Overview
overview
8Static
static
新建文....bat
windows7-x64
8新建文....bat
windows10-2004-x64
8新建文....bat
windows7-x64
8新建文....bat
windows10-2004-x64
8新建文...64.dll
windows7-x64
3新建文...64.dll
windows10-2004-x64
3新建文...ll.dll
windows7-x64
1新建文...ll.dll
windows10-2004-x64
1新建文...64.dll
windows7-x64
1新建文...64.dll
windows10-2004-x64
1新建文...CC.dll
windows7-x64
1新建文...CC.dll
windows10-2004-x64
1新建文...64.dll
windows7-x64
1新建文...64.dll
windows10-2004-x64
1新建文...64.exe
windows7-x64
1新建文...64.exe
windows10-2004-x64
1新建文...on.dll
windows7-x64
1新建文...on.dll
windows10-2004-x64
1新建文...64.dll
windows7-x64
1新建文...64.dll
windows10-2004-x64
1新建文...xt.dll
windows7-x64
1新建文...xt.dll
windows10-2004-x64
1新建文...64.dll
windows7-x64
8新建文...64.dll
windows10-2004-x64
8新建文...rs.dll
windows7-x64
3新建文...rs.dll
windows10-2004-x64
3新建文...64.dll
windows7-x64
1新建文...64.dll
windows10-2004-x64
3新建文...xt.vbs
windows7-x64
1新建文...xt.vbs
windows10-2004-x64
1新建文...ll.vbs
windows7-x64
1新建文...ll.vbs
windows10-2004-x64
1Analysis
-
max time kernel
52s -
max time network
58s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
13-10-2022 05:33
Static task
static1
Behavioral task
behavioral1
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/!卸载.bat
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/!卸载.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/!绿化.bat
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/!绿化.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMFType64.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMFType64.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMGetAll.dll
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMGetAll.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMGetAll64.dll
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMGetAll64.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMIECC.dll
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMIECC.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMIECC64.dll
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMIECC64.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMIntegrator64.exe
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMIntegrator64.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMNetMon.dll
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMNetMon.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMNetMon64.dll
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMNetMon64.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral21
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMShellExt.dll
Resource
win7-20220812-en
Behavioral task
behavioral22
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMShellExt.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMShellExt64.dll
Resource
win7-20220812-en
Behavioral task
behavioral24
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMShellExt64.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMVMPrs.dll
Resource
win7-20220812-en
Behavioral task
behavioral26
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMVMPrs.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMVMPrs64.dll
Resource
win7-20220812-en
Behavioral task
behavioral28
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMVMPrs64.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral29
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IEExt.vbs
Resource
win7-20220901-en
Behavioral task
behavioral30
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IEExt.vbs
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IEGetAll.vbs
Resource
win7-20220812-en
Behavioral task
behavioral32
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IEGetAll.vbs
Resource
win10v2004-20220812-en
General
-
Target
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/!卸载.bat
-
Size
21KB
-
MD5
31fa6631bbea020225696410fc01c8df
-
SHA1
8326980dd890d8963d4bb13a7feb55abfadbb196
-
SHA256
8f102f28201180ab212a189f5a569b5ec26ef9e6f452a53050e0c29a8023c4a8
-
SHA512
6c863bf2c24117523e39f9c4c2a6b9cf3e24ca90200796611731e32d5c02da6d1c3f6cebaa27aae6ac69f35d4a4cac5d01b459f36453f33313728516e91e50a3
-
SSDEEP
384:yz3J6AHqbeGsaEBQ8QJyMMpj1Tcdju+ZyAqT+5k2X2dW1IB8paiE33VSN2:MJraOy9ycdju+ZyAqT+5k2X2dW1I2aJZ
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
Processes:
rundll32.exerundll32.exedescription ioc process File opened for modification C:\Windows\system32\DRIVERS\idmwfp.sys rundll32.exe File opened for modification C:\Windows\system32\DRIVERS\idmtdi.sys rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
