Overview
overview
8Static
static
3IDM_v6.41....��.bat
windows7-x64
8IDM_v6.41....��.bat
windows10-2004-x64
8IDM_v6.41....��.bat
windows7-x64
8IDM_v6.41....��.bat
windows10-2004-x64
8background.js
windows7-x64
1background.js
windows10-2004-x64
1captured.html
windows7-x64
1captured.html
windows10-2004-x64
1content.js
windows7-x64
1content.js
windows10-2004-x64
1debug.js
windows7-x64
1debug.js
windows10-2004-x64
1document.js
windows7-x64
1document.js
windows10-2004-x64
1welcome.html
windows7-x64
1welcome.html
windows10-2004-x64
1welcome.js
windows7-x64
1welcome.js
windows10-2004-x64
1IDM_v6.41....64.dll
windows7-x64
1IDM_v6.41....64.dll
windows10-2004-x64
1IDM_v6.41....ll.dll
windows7-x64
1IDM_v6.41....ll.dll
windows10-2004-x64
1IDM_v6.41....64.dll
windows7-x64
4IDM_v6.41....64.dll
windows10-2004-x64
4IDM_v6.41....lp.exe
windows7-x64
1IDM_v6.41....lp.exe
windows10-2004-x64
1IDM_v6.41....CC.dll
windows7-x64
1IDM_v6.41....CC.dll
windows10-2004-x64
1IDM_v6.41....64.dll
windows7-x64
4IDM_v6.41....64.dll
windows10-2004-x64
4IDM_v6.41....64.exe
windows7-x64
1IDM_v6.41....64.exe
windows10-2004-x64
1Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 01:56
Static task
static1
Behavioral task
behavioral1
Sample
IDM_v6.41.6_Repack/!)卸载.bat
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
IDM_v6.41.6_Repack/!)卸载.bat
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
IDM_v6.41.6_Repack/!)绿化.bat
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
IDM_v6.41.6_Repack/!)绿化.bat
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
background.js
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
background.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
captured.html
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
captured.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
content.js
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
content.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral11
Sample
debug.js
Resource
win7-20230831-en
Behavioral task
behavioral12
Sample
debug.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral13
Sample
document.js
Resource
win7-20230831-en
Behavioral task
behavioral14
Sample
document.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral15
Sample
welcome.html
Resource
win7-20230831-en
Behavioral task
behavioral16
Sample
welcome.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral17
Sample
welcome.js
Resource
win7-20230831-en
Behavioral task
behavioral18
Sample
welcome.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral19
Sample
IDM_v6.41.6_Repack/IDMFType64.dll
Resource
win7-20230831-en
Behavioral task
behavioral20
Sample
IDM_v6.41.6_Repack/IDMFType64.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral21
Sample
IDM_v6.41.6_Repack/IDMGetAll.dll
Resource
win7-20230831-en
Behavioral task
behavioral22
Sample
IDM_v6.41.6_Repack/IDMGetAll.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral23
Sample
IDM_v6.41.6_Repack/IDMGetAll64.dll
Resource
win7-20230831-en
Behavioral task
behavioral24
Sample
IDM_v6.41.6_Repack/IDMGetAll64.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral25
Sample
IDM_v6.41.6_Repack/IDMGrHlp.exe
Resource
win7-20230831-en
Behavioral task
behavioral26
Sample
IDM_v6.41.6_Repack/IDMGrHlp.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral27
Sample
IDM_v6.41.6_Repack/IDMIECC.dll
Resource
win7-20230831-en
Behavioral task
behavioral28
Sample
IDM_v6.41.6_Repack/IDMIECC.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral29
Sample
IDM_v6.41.6_Repack/IDMIECC64.dll
Resource
win7-20230831-en
Behavioral task
behavioral30
Sample
IDM_v6.41.6_Repack/IDMIECC64.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral31
Sample
IDM_v6.41.6_Repack/IDMIntegrator64.exe
Resource
win7-20230831-en
Behavioral task
behavioral32
Sample
IDM_v6.41.6_Repack/IDMIntegrator64.exe
Resource
win10v2004-20230915-en
General
-
Target
IDM_v6.41.6_Repack/!)卸载.bat
-
Size
15KB
-
MD5
aff65aeaeb135c7415f7085f5e891a5d
-
SHA1
0d0d12bef62c3e9a298a1df6076c6ef2c0015f7a
-
SHA256
09dd0195c31919a1a4458ffa25646bba14db7a3cba297b90e268fd51c5dd95c8
-
SHA512
4aba5814790eb74ca7632427b4ba51fdbf7cdd1fddfc71a35fccb30abca5329c5a1420f509f6b6c46825cc5de0480324836bb294327d36cec705562dd1aec25f
-
SSDEEP
384:MCFmoOfgEBLkHr5kkBQUsnLow8jqOVAyF+uVF+uS:Hr5kkBQxLow8jPVAF
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\DRIVERS\idmwfp.sys RUNDLL32.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" RUNDLL32.EXE -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.app.log RUNDLL32.EXE -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe -
Kills process with taskkill 5 IoCs
pid Process 2396 taskkill.exe 2668 taskkill.exe 2580 taskkill.exe 2596 taskkill.exe 2708 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{15B851AF-A4B9-43EF-97D3-28E1B4A5DB9B} idmBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{15B851AF-A4B9-43EF-97D3-28E1B4A5DB9B}\AppName = "idmBroker.exe" idmBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{15B851AF-A4B9-43EF-97D3-28E1B4A5DB9B}\AppPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\IDM_v6.41.6_Repack" idmBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{15B851AF-A4B9-43EF-97D3-28E1B4A5DB9B}\Policy = "3" idmBroker.exe Key deleted \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{15B851AF-A4B9-43EF-97D3-28E1B4A5DB9B} reg.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Low Rights idmBroker.exe Key created \REGISTRY\USER\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy idmBroker.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\idmBroker.OptionsReader.1\CLSID idmBroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\idmBroker.OptionsReader\CurVer\ = "idmBroker.OptionsReader.1" idmBroker.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{3C085E26-7DF6-4A34-ADA6-877D06BAE9A8} reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{2223E76A-0894-4502-841F-0CF7517A713B} idmBroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{2223E76A-0894-4502-841F-0CF7517A713B}\ = "IOptionsReader" idmBroker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2223E76A-0894-4502-841F-0CF7517A713B}\ProxyStubClsid32 idmBroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D0FB58BB-2C07-492F-8BD0-A587E4874B4E}\ProgID\ = "idmBroker.OptionsReader.1" idmBroker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{13D4E387-BAB7-47E7-B3D7-3F01ABC463EA}\1.0\0 idmBroker.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\idmBroker.OptionsReader\CurVer reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{13D4E387-BAB7-47E7-B3D7-3F01ABC463EA}\1.0 reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D0FB58BB-2C07-492F-8BD0-A587E4874B4E}\ProgID idmBroker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{13D4E387-BAB7-47E7-B3D7-3F01ABC463EA}\1.0 idmBroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{13D4E387-BAB7-47E7-B3D7-3F01ABC463EA}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\IDM_v6.41.6_Repack" idmBroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2223E76A-0894-4502-841F-0CF7517A713B}\ = "IOptionsReader" idmBroker.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2223E76A-0894-4502-841F-0CF7517A713B} reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2223E76A-0894-4502-841F-0CF7517A713B} idmBroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2223E76A-0894-4502-841F-0CF7517A713B}\TypeLib\ = "{13D4E387-BAB7-47E7-B3D7-3F01ABC463EA}" idmBroker.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\idmBroker.OptionsReader\CLSID reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\idmBroker.OptionsReader.1 reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D0FB58BB-2C07-492F-8BD0-A587E4874B4E}\TypeLib idmBroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{13D4E387-BAB7-47E7-B3D7-3F01ABC463EA}\1.0\FLAGS\ = "0" idmBroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{2223E76A-0894-4502-841F-0CF7517A713B}\TypeLib\ = "{13D4E387-BAB7-47E7-B3D7-3F01ABC463EA}" idmBroker.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2223E76A-0894-4502-841F-0CF7517A713B}\ProxyStubClsid32 reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D0FB58BB-2C07-492F-8BD0-A587E4874B4E}\VersionIndependentProgID reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{2223E76A-0894-4502-841F-0CF7517A713B}\TypeLib reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\idmBroker.EXE\AppID = "{3C085E26-7DF6-4A34-ADA6-877D06BAE9A8}" idmBroker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\idmBroker.OptionsReader.1 idmBroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\idmBroker.OptionsReader\ = "OptionsReader Class" idmBroker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D0FB58BB-2C07-492F-8BD0-A587E4874B4E}\Programmable idmBroker.