullPathNameA
SetEvent
LocalFree
MoveFileA
ResumeThread
GetExitCodeProcess
GetEnvironmentVariableA
LoadResource
GlobalHandle
FindClose
TlsGetValue
GetProfileIntA
SetFileAttributesW
SetLastError
PeekNamedPipe
DeviceIoControl
InitializeCriticalSection
CopyFileW
GetUserDefaultLangID
RemoveDirectoryW
GlobalFindAtomA
HeapAlloc
GetVersionExA
RemoveDirectoryA
GetVolumeInformationA
SetThreadPriority
GetVolumeInformationW
InterlockedDecrement
MultiByteToWideChar
MoveFileW
CreateMutexA
SetFilePointer
CreateThread
SetEnvironmentVariableW
MoveFileExW
GetSystemDirectoryW
GlobalAddAtomA
SetUnhandledExceptionFilter
GetCurrentProcess
MulDiv
ExitThread
SetEnvironmentVariableA
TerminateProcess
GetVersion
SetCurrentDirectoryW
GlobalAlloc
SetEndOfFile
SetWaitableTimer
LeaveCriticalSection
SetCurrentDirectoryA
CloseHandle
HeapFree
EnterCriticalSection
GetSystemTime
SetHandleCount
lstrcmpiA
GetOEMCP
GetTickCount
IsBadWritePtr
TlsAlloc
VirtualProtect
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetSystemDirectoryA
FreeLibrary
GlobalSize
GetStartupInfoA
UnlockFile
GetWindowsDirectoryW
GetFileSize
GlobalDeleteAtom
OpenProcess
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
SetFileAttributesA
CreateDirectoryW
DeleteFileW
WaitForMultipleObjects
GetProcessHeap
CompareStringW
GlobalReAlloc
GetModuleFileNameW
FreeEnvironmentStringsW
lstrcmpA
FindFirstFileA
FormatMessageA
lstrcpyA
GetProfileStringA
CompareStringA
GetComputerNameA
FindFirstFileW
DuplicateHandle
GetProcAddress
GetModuleFileNameA
GetTimeZoneInformation
CreateFileW
CreateEventA
CopyFileA
GetFileType
TlsSetValue
CreateFileA
ExitProcess
InterlockedIncrement
GetLastError
LocalReAlloc
SystemTimeToFileTime
LCMapStringW
UnmapViewOfFile
GetSystemInfo
lstrlenA
GlobalFree
LCMapStringA
GlobalGetAtomNameA
GetThreadLocale
GetEnvironmentStringsW
GlobalUnlock
LockFile
lstrlenW
CreateProcessW
CancelWaitableTimer
FileTimeToLocalFileTime
GetEnvironmentStrings
GetCurrentDirectoryW
WritePrivateProfileStringA
GetCurrentProcessId
LockResource
SetFileTime
GetCurrentDirectoryA
HeapSize
GetCommandLineA
GetCurrentThread
OpenMutexA
SuspendThread
GetSystemDefaultLangID
RaiseException
MapViewOfFile
TlsFree
GetModuleHandleA
ReadFile
GlobalFlags
FindNextFileW
lstrcpynA
GetACP
GlobalLock
GetCurrentThreadId
SetThreadExecutionState
GetFileAttributesExW
SizeofResource
CreateProcessA
WideCharToMultiByte
CompareFileTime
HeapCreate
SleepEx
VirtualFree
CreateFileMappingA
Sleep
IsBadReadPtr
GetProcessVersion
IsBadCodePtr
FindResourceA
VirtualAlloc
ResetEvent
VariantChangeType
VariantTimeToSystemTime
SafeArrayGetUBound
SysAllocStringLen
SysStringLen
VariantClear
SysAllocString
VariantCopy
LoadTypeLibEx
SafeArrayGetLBound
LoadTypeLib
SysFreeString
SysAllocStringByteLen
VariantInit
SafeArrayGetElement
Ord(253)
Ord(251)
SHGetFileInfoA
ShellExecuteExA
SHBrowseForFolderA
SHBrowseForFolderW
SHFileOperationW
ShellExecuteW
SHGetPathFromIDListW
FindExecutableW
ShellExecuteExW
SHGetFileInfoW
SHGetDesktopFolder
SHGetPathFromIDListA
SHFileOperationA
SHGetMalloc
ShellExecuteA
Shell_NotifyIconA
SetFocus
RegisterClipboardFormatA
GetMessagePos
SetMenuItemBitmaps
DrawStateA
MoveWindow
DestroyMenu
PostQuitMessage
GetForegroundWindow
LoadBitmapA
SetWindowPos
IsWindow
SetTimer
DispatchMessageA
EndPaint
GrayStringA
WindowFromPoint
CopyRect
GetMessageTime
SetActiveWindow
GetMenuItemID
GetAsyncKeyState
DrawTextA
GetDlgCtrlID
GetClassInfoA
GetMenu
UnregisterClassA
IsClipboardFormatAvailable
SendMessageA
