Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
442s -
max time network
443s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2024, 21:26
Static task
static1
General
-
Target
Activation.cmd
-
Size
22KB
-
MD5
0956bff498b95698c5c5832929450c52
-
SHA1
011d7ed5662e9f83b7634e37c343760a8e681946
-
SHA256
39d8e8864bffd66e9dfb9dbde800bab761bba47c7c7007d50a7b37d80d5cd58d
-
SHA512
e34555cb3de22d05a5d8e7dfcbc7e1eda2e6e2a0e5ec4ad22911d2557f68ae29f31cde834d09deb41c756c1de7103d638bdb194b2e23891d2a77d6f3fa66fb0f
-
SSDEEP
384:E3739dR2Mv3+CpahCTu7bPUH3gPZ5SAJs:ELrR2Mv3+CpahC6nMH3gP63
Malware Config
Signatures
-
Downloads MZ/PE file
-
Drops file in Drivers directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\idmwfp.sys DrvInst.exe File opened for modification C:\Windows\System32\drivers\idmwfp.sys DrvInst.exe File opened for modification C:\Windows\System32\drivers\idmwfp.sys DrvInst.exe File opened for modification C:\Windows\System32\drivers\idmwfp.sys DrvInst.exe -
Checks computer location settings 2 TTPs 9 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation IDMan.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation IDMan.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation IDMan.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Uninstall.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation IDMan.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Uninstall.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Uninstall.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation IDM1.tmp Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Uninstall.exe -
Executes dropped EXE 14 IoCs
pid Process 5716 idman642build3.exe 4696 IDM1.tmp 5560 idmBroker.exe 3744 IDMan.exe 2044 Uninstall.exe 4900 MediumILStart.exe 1216 IDMan.exe 5184 Uninstall.exe 5136 IDMan.exe 3820 IDMIntegrator64.exe 1320 Uninstall.exe 6064 IDMan.exe 5984 IDMan.exe 5692 Uninstall.exe -
Loads dropped DLL 64 IoCs
pid Process 4696 IDM1.tmp 4696 IDM1.tmp 4696 IDM1.tmp 4696 IDM1.tmp 5680 regsvr32.exe 5608 regsvr32.exe 316 regsvr32.exe 3600 regsvr32.exe 5396 regsvr32.exe 2316 regsvr32.exe 3744 IDMan.exe 3744 IDMan.exe 3744 IDMan.exe 3744 IDMan.exe 3744 IDMan.exe 5684 regsvr32.exe 5916 regsvr32.exe 4168 regsvr32.exe 3584 regsvr32.exe 5112 regsvr32.exe 2620 regsvr32.exe 5788 regsvr32.exe 5892 regsvr32.exe 3508 Process not Found 3508 Process not Found 872 regsvr32.exe 4020 regsvr32.exe 1216 IDMan.exe 1216 IDMan.exe 1216 IDMan.exe 1216 IDMan.exe 1216 IDMan.exe 6000 regsvr32.exe 5344 regsvr32.exe 3496 regsvr32.exe 812 regsvr32.exe 1216 IDMan.exe 5136 IDMan.exe 5136 IDMan.exe 5136 IDMan.exe 5136 IDMan.exe 5136 IDMan.exe 3820 IDMIntegrator64.exe 3820 IDMIntegrator64.exe 3820 IDMIntegrator64.exe 3820 IDMIntegrator64.exe 5624 regsvr32.exe 4864 regsvr32.exe 5136 IDMan.exe 3508 Process not Found 6076 regsvr32.exe 6028 regsvr32.exe 6036 regsvr32.exe 528 regsvr32.exe 3208 regsvr32.exe 4192 regsvr32.exe 6044 regsvr32.exe 4804 regsvr32.exe 5136 IDMan.exe 6064 IDMan.exe 5984 IDMan.exe 5984 IDMan.exe 5984 IDMan.exe 5984 IDMan.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Registers COM server for autorun 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{52F6F7BD-DF73-44B3-AE13-89E1E1FB8F6A}\InprocServer32 IDMIntegrator64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{436D67E1-2FB3-4A6C-B3CD-FF8A41B0664D}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0055C089-8582-441B-A0BF-17B458C2A3A8}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{52F6F7BD-DF73-44B3-AE13-89E1E1FB8F6A}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CDD67718-A430-4AB9-A939-83D9074B0038}\InprocServer32\ = "C:\\Program Files (x86)\\Internet Download Manager\\downlWithIDM64.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CDD67718-A430-4AB9-A939-83D9074B0038}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0055C089-8582-441B-A0BF-17B458C2A3A8}\InprocServer32\ = "C:\\Program Files (x86)\\Internet Download Manager\\IDMIECC64.dll" IDMIntegrator64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CDC95B92-E27C-4745-A8C5-64A52A78855D}\InProcServer32\ = "C:\\Program Files (x86)\\Internet Download Manager\\IDMShellExt64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{436D67E1-2FB3-4A6C-B3CD-FF8A41B0664D}\InprocServer32\ = "C:\\Program Files (x86)\\Internet Download Manager\\IDMIECC64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4764030F-2733-45B9-AE62-3D1F4F6F2861}\InprocServer32\ = "C:\\Program Files (x86)\\Internet Download Manager\\downlWithIDM64.dll" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CDD67718-A430-4AB9-A939-83D9074B0038}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{436D67E1-2FB3-4A6C-B3CD-FF8A41B0664D}\InprocServer32\ = "C:\\Program Files (x86)\\Internet Download Manager\\IDMIECC64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5312C54E-A385-46B7-B200-ABAF81B03935}\InprocServer32\ = "C:\\Program Files (x86)\\Internet Download Manager\\IDMGetAll64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CDC95B92-E27C-4745-A8C5-64A52A78855D}\InProcServer32\ = "C:\\Program Files (x86)\\Internet Download Manager\\IDMShellExt64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4764030F-2733-45B9-AE62-3D1F4F6F2861}\InprocServer32\ = "C:\\Program Files (x86)\\Internet Download