Overview
overview
8Static
static
新建文....bat
windows7-x64
8新建文....bat
windows10-2004-x64
8新建文....bat
windows7-x64
8新建文....bat
windows10-2004-x64
8新建文...64.dll
windows7-x64
3新建文...64.dll
windows10-2004-x64
3新建文...ll.dll
windows7-x64
1新建文...ll.dll
windows10-2004-x64
1新建文...64.dll
windows7-x64
1新建文...64.dll
windows10-2004-x64
1新建文...CC.dll
windows7-x64
1新建文...CC.dll
windows10-2004-x64
1新建文...64.dll
windows7-x64
1新建文...64.dll
windows10-2004-x64
1新建文...64.exe
windows7-x64
1新建文...64.exe
windows10-2004-x64
1新建文...on.dll
windows7-x64
1新建文...on.dll
windows10-2004-x64
1新建文...64.dll
windows7-x64
1新建文...64.dll
windows10-2004-x64
1新建文...xt.dll
windows7-x64
1新建文...xt.dll
windows10-2004-x64
1新建文...64.dll
windows7-x64
8新建文...64.dll
windows10-2004-x64
8新建文...rs.dll
windows7-x64
3新建文...rs.dll
windows10-2004-x64
3新建文...64.dll
windows7-x64
1新建文...64.dll
windows10-2004-x64
3新建文...xt.vbs
windows7-x64
1新建文...xt.vbs
windows10-2004-x64
1新建文...ll.vbs
windows7-x64
1新建文...ll.vbs
windows10-2004-x64
1Analysis
-
max time kernel
135s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2022 05:33
Static task
static1
Behavioral task
behavioral1
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/!卸载.bat
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/!卸载.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/!绿化.bat
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/!绿化.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMFType64.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMFType64.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMGetAll.dll
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMGetAll.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMGetAll64.dll
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMGetAll64.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMIECC.dll
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMIECC.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMIECC64.dll
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMIECC64.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMIntegrator64.exe
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMIntegrator64.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMNetMon.dll
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMNetMon.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMNetMon64.dll
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMNetMon64.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral21
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMShellExt.dll
Resource
win7-20220812-en
Behavioral task
behavioral22
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMShellExt.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMShellExt64.dll
Resource
win7-20220812-en
Behavioral task
behavioral24
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMShellExt64.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMVMPrs.dll
Resource
win7-20220812-en
Behavioral task
behavioral26
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMVMPrs.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMVMPrs64.dll
Resource
win7-20220812-en
Behavioral task
behavioral28
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IDMVMPrs64.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral29
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IEExt.vbs
Resource
win7-20220901-en
Behavioral task
behavioral30
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IEExt.vbs
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IEGetAll.vbs
Resource
win7-20220812-en
Behavioral task
behavioral32
Sample
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/IEGetAll.vbs
Resource
win10v2004-20220812-en
General
-
Target
新建文件夹/Inet_Download_Manager_v6.37.14_Final/Internet Download Manager/!卸载.bat
-
Size
21KB
-
MD5
31fa6631bbea020225696410fc01c8df
-
SHA1
8326980dd890d8963d4bb13a7feb55abfadbb196
-
SHA256
8f102f28201180ab212a189f5a569b5ec26ef9e6f452a53050e0c29a8023c4a8
-
SHA512
6c863bf2c24117523e39f9c4c2a6b9cf3e24ca90200796611731e32d5c02da6d1c3f6cebaa27aae6ac69f35d4a4cac5d01b459f36453f33313728516e91e50a3
-
SSDEEP
384:yz3J6AHqbeGsaEBQ8QJyMMpj1Tcdju+ZyAqT+5k2X2dW1IB8paiE33VSN2:MJraOy9ycdju+ZyAqT+5k2X2dW1I2aJZ
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
Processes:
rundll32.exerundll32.exedescription ioc process File opened for modification C:\Windows\system32\DRIVERS\idmwfp.sys rundll32.exe File opened for modification C:\Windows\system32\DRIVERS\idmtdi.sys rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
rundll32.exerundll32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" rundll32.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
runonce.exerunonce.exedescription ioc process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 2548 taskkill.exe 4776 taskkill.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
taskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 2548 taskkill.exe Token: SeDebugPrivilege 4776 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.exenet.exenet.exerundll32.exerunonce.exerundll32.exerunonce.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exedescription pid process target process PID 3312 wrote to memory of 5064 3312 cmd.exe reg.exe PID 3312 wrote to memory of 5064 3312 cmd.exe reg.exe PID 3312 wrote to memory of 2548 3312 cmd.exe taskkill.exe PID 3312 wrote to memory of 2548 3312 cmd.exe taskkill.exe PID 3312 wrote to memory of 4776 3312 cmd.exe taskkill.exe PID 3312 wrote to memory of 4776 3312 cmd.exe taskkill.exe PID 3312 wrote to memory of 4720 3312 cmd.exe net.exe PID 3312 wrote to memory of 4720 3312 cmd.exe net.exe PID 4720 wrote to memory of 4480 4720 net.exe net1.exe PID 4720 wrote to memory of 4480 4720 net.exe net1.exe PID 3312 wrote to memory of 5068 3312 cmd.exe net.exe PID 3312 wrote to memory of 5068 3312 cmd.exe net.exe PID 5068 wrote to memory of 2352 5068 net.exe net1.exe PID 5068 wrote to memory of 2352 5068 net.exe net1.exe PID 3312 wrote to memory of 2144 3312 cmd.exe rundll32.exe PID 3312 wrote to memory of 2144 3312 cmd.exe rundll32.exe PID 2144 wrote to memory of 4556 2144 rundll32.exe runonce.exe PID 2144 wrote to memory of 4556 2144 rundll32.exe runonce.exe PID 4556 wrote to memory of 1412 4556 runonce.exe grpconv.exe PID 4556 wrote to memory of 1412 4556 runonce.exe grpconv.exe PID 3312 wrote to memory of 532 3312 cmd.exe rundll32.exe PID 3312 wrote to memory of 532 3312 cmd.exe rundll32.exe PID 532 wrote to memory of 1828 532 rundll32.exe runonce.exe PID 532 wrote to memory of 1828 532 rundll32.exe runonce.exe PID 1828 wrote to memory of 1328 1828 runonce.exe grpconv.exe PID 1828 wrote to memory of 1328 1828 runonce.exe grpconv.exe PID 3312 wrote to memory of 2396 3312 cmd.exe regsvr32.exe PID 3312 wrote to memory of 2396 3312 cmd.exe regsvr32.exe PID 2396 wrote to memory of 364 2396 regsvr32.exe regsvr32.exe PID 2396 wrote to memory of 364 2396 regsvr32.exe regsvr32.exe PID 2396 wrote to memory of 364 2396 regsvr32.exe regsvr32.exe PID 3312 wrote to memory of 4424 3312 cmd.exe regsvr32.exe PID 3312 wrote to memory of 4424 3312 cmd.exe regsvr32.exe PID 3312 wrote to memory of 4408 3312 cmd.exe regsvr32.exe PID 3312 wrote to memory of 4408 3312 cmd.exe regsvr32.exe PID 4408 wrote to memory of 3104 4408 regsvr32.exe regsvr32.exe PID 4408 wrote to memory of 3104 4408 regsvr32.exe regsvr32.exe PID 4408 wrote to memory of 3104 4408 regsvr32.exe regsvr32.exe PID 3312 wrote to memory of 4932 3312 cmd.exe regsvr32.exe PID 3312 wrote to memory of 4932 3312 cmd.exe regsvr32.exe PID 4932 wrote to memory of 3468 4932 regsvr32.exe regsvr32.exe PID 4932 wrote to memory of 3468 4932 regsvr32.exe regsvr32.exe PID 4932 wrote to memory of 3468 4932 regsvr32.exe regsvr32.exe PID 3312 wrote to memory of 5084 3312 cmd.exe regsvr32.exe PID 3312 wrote to memory of 5084 3312 cmd.exe regsvr32.exe PID 5084 wrote to memory of 4612 5084 regsvr32.exe regsvr32.exe PID 5084 wrote to memory of 4612 5084 regsvr32.exe regsvr32.exe PID 5084 wrote to memory of 4612 5084 regsvr32.exe regsvr32.exe PID 3312 wrote to memory of 4132 3312 cmd.exe regsvr32.exe PID 3312 wrote to memory of 4132 3312 cmd.exe regsvr32.exe PID 3312 wrote to memory of 4908 3312 cmd.exe regsvr32.exe PID 3312 wrote to memory of 4908 3312 cmd.exe regsvr32.exe PID 3312 wrote to memory of 4852 3312 cmd.exe regsvr32.exe PID 3312 wrote to memory of 4852 3312 cmd.exe regsvr32.exe PID 3312 wrote to memory of 2012 3312 cmd.exe reg.exe PID 3312 wrote to memory of 2012 3312 cmd.exe reg.exe PID 3312 wrote to memory of 540 3312 cmd.exe reg.exe PID 3312 wrote to memory of 540 3312 cmd.exe reg.exe PID 3312 wrote to memory of 2228 3312 cmd.exe reg.exe PID 3312 wrote to memory of 2228 3312 cmd.exe reg.exe PID 3312 wrote to memory of 3784 3312 cmd.exe reg.exe PID 3312 wrote to memory of 3784 3312 cmd.exe reg.exe PID 3312 wrote to memory of 1932 3312 cmd.exe reg.exe PID 3312 wrote to memory of 1932 3312 cmd.exe reg.