rundll32.exerundll32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" rundll32.exe -
Drops file in Windows directory 2 IoCs
Processes:
rundll32.exerundll32.exedescription ioc process File opened for modification C:\Windows\INF\setupapi.app.log rundll32.exe File opened for modification C:\Windows\INF\setupapi.app.log rundll32.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
runonce.exerunonce.exedescription ioc process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 1856 taskkill.exe 1772 taskkill.exe -
Runs net.exe
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 8 IoCs
Processes:
regsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exepid process 1716 regsvr32.exe 1000 regsvr32.exe 904 regsvr32.exe 836 regsvr32.exe 916 regsvr32.exe 584 regsvr32.exe 1564 regsvr32.exe 1576 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
taskkill.exetaskkill.exerundll32.exerundll32.exedescription pid process Token: SeDebugPrivilege 1856 taskkill.exe Token: SeDebugPrivilege 1772 taskkill.exe Token: SeRestorePrivilege 996 rundll32.exe Token: SeRestorePrivilege 996 rundll32.exe Token: SeRestorePrivilege 996 rundll32.exe Token: SeRestorePrivilege 996 rundll32.exe Token: SeRestorePrivilege 996 rundll32.exe Token: SeRestorePrivilege 996 rundll32.exe Token: SeRestorePrivilege 996 rundll32.exe Token: SeRestorePrivilege 1536 rundll32.exe Token: SeRestorePrivilege 1536 rundll32.exe Token: SeRestorePrivilege 1536 rundll32.exe Token: SeRestorePrivilege 1536 rundll32.exe Token: SeRestorePrivilege 1536 rundll32.exe Token: SeRestorePrivilege 1536 rundll32.exe Token: SeRestorePrivilege 1536 rundll32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.exenet.exenet.exerundll32.exerunonce.exerundll32.exerunonce.exeregsvr32.exeregsvr32.exedescription pid process target process PID 1976 wrote to memory of 1316 1976 cmd.exe reg.exe PID 1976 wrote to memory of 1316 1976 cmd.exe reg.exe PID 1976 wrote to memory of 1316 1976 cmd.exe reg.exe PID 1976 wrote to memory of 1856 1976 cmd.exe taskkill.exe PID 1976 wrote to memory of 1856 1976 cmd.exe taskkill.exe PID 1976 wrote to memory of 1856 1976 cmd.exe taskkill.exe PID 1976 wrote to memory of 1772 1976 cmd.exe taskkill.exe PID 1976 wrote to memory of 1772 1976 cmd.exe taskkill.exe PID 1976 wrote to memory of 1772 1976 cmd.exe taskkill.exe PID 1976 wrote to memory of 2012 1976 cmd.exe net.exe PID 1976 wrote to memory of 2012 1976 cmd.exe net.exe PID 1976 wrote to memory of 2012 1976 cmd.exe net.exe PID 2012 wrote to memory of 912 2012 net.exe net1.exe PID 2012 wrote to memory of 912 2012 net.exe net1.exe PID 2012 wrote to memory of 912 2012 net.exe net1.exe PID 1976 wrote to memory of 1872 1976 cmd.exe net.exe PID 1976 wrote to memory of 1872 1976 cmd.exe net.exe PID 1976 wrote to memory of 1872 1976 cmd.exe net.exe PID 1872 wrote to memory of 1740 1872 net.exe net1.exe PID 1872 wrote to memory of 1740 1872 net.exe net1.exe PID 1872 wrote to memory of 1740 1872 net.exe net1.exe PID 1976 wrote to memory of 996 1976 cmd.exe rundll32.exe PID 1976 wrote to memory of 996 1976 cmd.exe rundll32.exe PID 1976 wrote to memory of 996 1976 cmd.exe rundll32.exe PID 996 wrote to memory of 320 996 rundll32.exe runonce.exe PID 996 wrote to memory of 320 996 rundll32.exe runonce.exe PID 996 wrote to memory of 320 996 rundll32.exe runonce.exe PID 320 wrote to memory of 1504 320 runonce.exe grpconv.exe PID 320 wrote to memory of 1504 320 runonce.exe grpconv.exe PID 320 wrote to memory of 1504 320 runonce.exe grpconv.exe PID 1976 wrote to memory of 1536 1976 cmd.exe rundll32.exe PID 1976 wrote to memory of 1536 1976 cmd.exe rundll32.exe PID 1976 wrote to memory of 1536 1976 cmd.exe rundll32.exe PID 1536 wrote to memory of 1960 1536 rundll32.exe runonce.exe PID 1536 wrote to memory of 1960 1536 rundll32.exe runonce.exe PID 1536 wrote to memory of 1960 1536 rundll32.exe runonce.exe PID 1960 wrote to memory of 1744 1960 runonce.exe grpconv.exe PID 1960 wrote to memory of 1744 1960 runonce.exe grpconv.exe PID 1960 wrote to memory of 1744 1960 runonce.exe grpconv.exe PID 1976 wrote to memory of 1716 1976 cmd.exe regsvr32.exe PID 1976 wrote to memory of 1716 1976 cmd.exe regsvr32.exe PID 1976 wrote to memory of 1716 1976 cmd.exe regsvr32.exe PID 1976 wrote to memory of 1716 1976 cmd.exe regsvr32.exe PID 1976 wrote to memory of 1716 1976 cmd.exe regsvr32.exe PID 1716 wrote to memory of 1660 1716 regsvr32.exe regsvr32.exe PID 1716 wrote to memory of 1660 1716 regsvr32.exe regsvr32.exe PID 1716 wrote to memory of 1660 