Manager\\downlWithIDM64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4764030F-2733-45B9-AE62-3D1F4F6F2861}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{52F6F7BD-DF73-44B3-AE13-89E1E1FB8F6A}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{52F6F7BD-DF73-44B3-AE13-89E1E1FB8F6A}\InprocServer32\ = "C:\\Program Files (x86)\\Internet Download Manager\\downlWithIDM64.dll" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{52F6F7BD-DF73-44B3-AE13-89E1E1FB8F6A}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5312C54E-A385-46B7-B200-ABAF81B03935}\InprocServer32\ThreadingModel = "Apartment" IDMIntegrator64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{436D67E1-2FB3-4A6C-B3CD-FF8A41B0664D}\InprocServer32 IDMIntegrator64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0055C089-8582-441B-A0BF-17B458C2A3A8}\InprocServer32 regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{436D67E1-2FB3-4A6C-B3CD-FF8A41B0664D}\InprocServer32 IDMIntegrator64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CDD67718-A430-4AB9-A939-83D9074B0038}\InprocServer32\ = "C:\\Program Files (x86)\\Internet Download Manager\\downlWithIDM64.dll" IDMIntegrator64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CDC95B92-E27C-4745-A8C5-64A52A78855D}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{436D67E1-2FB3-4A6C-B3CD-FF8A41B0664D}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CDD67718-A430-4AB9-A939-83D9074B0038}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0055C089-8582-441B-A0BF-17B458C2A3A8}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CDC95B92-E27C-4745-A8C5-64A52A78855D}\InProcServer32 regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5312C54E-A385-46B7-B200-ABAF81B03935}\InprocServer32 IDMIntegrator64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4764030F-2733-45B9-AE62-3D1F4F6F2861}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0055C089-8582-441B-A0BF-17B458C2A3A8}\InprocServer32\ThreadingModel = "Apartment" IDMIntegrator64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{436D67E1-2FB3-4A6C-B3CD-FF8A41B0664D}\InprocServer32\ = "C:\\Program Files (x86)\\Internet Download Manager\\IDMIECC64.dll" IDMIntegrator64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7D11E719-FF90-479C-B0D7-96EB43EE55D7}\InprocServer32\ = "C:\\Program Files (x86)\\Internet Download Manager\\downlWithIDM64.dll" IDMIntegrator64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0055C089-8582-441B-A0BF-17B458C2A3A8}\InprocServer32\ = "C:\\Program Files (x86)\\Internet Download Manager\\IDMIECC64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{436D67E1-2FB3-4A6C-B3CD-FF8A41B0664D}\InprocServer32\ = "C:\\Program Files (x86)\\Internet Download Manager\\IDMIECC64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0055C089-8582-441B-A0BF-17B458C2A3A8}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7D11E719-FF90-479C-B0D7-96EB43EE55D7}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CDC95B92-E27C-4745-A8C5-64A52A78855D}\InProcServer32\ = "C:\\Program Files (x86)\\Internet Download Manager\\IDMShellExt64.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0055C089-8582-441B-A0BF-17B458C2A3A8}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0055C089-8582-441B-A0BF-17B458C2A3A8}\InprocServer32 IDMIntegrator64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7D11E719-FF90-479C-B0D7-96EB43EE55D7}\InprocServer32\ThreadingModel = "Apartment" IDMIntegrator64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CDC95B92-E27C-4745-A8C5-64A52A78855D}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{436D67E1-2FB3-4A6C-B3CD-FF8A41B0664D}\InprocServer32 regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7D11E719-FF90-479C-B0D7-96EB43EE55D7}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4764030F-2733-45B9-AE62-3D1F4F6F2861}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7D11E719-FF90-479C-B0D7-96EB43EE55D7}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4764030F-2733-45B9-AE62-3D1F4F6F2861}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5312C54E-A385-46B7-B200-ABAF81B03935}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4764030F-2733-45B9-AE62-3D1F4F6F2861}\InprocServer32 IDMIntegrator64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5312C54E-A385-46B7-B200-ABAF81B03935}\InprocServer32\ = "C:\\Program Files (x86)\\Internet Download Manager\\IDMGetAll64.dll" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{436D67E1-2FB3-4A6C-B3CD-FF8A41B0664D}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CDC95B92-E27C-4745-A8C5-64A52A78855D}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{52F6F7BD-DF73-44B3-AE13-89E1E1FB8F6A}\InprocServer32 IDMIntegrator64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0055C089-8582-441B-A0BF-17B458C2A3A8}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5312C54E-A385-46B7-B200-ABAF81B03935}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CDD67718-A430-4AB9-A939-83D9074B0038}\InprocServer32\ = "C:\\Program Files (x86)\\Internet Download Manager\\downlWithIDM64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5312C54E-A385-46B7-B200-ABAF81B03935}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{52F6F7BD-DF73-44B3-AE13-89E1E1FB8F6A}\InprocServer32\ = "C:\\Program Files (x86)\\Internet Download