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\新建文件夹\Inet_Download_Manager_v6.37.14_Final\Internet Download Manager\!卸载.bat"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeREG QUERY "HKU\S-1-5-19\Environment"2⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /im IDM*2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskkill.exetaskkill /f /im IEMon*2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\net.exeNet Stop IDMWFP2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 Stop IDMWFP3⤵
-
C:\Windows\system32\net.exeNet Stop IDMTDI2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 Stop IDMTDI3⤵
-
C:\Windows\system32\rundll32.exeRundll32 setupapi.dll,InstallHinfSection DefaultUninstall 128 .\idmwfp.inf2⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\runonce.exe"C:\Windows\system32\runonce.exe" -r3⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\grpconv.exe"C:\Windows\System32\grpconv.exe" -o4⤵
-
C:\Windows\system32\rundll32.exeRundll32 setupapi.dll,InstallHinfSection DefaultUninstall 128 .\idmtdi.inf2⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\runonce.exe"C:\Windows\system32\runonce.exe" -r3⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\grpconv.exe"C:\Windows\System32\grpconv.exe" -o4⤵
-
C:\Windows\system32\regsvr32.exeRegsvr32 /s /u IDMShellExt.dll2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s /u IDMShellExt.dll3⤵
-
C:\Windows\system32\regsvr32.exeRegsvr32 /s /u IDMShellExt64.dll2⤵
-
C:\Windows\system32\regsvr32.exeregsvr32 /s /u IDMIECC.dll2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s /u IDMIECC.dll3⤵
-
C:\Windows\system32\regsvr32.exeregsvr32 /s /u IDMGetAll.dll2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s /u IDMGetAll.dll3⤵
-
C:\Windows\system32\regsvr32.exeregsvr32 /s /u downlWithIDM.dll2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s /u downlWithIDM.dll3⤵
-
C:\Windows\system32\regsvr32.exeregsvr32 /s /u IDMIECC64.dll2⤵
-
C:\Windows\system32\regsvr32.exeregsvr32 /s /u IDMGetAll64.dll2⤵
-
C:\Windows\system32\regsvr32.exeregsvr32 /s /u downlWithIDM64.dll2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /v "tvfrdt" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /v "Email" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /v "Serial" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /v "LName" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /v "FName" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /v "scansk" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /v "MData" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /v "ExePath" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /v "TempPath" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /v "CheckUpdtVM" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /v "AppDataIDMFolder" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /v "CommonAppDataIDMFolder" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\CocCoc\Browser\Extensions\ngpampappnmepgilojfohadhhmbhlaek" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\CocCoc\Browser\NativeMessagingHosts\com.tonec.idm" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\Microsoft\Edge\Extensions\ngpampappnmepgilojfohadhhmbhlaek" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\Microsoft\Edge\NativeMessagingHosts\com.tonec.idm" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\Microsoft\Internet Explorer" /v "DownloadUI" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\Microsoft\Internet Explorer\MenuExt\╩╣╙├ IDM ╧┬╘╪" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\Microsoft\Internet Explorer\MenuExt\╩╣╙├ IDM ╧┬╘╪╚½▓┐┴┤╜╙" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\Mozilla\NativeMessagingHosts\com.tonec.idm" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\Mozilla\SeaMonkey\Extensions" /v "mozilla_cc@internetdownloadmanager.com" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\Mozilla\SeaMonkey\Extensions" /v "mozilla_cc2@internetdownloadmanager.com" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Internet Download