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{2223E76A-0894-4502-841F-0CF7517A713B} reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D0FB58BB-2C07-492F-8BD0-A587E4874B4E}\LocalServer32 idmBroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D0FB58BB-2C07-492F-8BD0-A587E4874B4E}\TypeLib\ = "{13D4E387-BAB7-47E7-B3D7-3F01ABC463EA}" idmBroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2223E76A-0894-4502-841F-0CF7517A713B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" idmBroker.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\idmBroker.EXE reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\idmBroker.OptionsReader.1\ = "OptionsReader Class" idmBroker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\idmBroker.OptionsReader\CLSID idmBroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\idmBroker.OptionsReader\CLSID\ = "{D0FB58BB-2C07-492F-8BD0-A587E4874B4E}" idmBroker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\idmBroker.OptionsReader\CurVer idmBroker.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\idmBroker.OptionsReader reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D0FB58BB-2C07-492F-8BD0-A587E4874B4E}\Programmable reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2223E76A-0894-4502-841F-0CF7517A713B}\TypeLib\Version = "1.0" idmBroker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\idmBroker.EXE idmBroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D0FB58BB-2C07-492F-8BD0-A587E4874B4E}\LocalServer32\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\IDM_v6.41.6_Repack\\idmBroker.exe\"" idmBroker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{13D4E387-BAB7-47E7-B3D7-3F01ABC463EA}\1.0\HELPDIR idmBroker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{2223E76A-0894-4502-841F-0CF7517A713B}\TypeLib idmBroker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D0FB58BB-2C07-492F-8BD0-A587E4874B4E} idmBroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D0FB58BB-2C07-492F-8BD0-A587E4874B4E}\ = "OptionsReader Class" idmBroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{2223E76A-0894-4502-841F-0CF7517A713B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" idmBroker.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{13D4E387-BAB7-47E7-B3D7-3F01ABC463EA}\1.0\FLAGS reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\idmBroker.OptionsReader.1\CLSID\ = "{D0FB58BB-2C07-492F-8BD0-A587E4874B4E}" idmBroker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2223E76A-0894-4502-841F-0CF7517A713B}\TypeLib idmBroker.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\idmBroker.OptionsReader.1\CLSID reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D0FB58BB-2C07-492F-8BD0-A587E4874B4E} reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{13D4E387-BAB7-47E7-B3D7-3F01ABC463EA}\1.0\0 reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{13D4E387-BAB7-47E7-B3D7-3F01ABC463EA} reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{2223E76A-0894-4502-841F-0CF7517A713B}\TypeLib\Version = "1.0" idmBroker.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{13D4E387-BAB7-47E7-B3D7-3F01ABC463EA}\1.0\HELPDIR reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2223E76A-0894-4502-841F-0CF7517A713B}\TypeLib reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D0FB58BB-2C07-492F-8BD0-A587E4874B4E}\ProgID reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{3C085E26-7DF6-4A34-ADA6-877D06BAE9A8} idmBroker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{13D4E387-BAB7-47E7-B3D7-3F01ABC463EA} idmBroker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{13D4E387-BAB7-47E7-B3D7-3F01ABC463EA}\1.0\FLAGS idmBroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{13D4E387-BAB7-47E7-B3D7-3F01ABC463EA}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\IDM_v6.41.6_Repack\\idmBroker.exe" idmBroker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{2223E76A-0894-4502-841F-0CF7517A713B}\ProxyStubClsid32 idmBroker.exe -
Runs .reg file with regedit 1 IoCs
pid Process 1752 regedit.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 10 IoCs
pid Process 2964 idmBroker.exe 2644 Uninstall.exe 2488 regsvr32.exe 2300 regsvr32.exe 2656 regsvr32.exe 2468 regsvr32.exe 1608 regsvr32.exe 2860 regsvr32.exe 2800 regsvr32.exe 484 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 52 IoCs