Manager\\downlWithIDM64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7D11E719-FF90-479C-B0D7-96EB43EE55D7}\InprocServer32\ = "C:\\Program Files (x86)\\Internet Download Manager\\downlWithIDM64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4764030F-2733-45B9-AE62-3D1F4F6F2861}\InprocServer32\ = "C:\\Program Files (x86)\\Internet Download Manager\\downlWithIDM64.dll" IDMIntegrator64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{436D67E1-2FB3-4A6C-B3CD-FF8A41B0664D}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{52F6F7BD-DF73-44B3-AE13-89E1E1FB8F6A}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{436D67E1-2FB3-4A6C-B3CD-FF8A41B0664D}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" RUNDLL32.EXE Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IDMan = "C:\\Program Files (x86)\\Internet Download Manager\\IDMan.exe /onboot" IDMan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" RUNDLL32.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" RUNDLL32.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" RUNDLL32.EXE -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IDMan.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IDMan.exe -
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects IDM1.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0055C089-8582-441B-A0BF-17B458C2A3A8} IDM1.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0055C089-8582-441B-A0BF-17B458C2A3A8}\ = "IDM Helper" IDM1.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0055C089-8582-441B-A0BF-17B458C2A3A8}\NoExplorer = "1" IDM1.tmp Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects IDM1.tmp Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0055C089-8582-441B-A0BF-17B458C2A3A8} IDM1.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0055C089-8582-441B-A0BF-17B458C2A3A8}\ = "IDM Helper" IDM1.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0055C089-8582-441B-A0BF-17B458C2A3A8}\NoExplorer = "1" IDM1.tmp -
Drops file in System32 directory 16 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\Temp\{2fd9528e-75c0-9246-b618-15ab1de3c63c}\SETB860.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{2fd9528e-75c0-9246-b618-15ab1de3c63c}\SETB860.tmp DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{2fd9528e-75c0-9246-b618-15ab1de3c63c}\idmwfp.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{2fd9528e-75c0-9246-b618-15ab1de3c63c}\idmwfp.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\idmwfp.inf_amd64_8b0ebbc2b4585464\idmwfp64.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\idmwfp.inf_amd64_8b0ebbc2b4585464\idmwfp.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\idmwfp.inf_amd64_8b0ebbc2b4585464\idmwfp64.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\idmwfp.inf_amd64_8b0ebbc2b4585464\idmwfp.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{2fd9528e-75c0-9246-b618-15ab1de3c63c} DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{2fd9528e-75c0-9246-b618-15ab1de3c63c}\idmwfp64.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{2fd9528e-75c0-9246-b618-15ab1de3c63c}\SETB870.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{2fd9528e-75c0-9246-b618-15ab1de3c63c}\SETB870.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{2fd9528e-75c0-9246-b618-15ab1de3c63c}\SETB871.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{2fd9528e-75c0-9246-b618-15ab1de3c63c}\SETB871.tmp DrvInst.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Internet Download Manager\Languages\idm_es.lng IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\Languages\tips_nl.txt IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\Languages\tips_fa.txt IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\Languages\inst_fa.lng IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\MediumILStart.exe IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\idmindex.dll IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\Languages\tips_hu.txt IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\IDMVMPrs.dll IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\libssl.dll IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\Languages\idm_sw.lng IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\Languages\idm_sr.lng IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\idmwfp32.sys IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\Languages\idm_pl.lng IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\Languages\inst_it.lng IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\Languages\idm_cz.lng IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\Languages\inst_gu.lng IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\idmmkb.dll IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\idmbrbtn64.dll IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\IDMIECC64.dll IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\Languages\inst_ua.lng IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\idmvs.dll IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\Languages\inst_pl.lng IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\idmcchandler7.dll IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\Languages\inst_mn.lng IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\IDMGetAll.dll IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\tips.txt IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\idmbrbtn.dll IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\Languages\idm_ge.lng IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\Languages\idm_mn.lng IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\Languages\idm_hi.lng IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\Languages\idm_dk.lng IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\Languages\idm_fa.lng IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\Languages\tips_ptbr.txt IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\grabber.chm IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\IEGetVL.htm IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\idmtdi.inf IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\Languages\inst_fr.lng IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\idmtdi.cat IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\IDMGetAll64.dll IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\Languages\inst_id.lng IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\downlWithIDM64.dll IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\Languages\inst_mm.lng IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\oldjsproxy.dll IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\libcrypto.dll IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\Languages\tips_it.txt IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\Toolbar\3d_style_3.tbi IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\idmwfp64.sys IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\Languages\tips_pl.txt IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\Languages\inst_cht.lng IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\Languages\inst_bn.lng IDM1.tmp File opened for modification C:\Program Files (x86)\Internet Download Manager\IDMSetup2.log IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\IDMGrHlp.exe IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\Languages\inst_tr.lng IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\Languages\idm_chn2.lng IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\Languages\idm_vn.lng IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\Languages\tips_sk.txt IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\Languages\tips_ar.txt IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\Languages\idm_tr.lng IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\Languages\idm_th.lng IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\Languages\inst_al.lng IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\Languages\idm_id.lng IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\Languages\tips_id.txt IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\Languages\tips_jp.txt IDM1.tmp File created C:\Program Files (x86)\Internet Download Manager\Languages\tips_iw.txt IDM1.tmp -
Drops file in Windows directory 12 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.dev.log RUNDLL32.EXE File opened for modification C:\Windows\inf\oem3.inf DrvInst.exe File created C:\Windows\inf\oem3.inf DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log RUNDLL32.EXE File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log RUNDLL32.EXE File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log RUNDLL32.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 26 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID DrvInst.exe -
Checks processor information in registry 2 TTPs 18 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier reg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 reg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Delays execution with timeout.exe 14 IoCs
pid Process 1768 timeout.exe 4020 timeout.exe 5992 timeout.exe 5064 timeout.exe 5380 timeout.exe 5184 timeout.exe 1976 timeout.exe 3124 timeout.exe 4652 timeout.exe 3752 timeout.exe 2252 timeout.exe 5564 timeout.exe 5500 timeout.exe 2436 timeout.exe -
Enumerates processes with tasklist 1 TTPs 3 IoCs
pid Process 5392 tasklist.exe 5140 tasklist.exe 5124 tasklist.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 2 IoCs
pid Process 4812 taskkill.exe 4136 taskkill.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\DragDrop\{F6E1B27E-F2DA-4919-9DBD-CAB90A1D662B}\Policy = "3" IDM1.tmp Set value (int) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{1902485B-CE75-42C1-BA2D-57E660793D9A}\Policy = "3" IDMan.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Low Rights\DragDrop\{19129CDA-AFC0-4330-99BC-C5A834F89006}\AppName = "IDMan.exe" IDMan.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\Low Rights\DragDrop\{19129CDA-AFC0-4330-99BC-C5A834F89006} IDMan.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote IDMan.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{E0DACC63-037F-46EE-AC02-E4C7B0FBFEB4}\Policy = "3" IDM1.tmp Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\DownloadUI = "{7D11E719-FF90-479C-B0D7-96EB43EE55D7}" IDMan.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Low Rights\DragDrop\{19129CDA-AFC0-4330-99BC-C5A834F89006}\AppPath = "C:\\Program Files (x86)\\Internet Download Manager" IDMan.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{1902485B-CE75-42C1-BA2D-57E660793D9A} IDMan.exe Set value (int) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{1902485B-CE75-42C1-BA2D-57E660793D9A}\Policy = "3" IDMan.exe Set value (int) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{15B851AF-A4B9-43EF-97D3-28E1B4A5DB9B}\Policy = "3" idmBroker.