Manager" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Wow6432Node\Internet Download Manager" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Google\Chrome\NativeMessagingHosts\com.tonec.idm" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Google\Chrome\Extensions\ngpampappnmepgilojfohadhhmbhlaek" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Wow6432Node\Google\Chrome\NativeMessagingHosts\com.tonec.idm" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Wow6432Node\Google\Chrome\Extensions\ngpampappnmepgilojfohadhhmbhlaek" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers" /f /v "C:\Users\Admin\AppData\Local\Temp\新建文件夹\Inet_Download_Manager_v6.37.14_Final\Internet Download Manager\IDM.exe"2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\AppID\{0F947660-8606-420A-BAC6-51B84DD22A47}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\AppID\{3C085E26-7DF6-4A34-ADA6-877D06BAE9A8}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\AppID\{AC746233-E9D3-49CD-862F-068F7B7CCCA4}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\AppID\idmBroker.EXE" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\CLSID\{0055C089-8582-441B-A0BF-17B458C2A3A8}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\CLSID\{436D67E1-2FB3-4A6C-B3CD-FF8A41B0664D}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\CLSID\{4764030F-2733-45B9-AE62-3D1F4F6F2861}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\CLSID\{52F6F7BD-DF73-44B3-AE13-89E1E1FB8F6A}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\CLSID\{5312C54E-A385-46B7-B200-ABAF81B03935}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\CLSID\{7D11E719-FF90-479C-B0D7-96EB43EE55D7}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\CLSID\{CDC95B92-E27C-4745-A8C5-64A52A78855D}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\CLSID\{CDD67718-A430-4AB9-A939-83D9074B0038}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\DownlWithIDM.IDMDwnlMgr" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\DownlWithIDM.IDMDwnlMgr.1" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\DownlWithIDM.LinkProcessor" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\DownlWithIDM.V2LinkProcessor" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\DownlWithIDM.LinkProcessor.1" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\DownlWithIDM.V2LinkProcessor.1" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\DownlWithIDM.VLinkProcessor" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\DownlWithIDM.VLinkProcessor.1" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\IDMan.CIDMLinkTransmitter" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\idmBroker.OptionsReader" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\idmBroker.OptionsReader.1" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Idmfsa.IDMEFSAgent" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Idmfsa.IDMEFSAgent.1" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\IDMGetAll.IDMAllLinksProcessor" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\IDMGetAll.IDMAllLinksProcessor.1" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\IDMIECC.IDMHelperLinksStorage" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\IDMIECC.IDMHelperLinksStorage.1" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\IDMIECC.IDMIEHlprObj" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\IDMIECC.IDMIEHlprObj.1" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Interface\{2223E76A-0894-4502-841F-0CF7517A713B}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Interface\{28670AE0-CAF4-4836-8418-0F456023EBF7}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Interface\{33AEF752-FB86-4787-9ED1-6010528F5FA3}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Interface\{356E6235-B055-46D9-8B32-BDC2266C9DAB}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Interface\{4BD46AAE-C51F-4BF7-8BC0-2E86E33D1873}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Interface\{6B9EB066-DA1F-4C0A-AC62-01AC892EF175}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Interface\{6EDC7F8E-EB3D-4F9A-B693-216F07C94D74}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Interface\{72B7361C-3568-4392-BCCD-D912CD5C1169}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Interface\{94D09862-1875-4FC9-B434-91CF25C840A1}