description pid Process Token: SeDebugPrivilege 2396 taskkill.exe Token: SeDebugPrivilege 2668 taskkill.exe Token: SeDebugPrivilege 2580 taskkill.exe Token: SeDebugPrivilege 2596 taskkill.exe Token: SeDebugPrivilege 2708 taskkill.exe Token: SeRestorePrivilege 2960 RUNDLL32.EXE Token: SeRestorePrivilege 2960 RUNDLL32.EXE Token: SeRestorePrivilege 2960 RUNDLL32.EXE Token: SeRestorePrivilege 2960 RUNDLL32.EXE Token: SeRestorePrivilege 2960 RUNDLL32.EXE Token: SeRestorePrivilege 2960 RUNDLL32.EXE Token: SeRestorePrivilege 2960 RUNDLL32.EXE Token: SeIncreaseQuotaPrivilege 2064 WMIC.exe Token: SeSecurityPrivilege 2064 WMIC.exe Token: SeTakeOwnershipPrivilege 2064 WMIC.exe Token: SeLoadDriverPrivilege 2064 WMIC.exe Token: SeSystemProfilePrivilege 2064 WMIC.exe Token: SeSystemtimePrivilege 2064 WMIC.exe Token: SeProfSingleProcessPrivilege 2064 WMIC.exe Token: SeIncBasePriorityPrivilege 2064 WMIC.exe Token: SeCreatePagefilePrivilege 2064 WMIC.exe Token: SeBackupPrivilege 2064 WMIC.exe Token: SeRestorePrivilege 2064 WMIC.exe Token: SeShutdownPrivilege 2064 WMIC.exe Token: SeDebugPrivilege 2064 WMIC.exe Token: SeSystemEnvironmentPrivilege 2064 WMIC.exe Token: SeRemoteShutdownPrivilege 2064 WMIC.exe Token: SeUndockPrivilege 2064 WMIC.exe Token: SeManageVolumePrivilege 2064 WMIC.exe Token: 33 2064 WMIC.exe Token: 34 2064 WMIC.exe Token: 35 2064 WMIC.exe Token: SeIncreaseQuotaPrivilege 2064 WMIC.exe Token: SeSecurityPrivilege 2064 WMIC.exe Token: SeTakeOwnershipPrivilege 2064 WMIC.exe Token: SeLoadDriverPrivilege 2064 WMIC.exe Token: SeSystemProfilePrivilege 2064 WMIC.exe Token: SeSystemtimePrivilege 2064 WMIC.exe Token: SeProfSingleProcessPrivilege 2064 WMIC.exe Token: SeIncBasePriorityPrivilege 2064 WMIC.exe Token: SeCreatePagefilePrivilege 2064 WMIC.exe Token: SeBackupPrivilege 2064 WMIC.exe Token: SeRestorePrivilege 2064 WMIC.exe Token: SeShutdownPrivilege 2064 WMIC.exe Token: SeDebugPrivilege 2064 WMIC.exe Token: SeSystemEnvironmentPrivilege 2064 WMIC.exe Token: SeRemoteShutdownPrivilege 2064 WMIC.exe Token: SeUndockPrivilege 2064 WMIC.exe Token: SeManageVolumePrivilege 2064 WMIC.exe Token: 33 2064 WMIC.exe Token: 34 2064 WMIC.exe Token: 35 2064 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2456 wrote to memory of 2432 2456 cmd.exe 29 PID 2456 wrote to memory of 2432 2456 cmd.exe 29 PID 2456 wrote to memory of 2432 2456 cmd.exe 29 PID 2456 wrote to memory of 2396 2456 cmd.exe 30 PID 2456 wrote to memory of 2396 2456 cmd.exe 30 PID 2456 wrote to memory of 2396 2456 cmd.exe 30 PID 2456 wrote to memory of 2668 2456 cmd.exe 32 PID 2456 wrote to memory of 2668 2456 cmd.exe 32 PID 2456 wrote to memory of 2668 2456 cmd.exe 32 PID 2456 wrote to memory of 2580 2456 cmd.exe 33 PID 2456 wrote to memory of 2580 2456 cmd.exe 33 PID 2456 wrote to memory of 2580 2456 cmd.exe 33 PID 2456 wrote to memory of 2596 2456 cmd.exe 34 PID 2456 wrote to memory of 2596 2456 cmd.exe 34 PID 2456 wrote to memory of 2596 2456 cmd.exe 34 PID 2456 wrote to memory of 2708 2456 cmd.exe 35 PID 2456 wrote to memory of 2708 2456 cmd.exe 35 PID 2456 wrote to memory of 2708 2456 cmd.exe 35 PID 2456 wrote to memory of 2964 2456 cmd.exe 36 PID 2456 wrote to memory of 2964 2456 cmd.exe 36 PID 2456 wrote to memory of 2964 2456 cmd.exe 36 PID 2456 wrote to memory of 2964 2456 cmd.exe 36 PID 2456 wrote to memory of 2644 2456 cmd.exe 37 PID 2456 wrote to memory of 2644 2456 cmd.exe 37 PID 2456 wrote to memory of 2644 2456 cmd.exe 37 PID 2456 wrote to memory of 2644 2456 cmd.exe 37 PID 2456 wrote to memory of 2644 2456 cmd.exe 37 PID 2456 wrote to memory of 2644 2456 cmd.exe 37 PID 2456 wrote to memory of 2644 2456 cmd.exe 37 PID 2644 wrote to memory of 2960 2644 Uninstall.exe 38 PID 2644 wrote to memory of 2960 2644 Uninstall.exe 38 PID 2644 wrote to memory of 2960 2644 Uninstall.exe 38 PID 2644 wrote to memory of 2960 2644 Uninstall.exe 38 PID 2960 wrote to memory of 2760 2960 RUNDLL32.EXE 39 PID 2960 wrote to memory of 2760 2960 RUNDLL32.EXE 39 PID 2960 wrote to memory of 2760 2960 RUNDLL32.EXE 39 PID 2760 wrote to memory of 1716 2760 runonce.exe 40 PID 2760 wrote to memory of 1716 2760 runonce.exe 40 PID 2760 wrote to memory of 1716 2760 runonce.exe 40 PID 2456 wrote to memory of 2488 2456 cmd.exe 41 PID 2456 wrote to memory of 2488 2456 cmd.exe 41 PID 2456 wrote to memory of 2488 2456 cmd.exe 41 PID 2456 wrote to memory of 2488 2456 cmd.exe 41 PID 2456 wrote to memory of 2488 2456 cmd.exe 41 PID 2488 wrote to memory of 3036 2488 regsvr32.exe 43 PID 2488 wrote to memory of 3036 2488 regsvr32.exe 43 PID 2488 wrote to memory of 3036 2488 regsvr32.exe 43 PID 2488 wrote to memory of 3036 2488 regsvr32.exe 43 PID 2488 wrote to memory of 3036 2488 regsvr32.exe 43 PID 2488 wrote to memory of 3036 2488 regsvr32.exe 43 PID 2488 wrote