internet download manager 6.19 build 7 patch & 6.xxx.rar

The file internet download manager 6.19 build 7 patch & 6.xxx.rar has been detected as a potentially unwanted program by 27 anti-malware scanners. The file has been seen being downloaded from up.dev-point.com.
MD5:
b19036d77d9e18172a3a0071b79a3c16

SHA-1:
7db1649a20c2a286d7f975b615befa1569d3d421

SHA-256:
99a823f968aabb34a4755b7d3724871798ac32450535a0a1fe75d47ee64b38d7

Scanner detections:
27 / 68

Status:
Potentially unwanted

Analysis date:
4/26/2024 5:20:54 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.Generic.12386426
634

Agnitum Outpost
Riskware.HackTool
7.1.1

AVG
HackTool
2016.0.3112

Bitdefender
Trojan.Generic.12386426
1.0.20.655

Comodo Security
Application.Win32.PatchIDM.~ADP
21693

Emsisoft Anti-Malware
Trojan.Generic.12386426
8.15.05.11.09

ESET NOD32
Win32/HackTool.Patcher.T potentially unsafe (variant)
9.11443

Fortinet FortiGate
Riskware/GamePatcher
5/11/2015

F-Prot
W32/Agent.KFY
v6.4.7.1.166

F-Secure
Trojan.Generic.12386426
11.2015-11-05_2

G Data
Trojan.Generic.12386426
15.5.25

IKARUS anti.virus
not-a-virus.Patch.IDM
t3scan.1.8.9.0

K7 AntiVirus
Trojan
13.202.15527

Malwarebytes
PUP.Hacktool.Patcher
v2015.05.11.09

McAfee
RDN/Generic PUP.z!ed
5600.6768

Microsoft Security Essentials
HackTool:Win32/Patch
1.1.11502.0

MicroWorld eScan
Trojan.Generic.12386426
16.0.0.393

Norman
keygen.X
11.20150511

nProtect
Trojan.Generic.12386426
15.04.07.01

Panda Antivirus
Trj/CI.A
15.05.11.09

Qihoo 360 Security
Trojan.Generic
1.0.0.1015

Quick Heal
HackTool.Patch.r2 (Not a Virus)
5.15.14.00

Sophos
Mal/Agent-ACR
4.98

Trend Micro House Call
CRCK_PATCHER
7.2.131

Trend Micro
CRCK_PATCHER
10.465.11

Vba32 AntiVirus
Backdoor.Xtreme
3.12.26.3

VIPRE Antivirus
Trojan.Win32.Generic
39176

File size:
383.3 KB (392,465 bytes)

Common path:
C:\users\{user}\downloads\internet download manager 6.19 build 7 patch & 6.xxx.rar

The file internet download manager 6.19 build 7 patch & 6.xxx.rar has been seen being distributed by the following URL.