1716 regsvr32.exe regsvr32.exe PID 1716 wrote to memory of 1660 1716 regsvr32.exe regsvr32.exe PID 1716 wrote to memory of 1660 1716 regsvr32.exe regsvr32.exe PID 1716 wrote to memory of 1660 1716 regsvr32.exe regsvr32.exe PID 1716 wrote to memory of 1660 1716 regsvr32.exe regsvr32.exe PID 1976 wrote to memory of 1000 1976 cmd.exe regsvr32.exe PID 1976 wrote to memory of 1000 1976 cmd.exe regsvr32.exe PID 1976 wrote to memory of 1000 1976 cmd.exe regsvr32.exe PID 1976 wrote to memory of 1000 1976 cmd.exe regsvr32.exe PID 1976 wrote to memory of 1000 1976 cmd.exe regsvr32.exe PID 1976 wrote to memory of 904 1976 cmd.exe regsvr32.exe PID 1976 wrote to memory of 904 1976 cmd.exe regsvr32.exe PID 1976 wrote to memory of 904 1976 cmd.exe regsvr32.exe PID 1976 wrote to memory of 904 1976 cmd.exe regsvr32.exe PID 1976 wrote to memory of 904 1976 cmd.exe regsvr32.exe PID 904 wrote to memory of 1364 904 regsvr32.exe regsvr32.exe PID 904 wrote to memory of 1364 904 regsvr32.exe regsvr32.exe PID 904 wrote to memory of 1364 904 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\新建文件夹\Inet_Download_Manager_v6.37.14_Final\Internet Download Manager\!卸载.bat"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeREG QUERY "HKU\S-1-5-19\Environment"2⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /im IDM*2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskkill.exetaskkill /f /im IEMon*2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\net.exeNet Stop IDMWFP2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 Stop IDMWFP3⤵
-
C:\Windows\system32\net.exeNet Stop IDMTDI2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 Stop IDMTDI3⤵
-
C:\Windows\system32\rundll32.exeRundll32 setupapi.dll,InstallHinfSection DefaultUninstall 128 .\idmwfp.inf2⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\runonce.exe"C:\Windows\system32\runonce.exe" -r3⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\grpconv.exe"C:\Windows\System32\grpconv.exe" -o4⤵
-
C:\Windows\system32\rundll32.exeRundll32 setupapi.dll,InstallHinfSection DefaultUninstall 128 .\idmtdi.inf2⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\runonce.exe"C:\Windows\system32\runonce.exe" -r3⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\grpconv.exe"C:\Windows\System32\grpconv.exe" -o4⤵
-
C:\Windows\system32\regsvr32.exeRegsvr32 /s /u IDMShellExt.dll2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s /u IDMShellExt.dll3⤵
-
C:\Windows\system32\regsvr32.exeRegsvr32 /s /u IDMShellExt64.dll2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
-
C:\Windows\system32\regsvr32.exeregsvr32 /s /u IDMIECC.dll2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s /u IDMIECC.dll3⤵
-
C:\Windows\system32\regsvr32.exeregsvr32 /s /u IDMGetAll.dll2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
-
C:\Windows\SysWOW64\regsvr32.exe/s /u IDMGetAll.dll3⤵
-
C:\Windows\system32\regsvr32.exeregsvr32 /s /u downlWithIDM.dll2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
-
C:\Windows\SysWOW64\regsvr32.exe/s /u downlWithIDM.dll3⤵
-
C:\Windows\system32\regsvr32.exeregsvr32 /s /u IDMIECC64.dll2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
-
C:\Windows\system32\regsvr32.exeregsvr32 /s /u IDMGetAll64.dll2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
-
C:\Windows\system32\regsvr32.exeregsvr32 /s /u downlWithIDM64.dll2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /v "tvfrdt" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /v "Email" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /v "Serial" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /v "LName" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /v "FName" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /v "scansk" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /v "MData" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /v "ExePath" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /v "TempPath" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /v "CheckUpdtVM" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /v "AppDataIDMFolder" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /v "CommonAppDataIDMFolder" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\CocCoc\Browser\Extensions\ngpampappnmepgilojfohadhhmbhlaek" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\CocCoc\Browser\NativeMessagingHosts\com.tonec.idm" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\Microsoft\Edge\Extensions\ngpampappnmepgilojfohadhhmbhlaek" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\Microsoft\Edge\NativeMessagingHosts\com.tonec.idm" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\Microsoft\Internet