to memory of 3036 2488 regsvr32.exe 43 PID 2456 wrote to memory of 2300 2456 cmd.exe 44 PID 2456 wrote to memory of 2300 2456 cmd.exe 44 PID 2456 wrote to memory of 2300 2456 cmd.exe 44 PID 2456 wrote to memory of 2300 2456 cmd.exe 44 PID 2456 wrote to memory of 2300 2456 cmd.exe 44 PID 2456 wrote to memory of 2656 2456 cmd.exe 45 PID 2456 wrote to memory of 2656 2456 cmd.exe 45 PID 2456 wrote to memory of 2656 2456 cmd.exe 45 PID 2456 wrote to memory of 2656 2456 cmd.exe 45 PID 2456 wrote to memory of 2656 2456 cmd.exe 45 PID 2656 wrote to memory of 2416 2656 regsvr32.exe 46 PID 2656 wrote to memory of 2416 2656 regsvr32.exe 46 PID 2656 wrote to memory of 2416 2656 regsvr32.exe 46
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\IDM_v6.41.6_Repack\!)卸载.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\system32\reg.exeREG QUERY "HKU\S-1-5-19"2⤵PID:2432
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM "IDM*" /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM "IEMonitor.exe"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM "IDMMsgHost.exe"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2580
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM "MediumILStart.exe"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM "IDMIntegrator64.exe"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
C:\Users\Admin\AppData\Local\Temp\IDM_v6.41.6_Repack\idmBroker.exe"C:\Users\Admin\AppData\Local\Temp\IDM_v6.41.6_Repack\idmBroker.exe" -RegServer2⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2964
-
-
C:\Users\Admin\AppData\Local\Temp\IDM_v6.41.6_Repack\Uninstall.exe"C:\Users\Admin\AppData\Local\Temp\IDM_v6.41.6_Repack\Uninstall.exe" -uninstdriv2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\system32\RUNDLL32.EXE"C:\Windows\Sysnative\RUNDLL32.EXE" SETUPAPI.DLL,InstallHinfSection DefaultUninstall 128 C:\Users\Admin\AppData\Local\Temp\IDM_v6.41.6_Repack\idmwfp.inf3⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\system32\runonce.exe"C:\Windows\system32\runonce.exe" -r4⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\System32\grpconv.exe"C:\Windows\System32\grpconv.exe" -o5⤵PID:1716
-
-
-
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s /u IDMIECC.dll2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\regsvr32.exe/s /u IDMIECC.dll3⤵PID:3036
-
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s /u IDMIECC64.dll2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2300
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s /u IDMGetAll.dll2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\regsvr32.exe/s /u IDMGetAll.dll3⤵PID:2416
-
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s /u IDMGetAll64.dll2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2468
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s /u IDMShellExt.dll2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1608 -
C:\Windows\SysWOW64\regsvr32.exe/s /u IDMShellExt.dll3⤵PID:2392
-
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s /u IDMShellExt64.dll2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2860
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s /u downlWithIDM.dll2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2800 -
C:\Windows\SysWOW64\regsvr32.exe/s /u downlWithIDM.dll3⤵PID:2588
-
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s /u downlWithIDM64.dll2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:484
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" ver"2⤵PID:1820
-
-
C:\Windows\system32\findstr.exefindstr "\<6\.[0-9]\.[0-9][0-9]*\> \<10\.[0-9]\.[0-9][0-9]*\>"2⤵PID:1920
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" ver"2⤵PID:2232
-
-
C:\Windows\system32\findstr.exefindstr "5\.[0-9]\.[0-9][0-9]*"2⤵PID:112
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Internet Download Manager" /f2⤵PID:1512
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Internet Download Manager" /f /reg:322⤵PID:2676
-
-
C:\Windows\system32\reg.exereg delete "HKLM\Software\DownloadManager" /f2⤵PID:1684
-
-
C:\Windows\system32\reg.exereg delete "HKLM\Software\Download Manager" /f2⤵PID:2008
-
-
C:\Windows\system32\reg.exereg delete "HKLM\Software\DownloadManager" /f /reg:322⤵PID:1160
-
-
C:\Windows\system32\reg.exereg delete "HKLM\Software\Download Manager" /f /reg:322⤵PID:1576
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Internet Download Manager" /f2⤵PID:1656