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\Low Rights\DragDrop IDMan.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Low Rights\DragDrop\{19129CDA-AFC0-4330-99BC-C5A834F89006}\AppPath = "C:\\Program Files (x86)\\Internet Download Manager" IDMan.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Low Rights\DragDrop\{19129CDA-AFC0-4330-99BC-C5A834F89006}\AppName = "IDMan.exe" IDMan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{E0DACC63-037F-46EE-AC02-E4C7B0FBFEB4}\AppPath = "C:\\Program Files (x86)\\Internet Download Manager" IDM1.tmp Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{1902485B-CE75-42C1-BA2D-57E660793D9A}\AppName = "IEMonitor.exe" IDMan.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\MenuExt\Download with IDM IDMan.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel IDMan.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{1902485B-CE75-42C1-BA2D-57E660793D9A}\AppName = "IEMonitor.exe" IDM1.tmp Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\Low Rights IDMan.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{E0DACC63-037F-46EE-AC02-E4C7B0FBFEB4}\AppName = "IDMan.exe" IDMan.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{15B851AF-A4B9-43EF-97D3-28E1B4A5DB9B} idmBroker.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\Low Rights\DragDrop\{19129CDA-AFC0-4330-99BC-C5A834F89006} IDMan.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Low Rights\DragDrop\{19129CDA-AFC0-4330-99BC-C5A834F89006}\AppName = "IDMan.exe" IDMan.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote IDMan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{E0DACC63-037F-46EE-AC02-E4C7B0FBFEB4}\AppName = "IDMan.exe" IDM1.tmp Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel IDMan.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\Low Rights\DragDrop\{19129CDA-AFC0-4330-99BC-C5A834F89006} IDMan.exe Set value (int) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\MenuExt\Download with IDM\contexts = "243" IDMan.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{E0DACC63-037F-46EE-AC02-E4C7B0FBFEB4} IDMan.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{1902485B-CE75-42C1-BA2D-57E660793D9A}\AppPath = "C:\\Program Files (x86)\\Internet Download Manager" IDMan.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\Low Rights\DragDrop IDMan.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Low Rights IDM1.tmp Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy IDM1.tmp Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{E0DACC63-037F-46EE-AC02-E4C7B0FBFEB4}\AppName = "IDMan.exe" IDMan.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{1902485B-CE75-42C1-BA2D-57E660793D9A} IDM1.tmp Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{1902485B-CE75-42C1-BA2D-57E660793D9A}\AppPath = "C:\\Program Files (x86)\\Internet Download Manager" IDM1.tmp Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\Low Rights idmBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{E0DACC63-037F-46EE-AC02-E4C7B0FBFEB4}\Policy = "3" IDMan.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Low Rights\DragDrop\{19129CDA-AFC0-4330-99BC-C5A834F89006}\AppName = "IDMan.exe" IDMan.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel IDMan.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Low Rights\DragDrop\{F6E1B27E-F2DA-4919-9DBD-CAB90A1D662B} IDM1.tmp Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\MenuExt\Download with IDM\ = "C:\\Program Files (x86)\\Internet Download Manager\\IEExt.htm" IDMan.exe Set value (int) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Low Rights\DragDrop\{19129CDA-AFC0-4330-99BC-C5A834F89006}\Policy = "3" IDMan.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{1902485B-CE75-42C1-BA2D-57E660793D9A} IDMan.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\MenuExt\Download with IDM IDMan.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy IDMan.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{1902485B-CE75-42C1-BA2D-57E660793D9A}\AppName = "IEMonitor.exe" IDMan.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Low Rights\DragDrop\{19129CDA-AFC0-4330-99BC-C5A834F89006}\AppPath = "C:\\Program Files (x86)\\Internet Download Manager" IDMan.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{E0DACC63-037F-46EE-AC02-E4C7B0FBFEB4}\AppName = "IDMan.exe" IDMan.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\Low Rights\DragDrop IDMan.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{1902485B-CE75-42C1-BA2D-57E660793D9A}\AppPath = "C:\\Program Files (x86)\\Internet Download Manager" IDMan.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Low Rights\DragDrop IDM1.tmp Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\MenuExt\Download with IDM IDMan.exe Set value (int) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{1902485B-CE75-42C1-BA2D-57E660793D9A}\Policy = "3" IDMan.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Low Rights\DragDrop\{19129CDA-AFC0-4330-99BC-C5A834F89006}\AppPath = "C:\\Program Files (x86)\\Internet Download Manager" IDMan.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{15B851AF-A4B9-43EF-97D3-28E1B4A5DB9B}\AppPath = "C:\\Program Files (x86)\\Internet Download Manager" idmBroker.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy IDMan.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy IDMan.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\Low Rights IDMan.exe Set value (int) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Low Rights\DragDrop\{19129CDA-AFC0-4330-99BC-C5A834F89006}\Policy = "3" IDMan.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\Low Rights IDMan.exe Set value (int) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{E0DACC63-037F-46EE-AC02-E4C7B0FBFEB4}\Policy = "3" IDMan.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy IDM1.tmp -