Explorer" /v "DownloadUI" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\Microsoft\Internet Explorer\MenuExt\╩╣╙├ IDM ╧┬╘╪" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\Microsoft\Internet Explorer\MenuExt\╩╣╙├ IDM ╧┬╘╪╚½▓┐┴┤╜╙" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\Mozilla\NativeMessagingHosts\com.tonec.idm" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\Mozilla\SeaMonkey\Extensions" /v "mozilla_cc@internetdownloadmanager.com" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\Mozilla\SeaMonkey\Extensions" /v "mozilla_cc2@internetdownloadmanager.com" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Internet Download Manager" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Wow6432Node\Internet Download Manager" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Google\Chrome\NativeMessagingHosts\com.tonec.idm" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Google\Chrome\Extensions\ngpampappnmepgilojfohadhhmbhlaek" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Wow6432Node\Google\Chrome\NativeMessagingHosts\com.tonec.idm" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Wow6432Node\Google\Chrome\Extensions\ngpampappnmepgilojfohadhhmbhlaek" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /f /v "C:\Users\Admin\AppData\Local\Temp\新建文件夹\Inet_Download_Manager_v6.37.14_Final\Internet Download Manager\IDM.exe"2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\AppID\{0F947660-8606-420A-BAC6-51B84DD22A47}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\AppID\{3C085E26-7DF6-4A34-ADA6-877D06BAE9A8}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\AppID\{AC746233-E9D3-49CD-862F-068F7B7CCCA4}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\AppID\idmBroker.EXE" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\CLSID\{0055C089-8582-441B-A0BF-17B458C2A3A8}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\CLSID\{436D67E1-2FB3-4A6C-B3CD-FF8A41B0664D}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\CLSID\{4764030F-2733-45B9-AE62-3D1F4F6F2861}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\CLSID\{52F6F7BD-DF73-44B3-AE13-89E1E1FB8F6A}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\CLSID\{5312C54E-A385-46B7-B200-ABAF81B03935}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\CLSID\{7D11E719-FF90-479C-B0D7-96EB43EE55D7}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\CLSID\{CDC95B92-E27C-4745-A8C5-64A52A78855D}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\CLSID\{CDD67718-A430-4AB9-A939-83D9074B0038}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\DownlWithIDM.IDMDwnlMgr" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\DownlWithIDM.IDMDwnlMgr.1" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\DownlWithIDM.LinkProcessor" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\DownlWithIDM.LinkProcessor.1" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\DownlWithIDM.V2LinkProcessor" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\DownlWithIDM.V2LinkProcessor.1" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\DownlWithIDM.VLinkProcessor" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\DownlWithIDM.VLinkProcessor.1" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\IDMan.CIDMLinkTransmitter" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\idmBroker.OptionsReader" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\idmBroker.OptionsReader.1" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Idmfsa.IDMEFSAgent" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Idmfsa.IDMEFSAgent.1" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\IDMGetAll.IDMAllLinksProcessor" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\IDMGetAll.IDMAllLinksProcessor.1" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\IDMIECC.IDMHelperLinksStorage" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\IDMIECC.IDMHelperLinksStorage.1" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\IDMIECC.IDMIEHlprObj" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\IDMIECC.IDMIEHlprObj.1" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Interface\{2223E76A-0894-4502-841F-0CF7517A713B}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Interface\{28670AE0-CAF4-4836-8418-0F456023EBF7}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Interface\{33AEF752