adobe_premiere_pro_cs6_6.0.3_h64_2.03_gb.1635e.exe

MediaMagnet Downloader

Digital Pine LLC

The application adobe_premiere_pro_cs6_6.0.3_h64_2.03_gb.1635e.exe by Digital Pine has been detected as adware by 32 anti-malware scanners. This is a setup program which is used to install the application. According to AVG, this software downloads additional adware offers during setup. The file has been seen being downloaded from rutracker.ws.
Publisher:
Digital Pine, LLC  (signed by Digital Pine LLC)

Product:
MediaMagnet Downloader

Version:
0.1.1.732

MD5:
707e7891ac7d108f34246c2619eaf257

SHA-1:
ba47d2c5b05c493b7b87b7dcc8d5668452d04b63

SHA-256:
1edad66926e1c09c214ef766afd44e06edca08819c840e8608fb92fd868ac816

Scanner detections:
32 / 68

Status:
Adware

Analysis date:
11/24/2024 5:20:24 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Strictor.64373
5736492

AhnLab V3 Security
PUP/Win32.Generic
2015.06.10

Avira AntiVirus
PUA/MediaMagnet.Gen4
8.3.1.6

Arcabit
Trojan.Adware.Strictor.DFB75
1.0.0.425

avast!
Win32:PUP-gen [PUP]
150602-1

AVG
Downloader
2016.0.3083

Bitdefender
Gen:Variant.Adware.Strictor.64373
1.0.20.805

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Agent-42001
0.98/20559

Comodo Security
Application.Win32.MediaMagnet.DA
22404

Dr.Web
Adware.Downware.3564
9.0.1.05190

Emsisoft Anti-Malware
Gen:Variant.Adware.Strictor.64373
10.0.0.5366

ESET NOD32
Win32/MediaMagnet.Q potentially unwanted application
7.0.302.0

F-Prot
W32/A-4ff75368
v6.4.7.1.166

F-Secure
Gen:Variant.Adware.Strictor
5.14.151

G Data
Gen:Variant.Adware.Strictor.64373
15.6.25

IKARUS anti.virus
not-a-virus:AdWare.MMag
t3scan.1.9.5.0

K7 AntiVirus
Unwanted-Program
13.204.16193

Kaspersky
not-a-virus:AdWare.Win32.MMag
15.0.0.543

Malwarebytes
PUP.Optional.MediaMagnet.A
v2015.06.10.07

McAfee
Trojan.PUP-CryptMagnet!707E7891AC7D
17.6.569.0

MicroWorld eScan
Gen:Variant.Adware.Strictor.64373
16.0.0.483

NANO AntiVirus
Riskware.Win32.MMag.ddotdm
0.30.24.2086

Norman
Gen:Variant.Adware.Strictor.64373
02.06.2015 14:23:46

nProtect
Trojan-Clicker/W32.MMag.526760.C
15.06.09.01

Panda Antivirus
Trj/Genetic.gen
15.06.10.07

Quick Heal
Adware.MMag.A10
6.15.14.00

Reason Heuristics
PUP.DigitalPine
15.6.10.7

Rising Antivirus
PE:Malware.Downloader!6.1B9D
23.00.65.15608

Sophos
PUA 'MediaMagnet' (of type Adware)
5.15

Vba32 AntiVirus
Downware.MediaMagnet.gen
3.12.26.4

Zillya! Antivirus
Adware.MMag.Win32.3
2.0.0.2216

File size:
514.4 KB (526,760 bytes)

Product version:
0.1.0.0

Copyright:
Copyright © 2013 Digital Pine, LLC

File type:
Executable application (Win32 EXE)

Language:
Russian (Russia)

Common path:
C:\users\{user}\downloads\adobe_premiere_pro_cs6_6.0.3_h64_2.03_gb.1635e.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
7/29/2013 5:00:00 AM

Valid to:
7/30/2014 4:59:59 AM

Subject:
CN=Digital Pine LLC, O=Digital Pine LLC, STREET=6/2 Bibirevskaya str., L=Moscow, S=Moscow region, PostalCode=127549, C=RU

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
75BF21E3DA3613E8FA9E989AB75E8C4F

File PE Metadata
Compilation timestamp:
6/19/2014 7:36:12 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:OOHSBoBv5R9pKZ0jROFqa888888888888W88888888888G7L888888888888W88q:OwSOxYZ01R17ow

Entry address:
0x543D0

Entry point:
55, 8B, EC, 83, C4, F0, 53, B8, A4, F8, 44, 00, E8, 73, 5D, FB, FF, 8B, 1D, 98, 8D, 45, 00, B8, B0, 44, 45, 00, E8, 8B, B2, FB, FF, 8B, 15, 68, 8D, 45, 00, 89, 02, 8B, 15, A8, 7A, 44, 00, 33, C0, E8, EA, 6C, FB, FF, 89, 03, A1, 68, 8D, 45, 00, 8B, 00, BA, B0, 44, 45, 00, E8, 27, B1, FB, FF, E8, B2, EC, FB, FF, B2, 01, E8, 77, 0A, FC, FF, 8B, 13, 89, 42, 18, 8B, 03, 50, 68, A0, 84, 44, 00, A1, 68, 8D, 45, 00, 8B, 00, E8, BE, 14, FC, FF, 8B, 03, 50, 68, 8C, 7E, 44, 00, 8B, 03, 8B, 40, 18, E8, C8, CD, FB, FF...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
331 KB (338,944 bytes)

The file adobe_premiere_pro_cs6_6.0.3_h64_2.03_gb.1635e.exe has been seen being distributed by the following URL.