Modifies data under HKEY_USERS 41 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AC746233-E9D3-49CD-862F-068F7B7CCCA4}\LocalServer32\ = "\"C:\\Program Files (x86)\\Internet Download Manager\\IDMan.exe\"" IDM1.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5312C54E-A385-46B7-B200-ABAF81B03935}\InprocServer32\ = "C:\\Program Files (x86)\\Internet Download Manager\\IDMGetAll.dll" IDMan.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CDD67718-A430-4AB9-A939-83D9074B0038}\TypeLib IDMan.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7D11E719-FF90-479C-B0D7-96EB43EE55D7}\Programmable IDMan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0055C089-8582-441B-A0BF-17B458C2A3A8}\InprocServer32\ = "C:\\Program Files (x86)\\Internet Download Manager\\IDMIECC64.dll" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7D11E719-FF90-479C-B0D7-96EB43EE55D7}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Idmfsa.IDMEFSAgent\CLSID\ = "{0F947660-8606-420A-BAC6-51B84DD22A47}" IDMan.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0055C089-8582-441B-A0BF-17B458C2A3A8}\TypeLib IDMIntegrator64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CDC95B92-E27C-4745-A8C5-64A52A78855D}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{28670AE0-CAF4-4836-8418-0F456023EBF7}\ProxyStubClsid32\ = "{C950922F-897A-4E13-BA38-66C8AF2E0BF7}" IDMan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IDMIECC.IDMIEHlprObj.1\CLSID\ = "{0055C089-8582-441B-A0BF-17B458C2A3A8}" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4764030F-2733-45B9-AE62-3D1F4F6F2861}\InprocServer32 IDMan.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4764030F-2733-45B9-AE62-3D1F4F6F2861} IDMan.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{52F6F7BD-DF73-44B3-AE13-89E1E1FB8F6A}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{72B7361C-3568-4392-BCCD-D912CD5C1169}\TypeLib IDM1.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0055C089-8582-441B-A0BF-17B458C2A3A8}\ = "IDM integration (IDMIEHlprObj Class)" IDMan.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CDD67718-A430-4AB9-A939-83D9074B0038}\Programmable IDMan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DownlWithIDM.VLinkProcessor\CLSID\ = "{CDD67718-A430-4AB9-A939-83D9074B0038}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IDMIECC.IDMIEHlprObj.1\CLSID\ = "{0055C089-8582-441B-A0BF-17B458C2A3A8}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CDD67718-A430-4AB9-A939-83D9074B0038}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DownlWithIDM.IDMDwnlMgr\CurVer\ = "DownlWithIDM.IDMDwnlMgr.1" IDMan.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7D11E719-FF90-479C-B0D7-96EB43EE55D7}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IDMan.CIDMLinkTransmitter\CLSID IDM1.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0055C089-8582-441B-A0BF-17B458C2A3A8}\ProgID\ = "IDMIECC.IDMIEHlprObj.1" IDMan.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4764030F-2733-45B9-AE62-3D1F4F6F2861}\TypeLib IDMan.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A87AB5DD-211B-4284-8CBD-B92F77A5DE14} IDMan.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4764030F-2733-45B9-AE62-3D1F4F6F2861}\Programmable IDMIntegrator64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CDD67718-A430-4AB9-A939-83D9074B0038}\ = "VLinkProcessor Class" IDMIntegrator64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{AC746233-E9D3-49CD-862F-068F7B7CCCA4}\ROTFlags = "1" IDM1.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4BD46AAE-C51F-4BF7-8BC0-2E86E33D1873}\TypeLib IDM1.tmp Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F947660-8606-420A-BAC6-51B84DD22A47}\Elevation IDMan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CDD67718-A430-4AB9-A939-83D9074B0038}\TypeLib\ = "{6A89524B-E1B6-4D71-972A-8FD53F240936}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5312C54E-A385-46B7-B200-ABAF81B03935}\Programmable regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4764030F-2733-45B9-AE62-3D1F4F6F2861}\TypeLib IDMIntegrator64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IDMGetAll.IDMAllLinksProcessor.1\ = "IDMAllLinksProcessor Class" IDMan.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7D11E719-FF90-479C-B0D7-96EB43EE55D7}\TypeLib IDMan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IDMGetAll.IDMAllLinksProcessor\ = "IDMAllLinksProcessor Class" IDM1.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3BDFC55C-ED33-43BB-9A77-57C2AF4B56EF}\1.0\0\win32\ = "C:\\Program Files (x86)\\Internet Download Manager\\IDMIECC64.dll" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F947660-8606-420A-BAC6-51B84DD22A47}\ProgID IDMan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IDMIECC.IDMIEHlprObj\CurVer\ = "IDMIECC.IDMIEHlprObj.1" IDMan.