-FB86-4787-9ED1-6010528F5FA3}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Interface\{356E6235-B055-46D9-8B32-BDC2266C9DAB}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Interface\{4BD46AAE-C51F-4BF7-8BC0-2E86E33D1873}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Interface\{6B9EB066-DA1F-4C0A-AC62-01AC892EF175}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Interface\{6EDC7F8E-EB3D-4F9A-B693-216F07C94D74}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Interface\{72B7361C-3568-4392-BCCD-D912CD5C1169}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Interface\{94D09862-1875-4FC9-B434-91CF25C840A1}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Interface\{98D060EC-53AF-4F61-8180-43C507C9FF94}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Interface\{A87AB5DD-211B-4284-8CBD-B92F77A5DE14}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Interface\{BC69364C-34D7-4225-B16F-8595C743C775}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Interface\{C7798BD6-34AF-4925-B01C-450C9EAD2DD9}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Interface\{C950922F-897A-4E13-BA38-66C8AF2E0BF7}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\TypeLib\{13D4E387-BAB7-47E7-B3D7-3F01ABC463EA}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\TypeLib\{37294E01-DB54-43AF-9D50-93FF7267DF5D}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\TypeLib\{3BDFC55C-ED33-43BB-9A77-57C2AF4B56EF}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\TypeLib\{5518B636-6884-48CA-A9A7-1CFD3F3BA916}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\TypeLib\{6A89524B-E1B6-4D71-972A-8FD53F240936}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\TypeLib\{ECF21EAB-3AA8-4355-82BE-F777990001DD}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\AppID\{0F947660-8606-420A-BAC6-51B84DD22A47}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\AppID\{3C085E26-7DF6-4A34-ADA6-877D06BAE9A8}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\AppID\{AC746233-E9D3-49CD-862F-068F7B7CCCA4}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\AppID\idmBroker.EXE" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\CLSID\{0055C089-8582-441B-A0BF-17B458C2A3A8}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\CLSID\{07999AC3-058B-40BF-984F-69EB1E554CA7}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\CLSID\{0F947660-8606-420A-BAC6-51B84DD22A47}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\CLSID\{436D67E1-2FB3-4A6C-B3CD-FF8A41B0664D}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\CLSID\{4764030F-2733-45B9-AE62-3D1F4F6F2861}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\CLSID\{52F6F7BD-DF73-44B3-AE13-89E1E1FB8F6A}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\CLSID\{5312C54E-A385-46B7-B200-ABAF81B03935}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\CLSID\{7D11E719-FF90-479C-B0D7-96EB43EE55D7}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\CLSID\{AC746233-E9D3-49CD-862F-068F7B7CCCA4}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\CLSID\{C950922F-897A-4E13-BA38-66C8AF2E0BF7}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\CLSID\{CDD67718-A430-4AB9-A939-83D9074B0038}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\CLSID\{D0FB58BB-2C07-492F-8BD0-A587E4874B4E}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\Interface\{2223E76A-0894-4502-841F-0CF7517A713B}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\Interface\{28670AE0-CAF4-4836-8418-0F456023EBF7}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\Interface\{33AEF752-FB86-4787-9ED1-6010528F5FA3}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\Interface\{356E6235-B055-46D9-8B32-BDC2266C9DAB}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\Interface\{4BD46AAE-C51F-4BF7-8BC0-2E86E33D1873}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\Interface\{6B9EB066-DA1F-4C0A-AC62-01AC892EF175}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\Interface\{6EDC7F8E-EB3D-4F9A-B693-216F07C94D74}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\Interface\{72B7361C-3568-4392-BCCD-D912CD5C1169}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\Interface\{94D09862-1875-4FC9-B434-91CF25C840A1}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\Interface\{98D060EC-53AF-4F61-8180-43C507C9FF94}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\Interface\{A87AB5DD-211B-4284-8CBD-B92F77A5DE14}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\Interface\{C7798BD6-34AF-4925-B01C-