GetClientRect
DrawTextW
CopyAcceleratorTableA
GetNextDlgTabItem
CallNextHookEx
GetWindowTextLengthA
LoadImageW
GetTopWindow
GetWindowTextW
LockWindowUpdate
GetWindowTextLengthW
MsgWaitForMultipleObjects
GetActiveWindow
GetWindowTextA
DestroyWindow
GetMessageA
GetParent
UpdateWindow
SetPropA
EqualRect
EnumWindows
ExcludeUpdateRgn
ShowWindow
DrawFrameControl
GetNextDlgGroupItem
ValidateRect
EnableWindow
LoadImageA
GetDlgItemTextA
PeekMessageA
TranslateMessage
IsWindowEnabled
GetWindow
CharUpperA
LoadStringA
SetParent
GetWindowPlacement
IsIconic
RegisterClassA
TabbedTextOutA
GetWindowLongA
CreateWindowExA
FillRect
CharNextA
GetSysColorBrush
IsWindowUnicode
CreateWindowExW
ReleaseDC
GetSubMenu
IsChild
IsDialogMessageA
MapWindowPoints
PostMessageA
BeginPaint
OffsetRect
DefWindowProcW
DrawIcon
CopyIcon
ShowCaret
KillTimer
RegisterWindowMessageA
DefWindowProcA
CheckMenuRadioItem
SetClipboardViewer
SendDlgItemMessageA
GetSystemMetrics
EnableMenuItem
GetWindowRect
InflateRect
SetCapture
ReleaseCapture
SetWindowLongA
IsRectEmpty
InvalidateRect
CreateDialogParamW
RemovePropA
CreatePopupMenu
CheckMenuItem
DrawFocusRect
GetLastActivePopup
PtInRect
DrawIconEx
SetWindowTextW
GetDCEx
GetDlgItem
GetMenuCheckMarkDimensions
CreateDialogParamA
ClientToScreen
GetClassLongA
GetCapture
LoadCursorA
LoadIconA
TrackPopupMenu
SetWindowsHookExA
GetMenuItemCount
GetMenuState
GetDC
SetForegroundWindow
ExitWindowsEx
PostThreadMessageA
GetCursorPos
MapDialogRect
IntersectRect
EndDialog
HideCaret
SetWindowContextHelpId
CreateDialogIndirectParamA
ScreenToClient
FindWindowA
MessageBeep
RemoveMenu
GetWindowThreadProcessId
DeferWindowPos
BeginDeferWindowPos
MessageBoxW
SendMessageW
GetPropA
UnhookWindowsHookEx
SetDlgItemTextA
SetRectEmpty
MessageBoxA
AppendMenuW
GetWindowDC
ChangeClipboardChain
AdjustWindowRectEx
GetSysColor
SetDlgItemTextW
GetKeyState
EndDeferWindowPos
SystemParametersInfoA
DestroyIcon
IsWindowVisible
GetDesktopWindow
SetCursorPos
SystemParametersInfoW
WinHelpA
UnionRect
FrameRect
SetRect
DeleteMenu
AppendMenuA
wsprintfA
SetWindowTextA
DefDlgProcA
ModifyMenuW
CallWindowProcA
GetClassNameA
GetFocus
wsprintfW
ModifyMenuA
SetCursor
InternetCanonicalizeUrlW
InternetSetCookieA
InternetCombineUrlA
InternetGetCookieA
GetUrlCacheEntryInfoW
InternetCanonicalizeUrlA
InternetCrackUrlA
htonl
accept
ioctlsocket
WSAStartup
connect
getsockname
htons
select
getsockopt
closesocket
ntohl
inet_addr
send
ntohs
WSAGetLastError
listen
__WSAFDIsSet
WSACleanup
gethostbyname
WSASetLastError
recv
socket
bind
GetOpenFileNameA
GetFileTitleA
GetSaveFileNameW
GetSaveFileNameA
OleUninitialize
CoUninitialize
DoDragDrop
StgOpenStorageOnILockBytes
StringFromGUID2
CoSetProxyBlanket
CreateStreamOnHGlobal
OleFlushClipboard
ReleaseStgMedium
RegisterDragDrop
RevokeDragDrop
CoRegisterMessageFilter
OleGetClipboard
OleDuplicateData
CLSIDFromString
CreateILockBytesOnHGlobal
CoGetClassObject
CoRegisterClassObject
CoInitialize
OleInitialize
CoLockObjectExternal
CoCreateInstance
CoTaskMemAlloc
CoRevokeClassObject
StgCreateDocfileOnILockBytes
CLSIDFromProgID
CoFreeUnusedLibraries
CoDisconnectObject
CoGetObject
OleIsCurrentClipboard
CoTaskMemFree
Number of PE resources by type
RT_BITMAP 171
RT_DIALOG 98
RT_ICON 40
RT_STRING 32
RT_GROUP_ICON 24
IMAGE 5
Struct(240) 3
Struct(241) 3
RT_MENU 2
RT_CURSOR 2
RT_GROUP_CURSOR 1
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 382
NEUTRAL 1
PE resources
Debug information
ExifTool file metadata
CodeSize
2244608