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Interface\{98D060EC-53AF-4F61-8180-43C507C9FF94}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Interface\{A87AB5DD-211B-4284-8CBD-B92F77A5DE14}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Interface\{BC69364C-34D7-4225-B16F-8595C743C775}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Interface\{C7798BD6-34AF-4925-B01C-450C9EAD2DD9}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Interface\{C950922F-897A-4E13-BA38-66C8AF2E0BF7}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\TypeLib\{13D4E387-BAB7-47E7-B3D7-3F01ABC463EA}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\TypeLib\{37294E01-DB54-43AF-9D50-93FF7267DF5D}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\TypeLib\{3BDFC55C-ED33-43BB-9A77-57C2AF4B56EF}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\TypeLib\{5518B636-6884-48CA-A9A7-1CFD3F3BA916}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\TypeLib\{6A89524B-E1B6-4D71-972A-8FD53F240936}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\TypeLib\{ECF21EAB-3AA8-4355-82BE-F777990001DD}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\AppID\{0F947660-8606-420A-BAC6-51B84DD22A47}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\AppID\{3C085E26-7DF6-4A34-ADA6-877D06BAE9A8}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\AppID\{AC746233-E9D3-49CD-862F-068F7B7CCCA4}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\AppID\idmBroker.EXE" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\CLSID\{0055C089-8582-441B-A0BF-17B458C2A3A8}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\CLSID\{07999AC3-058B-40BF-984F-69EB1E554CA7}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\CLSID\{0F947660-8606-420A-BAC6-51B84DD22A47}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\CLSID\{436D67E1-2FB3-4A6C-B3CD-FF8A41B0664D}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\CLSID\{4764030F-2733-45B9-AE62-3D1F4F6F2861}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\CLSID\{52F6F7BD-DF73-44B3-AE13-89E1E1FB8F6A}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\CLSID\{5312C54E-A385-46B7-B200-ABAF81B03935}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\CLSID\{7D11E719-FF90-479C-B0D7-96EB43EE55D7}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\CLSID\{AC746233-E9D3-49CD-862F-068F7B7CCCA4}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\CLSID\{C950922F-897A-4E13-BA38-66C8AF2E0BF7}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\CLSID\{CDD67718-A430-4AB9-A939-83D9074B0038}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\CLSID\{D0FB58BB-2C07-492F-8BD0-A587E4874B4E}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\Interface\{2223E76A-0894-4502-841F-0CF7517A713B}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\Interface\{28670AE0-CAF4-4836-8418-0F456023EBF7}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\Interface\{33AEF752-FB86-4787-9ED1-6010528F5FA3}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\Interface\{356E6235-B055-46D9-8B32-BDC2266C9DAB}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\Interface\{4BD46AAE-C51F-4BF7-8BC0-2E86E33D1873}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\Interface\{6EDC7F8E-EB3D-4F9A-B693-216F07C94D74}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\Interface\{6B9EB066-DA1F-4C0A-AC62-01AC892EF175}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\Interface\{72B7361C-3568-4392-BCCD-D912CD5C1169}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\Interface\{94D09862-1875-4FC9-B434-91CF25C840A1}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\Interface\{98D060EC-53AF-4F61-8180-43C507C9FF94}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\Interface\{A87AB5DD-211B-4284-8CBD-B92F77A5DE14}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\Interface\{C7798BD6-34AF-4925-B01C-450C9EAD2DD9}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\Interface\{C950922F-897A-4E13-BA38-66C8AF2E0BF7}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\Interface\{BC69364C-34D7-4225-B16F-8595C743C775}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\TypeLib\{13D4E387-BAB7-47E7-B3D7-3F01ABC463EA}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\TypeLib\{37294E01-DB54-43AF-9D50-93FF7267DF5D}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\TypeLib\{3