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Internet Download Manager" /f /reg:322⤵PID:1672
-
-
C:\Windows\system32\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "IDMan"2⤵PID:1184
-
-
C:\Windows\system32\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "IDMan" /reg:322⤵PID:2792
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\IDMan.CIDMLinkTransmitter" /f2⤵PID:2788
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Idmfsa.IDMEFSAgent" /f2⤵PID:2864
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Idmfsa.IDMEFSAgent.1" /f2⤵PID:2856
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\AppID\idmBroker.EXE" /f2⤵
- Modifies registry class
PID:2832
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\idmBroker.OptionsReader" /f2⤵
- Modifies registry class
PID:2848
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\idmBroker.OptionsReader.1" /f2⤵
- Modifies registry class
PID:2816
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\AppID\{0F947660-8606-420A-BAC6-51B84DD22A47}" /f2⤵PID:580
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\AppID\{3C085E26-7DF6-4A34-ADA6-877D06BAE9A8}" /f2⤵
- Modifies registry class
PID:664
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\AppID\{AC746233-E9D3-49CD-862F-068F7B7CCCA4}" /f2⤵PID:524
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\CLSID\{0055C089-8582-441B-A0BF-17B458C2A3A8}" /f2⤵PID:772
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\CLSID\{0F947660-8606-420A-BAC6-51B84DD22A47}" /f2⤵PID:1196
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\CLSID\{AC746233-E9D3-49CD-862F-068F7B7CCCA4}" /f2⤵PID:1408
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\CLSID\{C950922F-897A-4E13-BA38-66C8AF2E0BF7}" /f2⤵PID:1376
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\TypeLib\{5518B636-6884-48CA-A9A7-1CFD3F3BA916}" /f2⤵PID:1284
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\TypeLib\{ECF21EAB-3AA8-4355-82BE-F777990001DD}" /f2⤵PID:1496
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\TypeLib\{13D4E387-BAB7-47E7-B3D7-3F01ABC463EA}" /f2⤵
- Modifies registry class
PID:616
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{2223E76A-0894-4502-841F-0CF7517A713B}" /f2⤵
- Modifies registry class
PID:1508
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{28670AE0-CAF4-4836-8418-0F456023EBF7}" /f2⤵PID:1368
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{4BD46AAE-C51F-4BF7-8BC0-2E86E33D1873}" /f2⤵PID:1356
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{6B9EB066-DA1F-4C0A-AC62-01AC892EF175}" /f2⤵PID:1756
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{6EDC7F8E-EB3D-4F9A-B693-216F07C94D74}" /f2⤵PID:2928
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{A87AB5DD-211B-4284-8CBD-B92F77A5DE14}" /f2⤵PID:2900
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{94D09862-1875-4FC9-B434-91CF25C840A1}" /f2⤵PID:2664
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{C950922F-897A-4E13-BA38-66C8AF2E0BF7}" /f2⤵PID:2880
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\CLSID\{0055C089-8582-441B-A0BF-17B458C2A3A8}" /f /reg:322⤵PID:2940
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\CLSID\{0F947660-8606-420A-BAC6-51B84DD22A47}" /f /reg:322⤵PID:2896
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\CLSID\{AC746233-E9D3-49CD-862F-068F7B7CCCA4}" /f /reg:322⤵PID:3056
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\CLSID\{C950922F-897A-4E13-BA38-66C8AF2E0BF7}" /f /reg:322⤵PID:2892
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\CLSID\{D0FB58BB-2C07-492F-8BD0-A587E4874B4E}" /f /reg:322⤵
- Modifies registry class
PID:584
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{2223E76A-0894-4502-841F-0CF7517A713B}" /f /reg:322⤵
- Modifies registry class
PID:956
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{28670AE0-CAF4-4836-8418-0F456023EBF7}" /f /reg:322⤵PID:312
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{4BD46AAE-C51F-4BF7-8BC0-2E86E33D1873}" /f /reg:322⤵PID:1244
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{6B9EB066-DA1F-4C0A-AC62-01AC892EF175}" /f /reg:322⤵PID:2080
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{6EDC7F8E-EB3D-4F9A-B693-216F07C94D74}" /f /reg:322⤵PID:2072
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{94D09862-1875-4FC9-B434-91CF25C840A1}" /f /reg:322⤵PID:2364
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{A87AB5DD-211B-4284-8CBD-B92F77A5DE14}" /f /reg:322⤵PID:1480