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CDD67718-A430-4AB9-A939-83D9074B0038} IDMan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DownlWithIDM.LinkProcessor\ = "LinkProcessor Class" IDMIntegrator64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CDD67718-A430-4AB9-A939-83D9074B0038}\ProgID\ = "DownlWithIDM.VLinkProcessor.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6EDC7F8E-EB3D-4F9A-B693-216F07C94D74}\ProxyStubClsid32\ = "{C950922F-897A-4E13-BA38-66C8AF2E0BF7}" IDMan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{33AEF752-FB86-4787-9ED1-6010528F5FA3}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" IDM1.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A87AB5DD-211B-4284-8CBD-B92F77A5DE14}\ProxyStubClsid32 IDM1.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DownlWithIDM.V2LinkProcessor.1\ = "V2LinkProcessor Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CDD67718-A430-4AB9-A939-83D9074B0038}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C950922F-897A-4E13-BA38-66C8AF2E0BF7}\InProcServer32\ThreadingModel = "Both" IDMan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4764030F-2733-45B9-AE62-3D1F4F6F2861}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C7798BD6-34AF-4925-B01C-450C9EAD2DD9}\TypeLib\ = "{3BDFC55C-ED33-43BB-9A77-57C2AF4B56EF}" IDM1.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{52F6F7BD-DF73-44B3-AE13-89E1E1FB8F6A}\MiscStatus\1 IDM1.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6B9EB066-DA1F-4C0A-AC62-01AC892EF175}\TypeLib\ = "{5518B636-6884-48CA-A9A7-1CFD3F3BA916}" IDM1.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CDD67718-A430-4AB9-A939-83D9074B0038}\VersionIndependentProgID\ = "DownlWithIDM.VLinkProcessor" IDMan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\idmBroker.OptionsReader\CLSID\ = "{D0FB58BB-2C07-492F-8BD0-A587E4874B4E}" idmBroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DownlWithIDM.V2LinkProcessor\CurVer\ = "DownlWithIDM.V2LinkProcessor.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IDMIECC.IDMIEHlprObj.1\ = "IDMIEHlprObj Class" IDMan.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{52F6F7BD-DF73-44B3-AE13-89E1E1FB8F6A}\ProgID IDMan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Idmfsa.IDMEFSAgent\CurVer\ = "Idmfsa.IDMEFSAgent.1" IDMan.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{52F6F7BD-DF73-44B3-AE13-89E1E1FB8F6A} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7D11E719-FF90-479C-B0D7-96EB43EE55D7}\ProgID IDMan.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4764030F-2733-45B9-AE62-3D1F4F6F2861}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4BD46AAE-C51F-4BF7-8BC0-2E86E33D1873}\ = "ICIDMLinkTransmitter" IDM1.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DownlWithIDM.IDMDwnlMgr\CurVer\ = "DownlWithIDM.IDMDwnlMgr.1" regsvr32.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 5060 reg.exe 4340 reg.exe 5372 reg.exe 1604 reg.exe 3644 reg.exe 3168 reg.exe 3156 reg.exe 5800 reg.exe 5192 reg.exe 6048 reg.exe 3456 reg.exe 3764 reg.exe 2636 reg.exe 5528 reg.exe 3192 reg.exe 3764 reg.exe 2220 reg.exe 3164 reg.exe 4688 reg.exe 2032 reg.exe 3980 reg.exe 1600 reg.exe 332 reg.exe 3756 reg.exe 5188 reg.exe 5772 reg.exe 4116 reg.exe 4460 reg.exe 3980 reg.exe 5772 reg.exe 5612 reg.exe 2496 reg.exe 2292 reg.exe 840 reg.exe 5424 reg.exe 2216 reg.exe 2332 reg.exe 4036 reg.exe 2004 reg.exe 4484 reg.exe 5724 reg.exe 5500 reg.exe 1552 reg.exe 2636 reg.exe 2936 reg.exe 4320 reg.exe 5200 reg.exe 5820 reg.exe 2020 reg.exe 64 reg.exe 5488 reg.exe 5400 reg.exe 1920 reg.exe 2344 reg.exe 1548 reg.exe 5632 reg.exe 5552 reg.exe 3876 reg.exe 4568 reg.exe 4344 reg.exe 64 reg.exe 5472 reg.exe 740 reg.exe 180 reg.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 107039.crdownload:SmartScreen msedge.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4160 PING.EXE -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 396 msedge.exe 396 msedge.exe 4792 msedge.exe 4792 msedge.exe 5252 identity_helper.exe 5252 identity_helper.exe 3708 msedge.exe 3708 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 4320 msedge.exe 4320 msedge.exe 4696 IDM1.tmp 4696 IDM1.tmp 4696 IDM1.tmp 4696 IDM1.tmp 4696 IDM1.tmp 4696 IDM1.tmp 4696 IDM1.tmp 4696 IDM1.tmp 4696 IDM1.tmp 4696 IDM1.tmp 3744 IDMan.exe 3744 IDMan.exe 1216 IDMan.exe 1216 IDMan.exe 740 powershell.exe 740 powershell.exe 5132 powershell.exe 5132 powershell.exe 456 powershell.exe 456 powershell.exe 2692 powershell.exe 2692 powershell.exe 2084 powershell.exe 2084 powershell.exe 4668 powershell.exe 4668 powershell.exe 1956 powershell.exe 1956 powershell.exe 2424 powershell.exe 2424 powershell.exe 852 powershell.exe 852 powershell.exe 4340 powershell.exe 4340 powershell.exe 5820 powershell.exe 5820 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5984 IDMan.exe -
Suspicious behavior: LoadsDriver 24 IoCs
pid Process 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 17 IoCs