BDFC55C-ED33-43BB-9A77-57C2AF4B56EF}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\TypeLib\{5518B636-6884-48CA-A9A7-1CFD3F3BA916}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\TypeLib\{6A89524B-E1B6-4D71-972A-8FD53F240936}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Wow6432Node\TypeLib\{ECF21EAB-3AA8-4355-82BE-F777990001DD}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\AppID\{0F947660-8606-420A-BAC6-51B84DD22A47}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\AppID\{3C085E26-7DF6-4A34-ADA6-877D06BAE9A8}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\AppID\idmBroker.EXE" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\AppID\{AC746233-E9D3-49CD-862F-068F7B7CCCA4}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\CLSID\{0055C089-8582-441B-A0BF-17B458C2A3A8}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\CLSID\{436D67E1-2FB3-4A6C-B3CD-FF8A41B0664D}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\CLSID\{4764030F-2733-45B9-AE62-3D1F4F6F2861}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\CLSID\{52F6F7BD-DF73-44B3-AE13-89E1E1FB8F6A}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\CLSID\{5312C54E-A385-46B7-B200-ABAF81B03935}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\CLSID\{7D11E719-FF90-479C-B0D7-96EB43EE55D7}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\CLSID\{CDC95B92-E27C-4745-A8C5-64A52A78855D}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\CLSID\{CDD67718-A430-4AB9-A939-83D9074B0038}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\CLSID\{D0FB58BB-2C07-492F-8BD0-A587E4874B4E}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\DownlWithIDM.IDMDwnlMgr" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\DownlWithIDM.IDMDwnlMgr.1" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\DownlWithIDM.LinkProcessor" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\DownlWithIDM.LinkProcessor.1" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\DownlWithIDM.V2LinkProcessor.1" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\DownlWithIDM.V2LinkProcessor" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\DownlWithIDM.VLinkProcessor" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\DownlWithIDM.VLinkProcessor.1" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\IDMan.CIDMLinkTransmitter" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\idmBroker.OptionsReader" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\idmBroker.OptionsReader.1" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Idmfsa.IDMEFSAgent" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Idmfsa.IDMEFSAgent.1" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\IDMGetAll.IDMAllLinksProcessor" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\IDMGetAll.IDMAllLinksProcessor.1" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\IDMIECC.IDMHelperLinksStorage" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\IDMIECC.IDMHelperLinksStorage.1" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\IDMIECC.IDMIEHlprObj" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\IDMIECC.IDMIEHlprObj.1" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{2223E76A-0894-4502-841F-0CF7517A713B}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{28670AE0-CAF4-4836-8418-0F456023EBF7}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{33AEF752-FB86-4787-9ED1-6010528F5FA3}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{356E6235-B055-46D9-8B32-BDC2266C9DAB}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{4BD46AAE-C51F-4BF7-8BC0-2E86E33D1873}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{6B9EB066-DA1F-4C0A-AC62-01AC892EF175}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{6EDC7F8E-EB3D-4F9A-B693-216F07C94D74}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{72B7361C-3568-4392-BCCD-D912CD5C1169}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{94D09862-1875-4FC9-B434-91CF25C840A1}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{98D060EC-53AF-4F61-8180-43C507C9FF94}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{A87AB5DD-211B-4284-8CBD-B92F77A5DE14}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{BC69364C-34D7-4225-B16F-8595C743C775}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{C7798BD6-34AF-4925-B01C-450C9EAD2DD9}