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Classes\Interface\{C950922F-897A-4E13-BA38-66C8AF2E0BF7}" /f /reg:322⤵PID:2100
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Google\Chrome\NativeMessagingHosts\com.tonec.idm" /f2⤵PID:2104
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Google\Chrome\Extensions\ngpampappnmepgilojfohadhhmbhlaek" /f2⤵PID:2040
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Google\Chrome\NativeMessagingHosts\com.tonec.idm" /f /reg:322⤵PID:2084
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Google\Chrome\Extensions\ngpampappnmepgilojfohadhhmbhlaek" /f /reg:322⤵PID:2056
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4" /f2⤵PID:2528
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Internet Explorer" /f /v "DownloadUI"2⤵PID:3028
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\DragDrop\{F6E1B27E-F2DA-4919-9DBD-CAB90A1D662B}" /f2⤵PID:3052
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{E0DACC63-037F-46EE-AC02-E4C7B0FBFEB4}" /f2⤵PID:624
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0055C089-8582-441B-A0BF-17B458C2A3A8}" /f2⤵PID:1472
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Internet Explorer" /f /v "DownloadUI" /reg:322⤵PID:1476
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\DragDrop\{F6E1B27E-F2DA-4919-9DBD-CAB90A1D662B}" /f /reg:322⤵PID:1200
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{E0DACC63-037F-46EE-AC02-E4C7B0FBFEB4}" /f /reg:322⤵PID:836
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0055C089-8582-441B-A0BF-17B458C2A3A8}" /f /reg:322⤵PID:2916
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Tracing\IDMan_RASAPI32" /f2⤵PID:2876
-
-
C:\Windows\system32\reg.exereg delete "HKLM\SOFTWARE\Microsoft\Tracing\IDMan_RASAPI32" /f /reg:322⤵PID:1676
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy\PolicyApplicationState" /f /v "PolicyState" /t REG_DWORD /d "2"2⤵PID:2444
-
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /f /v "IDMan"2⤵PID:1784
-
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Classes\CLSID\{07999AC3-058B-40BF-984F-69EB1E554CA7}" /f2⤵PID:1080
-
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Classes\CLSID\{07999AC3-058B-40BF-984F-69EB1E554CA7}" /reg:32 /f2⤵PID:2312
-
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Classes\CLSID\Software\Classes\CLSID\{E6871B76-C3C8-44DD-B947-ABFFE144860D}" /f2⤵PID:440
-
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\CocCoc\Browser\NativeMessagingHosts\com.tonec.idm" /f2⤵PID:2972
-
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\CocCoc\Browser\Extensions\ngpampappnmepgilojfohadhhmbhlaek" /f2⤵PID:2984
-
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Edge\NativeMessagingHosts\com.tonec.idm" /f2⤵PID:2976
-
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Edge\Extensions\llbjbkhnmlidjebalopleeepgdfgcpec" /f2⤵PID:832
-
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Internet Explorer" /f /v "DownloadUI"2⤵PID:2936
-
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Internet Explorer" /f /v "DownloadUI" /reg:322⤵PID:1060
-
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Internet Explorer\MenuExt\╩╣╙├ IDM ╧┬╘╪" /f2⤵PID:1140
-
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Internet Explorer\MenuExt\╩╣╙├ IDM ╧┬╘╪╚½▓┐┴┤╜╙" /f2⤵PID:1728
-
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Mozilla\NativeMessagingHosts\com.tonec.idm" /f2⤵PID:1332
-
-
C:\Windows\system32\reg.exePID:824
-
-
C:\Windows\system32\reg.exePID:1900
-
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Internet Explorer\Low Rights\DragDrop\{19129CDA-AFC0-4330-99BC-C5A834F89006}" /f2⤵PID:1956
-
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{15B851AF-A4B9-43EF-97D3-28E1B4A5DB9B}" /f2⤵
- Modifies Internet Explorer settings
PID:1528
-
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{1902485B-CE75-42C1-BA2D-57E660793D9A}" /f2⤵PID:1808
-
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{E0DACC63-037F-46EE-AC02-E4C7B0FBFEB4}" /f2⤵PID:1644
-
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\Classes\CLSID\{E6871B76-C3C8-44DD-B947-ABFFE144860D}" /f2⤵PID:1232
-
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\Classes\CLSID\{E6871B76-C3C8-44DD-B947-ABFFE144860D}" /f /reg:322⤵PID:1612
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic userAccount where "Name='Admin'" get SID /value2⤵PID:976
-
C:\Windows\System32\Wbem\WMIC.exewmic userAccount where "Name='Admin'" get SID /value3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2064
