idm activator.-mrelhlawany.com.exe

mrelhlawany.com

This is a self-extracting archive and installer. The file has been seen being downloaded from download1459.mediafire.com.
Publisher:
mrelhlawany.com

Description:
idmbasemelhlawany 1.00 Installation

Version:
1.00

MD5:
d21858564f3339a47bc7e295b09d8e19

SHA-1:
9fdb98e45b0d70eaa96f09d72a736217ed91ad86

SHA-256:
e06d368bbbc0e5ad49b01d1a55cb91f346084fd7d6fb7e1180b887845bbb9d5e

Scanner detections:
1 / 68

Status:
Clean  (1 probable false positive detection)

Explanation:
This is mosty likely a false positive detection, the file is probably clean.

Analysis date:
11/27/2024 1:53:12 PM UTC  (today)

Scan engine
Detection
Engine version

Qihoo 360 Security
HEUR/QVM05.1.Malware.Gen
1.0.0.1077

File size:
2 MB (2,095,582 bytes)

Copyright:
mrelhlawany.com

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\idm activator.-mrelhlawany.com.exe

File PE Metadata
Compilation timestamp:
6/19/1992 11:22:17 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
49152:fAI+o3dicL91tj63ecBNApz2jHHLqvaG6rhewE8Sqv/YV7Kqx:fAI+8dicx2uZUv6zIhewE87/k7Ke

Entry address:
0x25468

Entry point:
55, 8B, EC, 83, C4, F0, B8, 88, 53, 42, 00, E8, 24, F2, FD, FF, B8, C8, 54, 42, 00, E8, 2A, 1C, FE, FF, 8B, 15, 40, 88, 42, 00, 89, 02, 8B, 15, 40, 88, 42, 00, 8B, 12, A1, 48, 88, 42, 00, E8, E4, D3, FF, FF, 8B, 15, 40, 88, 42, 00, 8B, 12, A1, DC, 87, 42, 00, E8, 7A, 64, FF, FF, A1, 40, 88, 42, 00, E8, AC, 4E, FE, FF, E8, DF, E0, FD, FF, 00, 00, 00, FF, FF, FF, FF, 01, 00, 00, 00, 2A, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
7.6250

Developed / compiled with:
Microsoft Visual C++

Code size:
145.5 KB (148,992 bytes)

The file idm activator.-mrelhlawany.com.exe has been seen being distributed by the following URL.

Scan idm activator.-mrelhlawany.com.exe - Powered by Reason Core Security