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{C950922F-897A-4E13-BA38-66C8AF2E0BF7}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\TypeLib\{13D4E387-BAB7-47E7-B3D7-3F01ABC463EA}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\TypeLib\{37294E01-DB54-43AF-9D50-93FF7267DF5D}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\TypeLib\{3BDFC55C-ED33-43BB-9A77-57C2AF4B56EF}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\TypeLib\{5518B636-6884-48CA-A9A7-1CFD3F3BA916}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\TypeLib\{6A89524B-E1B6-4D71-972A-8FD53F240936}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\TypeLib\{ECF21EAB-3AA8-4355-82BE-F777990001DD}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\CLSID\{0055C089-8582-441B-A0BF-17B458C2A3A8}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\CLSID\{0F947660-8606-420A-BAC6-51B84DD22A47}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\CLSID\{436D67E1-2FB3-4A6C-B3CD-FF8A41B0664D}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\CLSID\{4764030F-2733-45B9-AE62-3D1F4F6F2861}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\CLSID\{52F6F7BD-DF73-44B3-AE13-89E1E1FB8F6A}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\CLSID\{5312C54E-A385-46B7-B200-ABAF81B03935}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\CLSID\{7D11E719-FF90-479C-B0D7-96EB43EE55D7}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\CLSID\{AC746233-E9D3-49CD-862F-068F7B7CCCA4}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\CLSID\{C950922F-897A-4E13-BA38-66C8AF2E0BF7}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\CLSID\{CDD67718-A430-4AB9-A939-83D9074B0038}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\CLSID\{D0FB58BB-2C07-492F-8BD0-A587E4874B4E}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\Interface\{2223E76A-0894-4502-841F-0CF7517A713B}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\Interface\{28670AE0-CAF4-4836-8418-0F456023EBF7}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\Interface\{33AEF752-FB86-4787-9ED1-6010528F5FA3}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\Interface\{356E6235-B055-46D9-8B32-BDC2266C9DAB}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\Interface\{4BD46AAE-C51F-4BF7-8BC0-2E86E33D1873}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\Interface\{6B9EB066-DA1F-4C0A-AC62-01AC892EF175}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\Interface\{72B7361C-3568-4392-BCCD-D912CD5C1169}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\Interface\{6EDC7F8E-EB3D-4F9A-B693-216F07C94D74}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\Interface\{94D09862-1875-4FC9-B434-91CF25C840A1}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\Interface\{98D060EC-53AF-4F61-8180-43C507C9FF94}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\Interface\{A87AB5DD-211B-4284-8CBD-B92F77A5DE14}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\Interface\{BC69364C-34D7-4225-B16F-8595C743C775}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\Interface\{C7798BD6-34AF-4925-B01C-450C9EAD2DD9}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Wow6432Node\Interface\{C950922F-897A-4E13-BA38-66C8AF2E0BF7}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0055C089-8582-441B-A0BF-17B458C2A3A8}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{0055C089-8582-441B-A0BF-17B458C2A3A8}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\IDM Shell Extension" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\IDM Shell Extension" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved" /v "{CDC95B92-E27C-4745-A8C5-64A52A78855D}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved" /v "{CDC95B92-E27C-4745-A8C5-64A52A78855D}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Internet Explorer" /v "DownloadUI" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\DragDrop\{F6E1B27E-F2DA-4919-9DBD-CAB90A1D662B}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWAREMicrosoft\Internet Explorer\Low Rights\ElevationPolicy\{E0DACC63-037F-46EE-AC02-E4C7B0FBFEB4}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Tracing\IDMan_RASAPI32" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer" /v "DownloadUI" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\DragDrop\{F6E1B27E-F2DA-4919-9DBD-CAB90A1D662B}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{E0DACC63-037F-46EE-AC02-E4C7B0FBFEB4}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Wow6432Node\Microsoft\Tracing\IDMan_RASAPI32" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\services\IDMWFP" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\Classes\Wow6432Node\CLSID\{07999AC3-058B-40BF-984F-69EB1E554CA7}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\Microsoft\Internet Explorer\Low Rights\DragDrop\{19129CDA-AFC0-4330-99BC-C5A834F89006}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{15B851AF-A4B9-43EF-97D3-28E1B4A5DB9B}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{1902485B-CE75-42C1-BA2D-57E660793D9A}" /f2⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{E0DACC63-037F-46EE-AC02-E4C7B0FBFEB4}" /f2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\ExplorerStartupLog_RunOnce.etlFilesize
8KB
MD538f8edc34d052966f736b16b0700f333
SHA1adadf431339ce33f0e1add7aa9d89071e814a364
SHA2561a50068967243e46d6e83e2a0ec0bfdcda2a88695258f0970f76c1490f58e237
SHA5129c7f256cf336d5ffe62769fad6f4e57b75a21a82bbecbd5cd48d558026c7658af1df8b2c469625b707af6862ef3496f63900d75603bda17117dac64b42e7ab21
-
memory/364-147-0x0000000000000000-mapping.dmp
-
memory/532-142-0x0000000000000000-mapping.dmp
-
memory/540-159-0x0000000000000000-mapping.dmp
-
memory/720-192-0x0000000000000000-mapping.dmp
-
memory/820-194-0x0000000000000000-mapping.dmp
-
memory/868-191-0x0000000000000000-mapping.dmp
-
memory/1244-188-0x0000000000000000-mapping.dmp
-
memory/1284-186-0x0000000000000000-mapping.dmp
-
memory/1328-145-0x0000000000000000-mapping.dmp
-
memory/1412-141-0x0000000000000000-mapping.dmp
-
memory/1416-169-0x0000000000000000-mapping.dmp
-
memory/1472-189-0x0000000000000000-mapping.dmp
-
memory/1556-183-0x0000000000000000-mapping.dmp
-
memory/1680-179-0x0000000000000000-mapping.dmp
-
memory/1712-163-0x0000000000000000-mapping.dmp
-
memory/1716-176-0x0000000000000000-mapping.dmp
-
memory/1776-171-0x0000000000000000-mapping.dmp
-
memory/1828-143-0x0000000000000000-mapping.dmp
-
memory/1932-162-0x0000000000000000-mapping.dmp
-
memory/2012-158-0x0000000000000000-mapping.dmp
-
memory/2144-139-0x0000000000000000-mapping.dmp
-
memory/2172-184-0x0000000000000000-mapping.dmp
-
memory/2228-160-0x0000000000000000-mapping.dmp
-
memory/2352-138-0x0000000000000000-mapping.dmp
-
memory/2396-146-0x0000000000000000-mapping.dmp
-
memory/2488-172-0x0000000000000000-mapping.dmp
-
memory/2548-133-0x0000000000000000-mapping.dmp
-
memory/3036-168-0x0000000000000000-mapping.dmp
-
memory/3104-150-0x0000000000000000-mapping.dmp
-
memory/3396-173-0x0000000000000000-mapping.dmp
-
memory/3400-180-0x0000000000000000-mapping.dmp
-
memory/3468-152-0x0000000000000000-mapping.dmp
-
memory/3532-177-0x0000000000000000-mapping.dmp
-
memory/3572-178-0x0000000000000000-mapping.dmp
-
memory/3784-161-0x0000000000000000-mapping.dmp
-
memory/3836-187-0x0000000000000000-mapping.dmp
-
memory/3984-185-0x0000000000000000-mapping.dmp
-
memory/4008-195-0x0000000000000000-mapping.dmp
-
memory/4028-164-0x0000000000000000-mapping.dmp
-
memory/4072-174-0x0000000000000000-mapping.dmp
-
memory/4104-193-0x0000000000000000-mapping.dmp
-
memory/4132-155-0x0000000000000000-mapping.dmp
-
memory/4212-190-0x0000000000000000-mapping.dmp
-
memory/4328-175-0x0000000000000000-mapping.dmp
-
memory/4408-149-0x0000000000000000-mapping.dmp
-
memory/4424-148-0x0000000000000000-mapping.dmp
-
memory/4460-182-0x0000000000000000-mapping.dmp
-
memory/4480-136-0x0000000000000000-mapping.dmp
-
memory/4524-167-0x0000000000000000-mapping.dmp
-
memory/4556-140-0x0000000000000000-mapping.dmp
-
memory/4612-154-0x0000000000000000-mapping.dmp
-
memory/4704-196-0x0000000000000000-mapping.dmp
-
memory/4720-135-0x0000000000000000-mapping.dmp
-
memory/4724-165-0x0000000000000000-mapping.dmp
-
memory/4776-134-0x0000000000000000-mapping.dmp
-
memory/4808-181-0x0000000000000000-mapping.dmp
-
memory/4852-157-0x0000000000000000-mapping.dmp
-
memory/4908-156-0x0000000000000000-mapping.dmp
-
memory/4932-151-0x0000000000000000-mapping.dmp
-
memory/4968-166-0x0000000000000000-mapping.dmp
-
memory/4992-170-0x0000000000000000-mapping.dmp
-
memory/5064-132-0x0000000000000000-mapping.dmp
-
memory/5068-137-0x0000000000000000-mapping.dmp
-
memory/5084-153-0x0000000000000000-mapping.dmp