450C9EAD2DD9}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\Interface\{BC69364C-34D7-4225-B16F-8595C743C775}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\Interface\{C950922F-897A-4E13-BA38-66C8AF2E0BF7}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\TypeLib\{13D4E387-BAB7-47E7-B3D7-3F01ABC463EA}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\TypeLib\{37294E01-DB54-43AF-9D50-93FF7267DF5D}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\TypeLib\{3BDFC55C-ED33-43BB-9A77-57C2AF4B56EF}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\TypeLib\{6A89524B-E1B6-4D71-972A-8FD53F240936}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\TypeLib\{5518B636-6884-48CA-A9A7-1CFD3F3BA916}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\TypeLib\{ECF21EAB-3AA8-4355-82BE-F777990001DD}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\AppID\{0F947660-8606-420A-BAC6-51B84DD22A47}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\AppID\{3C085E26-7DF6-4A34-ADA6-877D06BAE9A8}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\AppID\{AC746233-E9D3-49CD-862F-068F7B7CCCA4}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\AppID\idmBroker.EXE" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\CLSID\{0055C089-8582-441B-A0BF-17B458C2A3A8}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\CLSID\{436D67E1-2FB3-4A6C-B3CD-FF8A41B0664D}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\CLSID\{4764030F-2733-45B9-AE62-3D1F4F6F2861}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\CLSID\{52F6F7BD-DF73-44B3-AE13-89E1E1FB8F6A}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\CLSID\{5312C54E-A385-46B7-B200-ABAF81B03935}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\CLSID\{7D11E719-FF90-479C-B0D7-96EB43EE55D7}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\CLSID\{CDD67718-A430-4AB9-A939-83D9074B0038}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\CLSID\{CDC95B92-E27C-4745-A8C5-64A52A78855D}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\CLSID\{D0FB58BB-2C07-492F-8BD0-A587E4874B4E}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\DownlWithIDM.IDMDwnlMgr" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\DownlWithIDM.IDMDwnlMgr.1" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\DownlWithIDM.LinkProcessor" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\DownlWithIDM.LinkProcessor.1" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\DownlWithIDM.V2LinkProcessor" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\DownlWithIDM.V2LinkProcessor.1" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\DownlWithIDM.VLinkProcessor" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\DownlWithIDM.VLinkProcessor.1" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\IDMan.CIDMLinkTransmitter" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\idmBroker.OptionsReader" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\idmBroker.OptionsReader.1" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Idmfsa.IDMEFSAgent" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Idmfsa.IDMEFSAgent.1" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\IDMGetAll.IDMAllLinksProcessor" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\IDMGetAll.IDMAllLinksProcessor.1" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\IDMIECC.IDMHelperLinksStorage" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\IDMIECC.IDMHelperLinksStorage.1" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\IDMIECC.IDMIEHlprObj" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\IDMIECC.IDMIEHlprObj.1" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{2223E76A-0894-4502-841F-0CF7517A713B}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{28670AE0-CAF4-4836-8418-0F456023EBF7}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{33AEF752-FB86-4787-9ED1-6010528F5FA3}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{356E6235-B055-46D9-8B32-BDC2266C9DAB}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{4BD46AAE-C51F-4BF7-8BC0-2E86E33D1873}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{6B9EB066-DA1F-4C0A-AC62-01AC892EF175}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{6EDC7F8E-EB3D-4F9A-B693-216F07C94D74}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{72B7361C-3568-4392-BCCD-D912CD5C1169}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{94D09862-1875-4FC9-B434-91CF25C840A1}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{98D060EC-53AF-4F61-8180-