SubsystemVersion
4.0

Comments
http://www.internetdownloadmanager.com

InitializedDataSize
1761280

ImageVersion
0.0

ProductName
Internet Download Manager (IDM)

FileVersionNumber
6.26.9.2

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Unicode

LinkerVersion
6.0

FileTypeExtension
exe

OriginalFileName
IDMan.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
6, 26, 9, 2

TimeStamp
2016:11:11 08:17:05+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Internet Download Manager

ProductVersion
6, 26, 9, 2

FileDescription
Internet Download Manager (IDM)

OSVersion
4.0

FileOS
Win32

LegalCopyright
Tonec Inc., Copyright 1999 - 2016

MachineType
Intel 386 or later, and compatibles

CompanyName
Tonec Inc.

LegalTrademarks
Internet Download Manager

FileSubtype
0

ProductVersionNumber
6.26.9.2

EntryPoint
0x1dd95f

ObjectFileType
Executable application

File identification
MD5 2ffaaff684f12bf6cb6a11b0463f7ba9
SHA1 70ea9621ab13fc0e490442190eb329000f56c631
SHA256 adc20a3d8a99b4e9e44d0957994fca996ec35c31cc37b3be77985eeb5c032907
ssdeep
49152:oR33dkA0bN5iQ1ZxLTxN8Ti1WucwUm4NprqMPwa1D17n8Ti7:oRebPhbLTR1WucwVMPnJb8Ty

authentihash 4dab2bf039e24d14f1b8f9d1d0b7e544c024a1c8db13f6957e79cb998f294ab1
imphash 33b4eee1b3b270c9d6a5ba1accc8d02d
File size 3.8 MB ( 3985464 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (46.3%)
Win64 Executable (generic) (41.0%)
Win32 Executable (generic) (6.6%)
Generic Win/DOS Executable (2.9%)
DOS Executable Generic (2.9%)
Tags
peexe overlay

VirusTotal metadata
First submission 2016-11-11 17:40:26 UTC (il y a 6 mois, 2 semaines)
Last submission 2017-05-18 13:43:53 UTC (il y a 1 semaine, 3 jours)
Noms du fichier idman.exe
IDMan.exe
B
IDMan.exe
IDMan.exe
IDMan.exe
Man.exe
IDMan.exe
Internet Download Manager
idman.exe
idman.exe
setup.exe
IDMan.exe
IDMan.exe
idman.exe
2ffaaff684f12bf6cb6a11b0463f7ba9_mark_2.exe
IDMan.exe
Aucun commentaire. Aucun membre de la communauté VirusTotal n'a encore commenté cet élément, soyez le premier à le faire !

Laissez votre commentaire...

?
Poster un commentaire

Vous n'êtes pas connecté. Seuls les utilisateurs enregistrés peuvent laisser des commentaires, connectez-vous pour commenter !

Aucun vote. Personne n'a encore voté pour cet élément, soyez le premier à le faire !
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Created processes
Code injections in the following processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
UDP communications