-
-
-
C:\Windows\system32\reg.exereg delete "HKU\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "IDMan"2⤵PID:2476
-
-
C:\Windows\system32\reg.exereg delete "HKU\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer" /f /v "DownloadUI"2⤵PID:1084
-
-
C:\Windows\system32\reg.exereg delete "HKU\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer" /f /v "DownloadUI" /reg:322⤵PID:892
-
-
C:\Windows\system32\reg.exereg delete "HKU\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\MenuExt\╩╣╙├ IDM ╧┬╘╪" /f2⤵PID:904
-
-
C:\Windows\system32\reg.exereg delete "HKU\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\MenuExt\╩╣╙├ IDM ╧┬╘╪╚½▓┐┴┤╜╙" /f2⤵PID:2120
-
-
C:\Windows\system32\reg.exereg delete "HKU\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\CocCoc\Browser\NativeMessagingHosts\com.tonec.idm" /f2⤵PID:600
-
-
C:\Windows\system32\reg.exereg delete "HKU\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\CocCoc\Browser\Extensions\ngpampappnmepgilojfohadhhmbhlaek" /f2⤵PID:560
-
-
C:\Windows\system32\reg.exereg delete "HKU\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Edge\NativeMessagingHosts\com.tonec.idm" /f2⤵PID:2344
-
-
C:\Windows\system32\reg.exereg delete "HKU\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Edge\Extensions\llbjbkhnmlidjebalopleeepgdfgcpec" /f2⤵PID:2240
-
-
C:\Windows\system32\reg.exereg delete "HKU\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Mozilla\NativeMessagingHosts\com.tonec.idm" /f2⤵PID:1536
-
-
C:\Windows\system32\reg.exereg delete "HKU\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Mozilla\SeaMonkey\Extensions" /f /v "[email protected]"2⤵PID:3000
-
-
C:\Windows\system32\reg.exereg delete "HKU\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Mozilla\SeaMonkey\Extensions" /f /v "[email protected]"2⤵PID:2016
-
-
C:\Windows\system32\reg.exereg delete "HKU\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Classes\CLSID\{07999AC3-058B-40BF-984F-69EB1E554CA7}" /f2⤵PID:3004
-
-
C:\Windows\system32\reg.exereg delete "HKU\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Classes\CLSID\{07999AC3-058B-40BF-984F-69EB1E554CA7}" /f /reg:322⤵PID:1988
-
-
C:\Windows\system32\reg.exereg delete "HKU\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Low Rights\DragDrop\{19129CDA-AFC0-4330-99BC-C5A834F89006}" /f2⤵PID:2568
-
-
C:\Windows\system32\reg.exereg delete "HKU\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{15B851AF-A4B9-43EF-97D3-28E1B4A5DB9B}" /f2⤵PID:1764
-
-
C:\Windows\system32\reg.exereg delete "HKU\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{1902485B-CE75-42C1-BA2D-57E660793D9A}" /f2⤵PID:1108
-
-
C:\Windows\system32\reg.exereg delete "HKU\S-1-5-21-2180306848-1874213455-4093218721-1000\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{E0DACC63-037F-46EE-AC02-E4C7B0FBFEB4}" /f2⤵PID:2684
-
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /f /v "MData"2⤵PID:2260
-
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /f /v "LName"2⤵PID:2992
-
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /f /v "FName"2⤵PID:1972
-
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /f /v "Email"2⤵PID:2952
-
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /f /v "Serial"2⤵PID:3020
-
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /f /v "scansk"2⤵PID:372
-
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /f /v "tvfrdt"2⤵PID:1984
-
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /f /v "radxcnt"2⤵PID:876
-
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /f /v "idmvers"2⤵PID:1696
-
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /f /v "ExePath"2⤵PID:1736
-
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /f /v "TempPath"2⤵PID:1712
-
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /f /v "LstCheck"2⤵PID:2304
-
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /f /v "ptrk_scdt"2⤵PID:3060
-
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /f /v "LastCheckQU"2⤵PID:2968
-
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /f /v "CheckUpdtVM"2⤵PID:2188
-
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /f /v "AppDataIDMFolder"2⤵PID:1604
-
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\DownloadManager" /f /v "CommonAppDataIDMFolder"2⤵PID:1704
-
-
C:\Windows\regedit.exeregedit /e "!)╤í╧ε┼Σ╓├.reg" HKEY_CURRENT_USER\Software\DownloadManager2⤵
- Runs .reg file with regedit
PID:1752
-
-
C:\Windows\system32\choice.exeCHOICE /C 12 /N2⤵PID:1568
-