43C507C9FF94}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{A87AB5DD-211B-4284-8CBD-B92F77A5DE14}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{BC69364C-34D7-4225-B16F-8595C743C775}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{C7798BD6-34AF-4925-B01C-450C9EAD2DD9}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{C950922F-897A-4E13-BA38-66C8AF2E0BF7}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\TypeLib\{13D4E387-BAB7-47E7-B3D7-3F01ABC463EA}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\TypeLib\{37294E01-DB54-43AF-9D50-93FF7267DF5D}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\TypeLib\{3BDFC55C-ED33-43BB-9A77-57C2AF4B56EF}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\TypeLib\{5518B636-6884-48CA-A9A7-1CFD3F3BA916}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\TypeLib\{6A89524B-E1B6-4D71-972A-8FD53F240936}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\TypeLib\{ECF21EAB-3AA8-4355-82BE-F777990001DD}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\CLSID\{0055C089-8582-441B-A0BF-17B458C2A3A8}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\CLSID\{0F947660-8606-420A-BAC6-51B84DD22A47}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\CLSID\{436D67E1-2FB3-4A6C-B3CD-FF8A41B0664D}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\CLSID\{4764030F-2733-45B9-AE62-3D1F4F6F2861}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\CLSID\{52F6F7BD-DF73-44B3-AE13-89E1E1FB8F6A}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\CLSID\{5312C54E-A385-46B7-B200-ABAF81B03935}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\CLSID\{7D11E719-FF90-479C-B0D7-96EB43EE55D7}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\CLSID\{AC746233-E9D3-49CD-862F-068F7B7CCCA4}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\CLSID\{C950922F-897A-4E13-BA38-66C8AF2E0BF7}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\CLSID\{CDD67718-A430-4AB9-A939-83D9074B0038}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\CLSID\{D0FB58BB-2C07-492F-8BD0-A587E4874B4E}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\Interface\{2223E76A-0894-4502-841F-0CF7517A713B}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\Interface\{28670AE0-CAF4-4836-8418-0F456023EBF7}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\Interface\{33AEF752-FB86-4787-9ED1-6010528F5FA3}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\Interface\{356E6235-B055-46D9-8B32-BDC2266C9DAB}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\Interface\{4BD46AAE-C51F-4BF7-8BC0-2E86E33D1873}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\Interface\{6B9EB066-DA1F-4C0A-AC62-01AC892EF175}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\Interface\{6EDC7F8E-EB3D-4F9A-B693-216F07C94D74}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\Interface\{72B7361C-3568-4392-BCCD-D912CD5C1169}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\Interface\{94D09862-1875-4FC9-B434-91CF25C840A1}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\Interface\{98D060EC-53AF-4F61-8180-43C507C9FF94}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\Interface\{A87AB5DD-211B-4284-8CBD-B92F77A5DE14}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\Interface\{BC69364C-34D7-4225-B16F-8595C743C775}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\Interface\{C7798BD6-34AF-4925-B01C-450C9EAD2DD9}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\Interface\{C950922F-897A-4E13-BA38-66C8AF2E0BF7}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0055C089-8582-441B-A0BF-17B458C2A3A8}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{0055C089-8582-441B-A0BF-17B458C2A3A8}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\IDM Shell Extension" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\IDM Shell Extension" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved" /v "{CDC95B92-E27C-4745-A8C5-64A52A78855D}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved" /v "{CDC95B92-E27C-4745-A8C5-64A52A78855D}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Internet Explorer" /v "DownloadUI" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\DragDrop\{F6E1B27E-F2DA-4919-9DBD-CAB90A1D662B}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWAREMicrosoft\Internet Explorer\Low Rights\ElevationPolicy\{E0DACC63-037F-46EE-AC02-E4C7B0FBFEB4}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Tracing\IDMan_RASAPI32" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer" /v "DownloadUI" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\DragDrop\{F6E1B27E-F2DA-4919-9DBD-CAB90A1D662B}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{E0DACC63-037F-46EE-AC02-E4C7B0FBFEB4}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\IDMan_RASAPI32" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\services\IDMWFP" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\Classes\Wow6432Node\CLSID\{07999AC3-058B-40BF-984F-69EB1E554CA7}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\Microsoft\Internet Explorer\Low Rights\DragDrop\{19129CDA-AFC0-4330-99BC-C5A834F89006}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{15B851AF-A4B9-43EF-97D3-28E1B4A5DB9B}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{1902485B-CE75-42C1-BA2D-57E660793D9A}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{E0DACC63-037F-46EE-AC02-E4C7B0FBFEB4}" /f2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\ExplorerStartupLog_RunOnce.etlFilesize
8KB
MD5e1a8828abd1a92d26cdc5da8e5363c38
SHA14a97462876c2a64c0f9be1d9f12cf3dd15d0e87f
SHA2562c0b10724a514ff02aad6fb5cc94faa21aae1d40f209b31d772ee29470b72422
SHA512e936037ca3be0e3017698fe53b4b0b30a9cb4bce8fd9d8407bffebb11101c61caa8a36a91c270da9f26c1619c812ee90e4c3a94572a6b21d11e71b34b41261ee
-
memory/112-113-0x0000000000000000-mapping.dmp
-
memory/320-63-0x0000000000000000-mapping.dmp
-
memory/456-110-0x0000000000000000-mapping.dmp
-
memory/524-106-0x0000000000000000-mapping.dmp
-
memory/568-120-0x0000000000000000-mapping.dmp
-
memory/584-92-0x0000000000000000-mapping.dmp
-
memory/596-114-0x0000000000000000-mapping.dmp
-
memory/616-101-0x0000000000000000-mapping.dmp
-
memory/808-125-0x0000000000000000-mapping.dmp
-
memory/836-84-0x0000000000000000-mapping.dmp
-
memory/900-130-0x0000000000000000-mapping.dmp
-
memory/904-80-0x0000000000000000-mapping.dmp
-
memory/904-131-0x0000000000000000-mapping.dmp
-
memory/912-107-0x0000000000000000-mapping.dmp
-
memory/912-58-0x0000000000000000-mapping.dmp
-
memory/916-88-0x0000000000000000-mapping.dmp
-
memory/932-134-0x0000000000000000-mapping.dmp
-
memory/996-62-0x000007FEFC161000-0x000007FEFC163000-memory.dmpFilesize
8KB
-
memory/996-61-0x0000000000000000-mapping.dmp
-
memory/1000-78-0x0000000000000000-mapping.dmp
-
memory/1064-129-0x0000000000000000-mapping.dmp
-
memory/1136-102-0x0000000000000000-mapping.dmp
-
memory/1144-100-0x0000000000000000-mapping.dmp
-
memory/1152-128-0x0000000000000000-mapping.dmp
-
memory/1196-86-0x0000000000000000-mapping.dmp
-
memory/1196-133-0x0000000000000000-mapping.dmp
-
memory/1264-124-0x0000000000000000-mapping.dmp
-
memory/1304-117-0x0000000000000000-mapping.dmp
-
memory/1312-112-0x0000000000000000-mapping.dmp
-
memory/1316-54-0x0000000000000000-mapping.dmp
-
memory/1364-82-0x0000000000000000-mapping.dmp
-
memory/1464-119-0x0000000000000000-mapping.dmp
-
memory/1468-118-0x0000000000000000-mapping.dmp
-
memory/1472-126-0x0000000000000000-mapping.dmp
-
memory/1504-65-0x0000000000000000-mapping.dmp
-
memory/1536-67-0x0000000000000000-mapping.dmp
-
memory/1544-115-0x0000000000000000-mapping.dmp
-
memory/1556-111-0x0000000000000000-mapping.dmp
-
memory/1564-94-0x0000000000000000-mapping.dmp
-
memory/1576-96-0x0000000000000000-mapping.dmp
-
memory/1596-90-0x0000000000000000-mapping.dmp
-
memory/1660-76-0x0000000000000000-mapping.dmp
-
memory/1660-77-0x00000000762B1000-0x00000000762B3000-memory.dmpFilesize
8KB
-
memory/1696-123-0x0000000000000000-mapping.dmp
-
memory/1716-74-0x0000000000000000-mapping.dmp
-
memory/1716-127-0x0000000000000000-mapping.dmp
-
memory/1740-109-0x0000000000000000-mapping.dmp
-
memory/1740-60-0x0000000000000000-mapping.dmp
-
memory/1744-72-0x0000000000000000-mapping.dmp
-
memory/1756-98-0x0000000000000000-mapping.dmp
-
memory/1772-56-0x0000000000000000-mapping.dmp
-
memory/1784-132-0x0000000000000000-mapping.dmp
-
memory/1788-121-0x0000000000000000-mapping.dmp
-
memory/1808-108-0x0000000000000000-mapping.dmp
-
memory/1840-135-0x0000000000000000-mapping.dmp
-
memory/1856-55-0x0000000000000000-mapping.dmp
-
memory/1856-103-0x0000000000000000-mapping.dmp
-
memory/1860-99-0x0000000000000000-mapping.dmp
-
memory/1868-116-0x0000000000000000-mapping.dmp
-
memory/1872-59-0x0000000000000000-mapping.dmp
-
memory/1940-136-0x0000000000000000-mapping.dmp
-
memory/1960-69-0x0000000000000000-mapping.dmp
-
memory/1972-122-0x0000000000000000-mapping.dmp
-
memory/2012-57-0x0000000000000000-mapping.dmp
-
memory/2020-104-0x0000000000000000-mapping.dmp
-
memory/2028-105-0x0000000000000000-mapping.dmp