pid Process 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4696 IDM1.tmp Token: SeRestorePrivilege 3744 IDMan.exe Token: SeAuditPrivilege 3180 svchost.exe Token: SeSecurityPrivilege 3180 svchost.exe Token: SeRestorePrivilege 5092 DrvInst.exe Token: SeBackupPrivilege 5092 DrvInst.exe Token: SeDebugPrivilege 2396 firefox.exe Token: SeDebugPrivilege 2396 firefox.exe Token: SeBackupPrivilege 3744 IDMan.exe Token: SeDebugPrivilege 5344 regsvr32.exe Token: SeDebugPrivilege 5344 regsvr32.exe Token: SeRestorePrivilege 3028 DrvInst.exe Token: SeBackupPrivilege 3028 DrvInst.exe Token: SeDebugPrivilege 5412 RUNDLL32.EXE Token: SeDebugPrivilege 5412 RUNDLL32.EXE Token: SeDebugPrivilege 812 regsvr32.exe Token: SeDebugPrivilege 812 regsvr32.exe Token: SeDebugPrivilege 740 powershell.exe Token: SeDebugPrivilege 5392 tasklist.exe Token: SeDebugPrivilege 4812 taskkill.exe Token: SeDebugPrivilege 5132 powershell.exe Token: SeDebugPrivilege 5140 tasklist.exe Token: SeRestorePrivilege 4568 DrvInst.exe Token: SeBackupPrivilege 4568 DrvInst.exe Token: SeDebugPrivilege 456 powershell.exe Token: SeDebugPrivilege 5124 tasklist.exe Token: SeDebugPrivilege 4136 taskkill.exe Token: SeDebugPrivilege 2692 powershell.exe Token: SeDebugPrivilege 2084 powershell.exe Token: SeSecurityPrivilege 2084 powershell.exe Token: SeTakeOwnershipPrivilege 2084 powershell.exe Token: SeBackupPrivilege 2084 powershell.exe Token: SeRestorePrivilege 2084 powershell.exe Token: SeDebugPrivilege 4668 powershell.exe Token: SeSecurityPrivilege 4668 powershell.exe Token: SeTakeOwnershipPrivilege 4668 powershell.exe Token: SeBackupPrivilege 4668 powershell.exe Token: SeRestorePrivilege 4668 powershell.exe Token: SeDebugPrivilege 1956 powershell.exe Token: SeSecurityPrivilege 1956 powershell.exe Token: SeTakeOwnershipPrivilege 1956 powershell.exe Token: SeBackupPrivilege 1956 powershell.exe Token: SeRestorePrivilege 1956 powershell.exe Token: SeDebugPrivilege 2424 powershell.exe Token: SeSecurityPrivilege 2424 powershell.exe Token: SeTakeOwnershipPrivilege 2424 powershell.exe Token: SeBackupPrivilege 2424 powershell.exe Token: SeRestorePrivilege 2424 powershell.exe Token: SeDebugPrivilege 852 powershell.exe Token: SeSecurityPrivilege 852 powershell.exe Token: SeTakeOwnershipPrivilege 852 powershell.exe Token: SeBackupPrivilege 852 powershell.exe Token: SeRestorePrivilege 852 powershell.exe Token: SeDebugPrivilege 4340 powershell.exe Token: SeSecurityPrivilege 4340 powershell.exe Token: SeTakeOwnershipPrivilege 4340 powershell.exe Token: SeBackupPrivilege 4340 powershell.exe Token: SeRestorePrivilege 4340 powershell.exe Token: SeDebugPrivilege 5820 powershell.exe Token: SeSecurityPrivilege 5820 powershell.exe Token: SeTakeOwnershipPrivilege 5820 powershell.exe Token: SeBackupPrivilege 5820 powershell.exe Token: SeRestorePrivilege 5820 powershell.exe Token: SeRestorePrivilege 1320 DrvInst.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 2396 firefox.exe 2396 firefox.exe 2396 firefox.exe 3744 IDMan.exe 1216 IDMan.exe 5136 IDMan.exe 5984 IDMan.exe -
Suspicious use of SetWindowsHookEx 45 IoCs
pid Process 3744 IDMan.exe 3744 IDMan.exe 2396 firefox.exe 3744 IDMan.exe 3744 IDMan.exe 1216 IDMan.exe 1216 IDMan.exe 5184 Uninstall.exe 1216 IDMan.exe 1216 IDMan.exe 1216 IDMan.exe 1216 IDMan.exe 1216 IDMan.exe 1216 IDMan.exe 5136 IDMan.exe 5136 IDMan.exe 3820 IDMIntegrator64.exe 3820 IDMIntegrator64.exe 1320 Uninstall.exe 5136 IDMan.exe 5136 IDMan.exe 5136 IDMan.exe 5136 IDMan.exe 5136 IDMan.exe 5136 IDMan.exe 5136 IDMan.exe 5136 IDMan.exe 5136 IDMan.exe 5136 IDMan.exe 5136 IDMan.exe 5136 IDMan.exe 5136 IDMan.exe 5136 IDMan.exe 5136 IDMan.exe 5136 IDMan.exe 5136 IDMan.exe 5984 IDMan.exe 5984 IDMan.exe 5984 IDMan.exe 5984 IDMan.exe 5984 IDMan.exe 5984 IDMan.exe 5984 IDMan.exe 5984 IDMan.exe 5984 IDMan.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4244 wrote to memory of 4444 4244 cmd.exe 92 PID 4244 wrote to memory of 4444 4244 cmd.exe 92 PID 4244 wrote to memory of 4360 4244 cmd.exe 93 PID 4244 wrote to memory of 4360 4244 cmd.exe 93 PID 4360 wrote to memory of 4164 4360 cmd.exe 94 PID 4360 wrote to memory of 4164 4360 cmd.exe 94 PID 4360 wrote to memory of 4664 4360 cmd.exe 95 PID 4360 wrote to memory of 4664 4360 cmd.exe 95 PID 4244 wrote to memory of 4932 4244 cmd.exe 96 PID 4244 wrote to memory of 4932 4244 cmd.exe 96 PID 4932 wrote to memory of 2332 4932 cmd.exe 97 PID 4932 wrote to memory of 2332 4932 cmd.exe 97 PID 4244 wrote to memory of 1984 4244 cmd.exe 98 PID 4244 wrote to memory of 1984 4244 cmd.exe 98 PID 4244 wrote to memory of 1412 4244 cmd.exe 99 PID 4244 wrote to memory of 1412 4244 cmd.exe 99 PID 4244 wrote to memory of 876 4244 cmd.exe 100 PID 4244 wrote to memory of 876 4244 cmd.exe 100 PID 4244 wrote to memory of 4848 4244 cmd.exe 101 PID 4244 wrote to memory of 4848 4244 cmd.exe 101 PID 4244 wrote to memory of 3260 4244 cmd.exe 102 PID 4244 wrote to memory of 3260 4244 cmd.exe 102 PID 3260 wrote to memory of 1604 3260 cmd.exe 103 PID 3260 wrote to memory of 1604 3260 cmd.exe 103 PID 4244 wrote to memory of 4336 4244 cmd.exe 104 PID 4244 wrote to memory of 4336 4244 cmd.exe 104 PID 4336 wrote to memory of 3164 4336 cmd.exe 105 PID 4336 wrote to memory of 3164 4336 cmd.exe 105 PID 4244 wrote to memory of 1744 4244 cmd.exe 106 PID 4244 wrote to memory of 1744 4244 cmd.exe 106 PID 1744 wrote to memory of 4644 1744 cmd.exe 107 PID 1744 wrote to memory of 4644 1744 cmd.exe 107 PID 4244 wrote to memory of 64 4244 cmd.exe 109 PID 4244 wrote to memory of 64 4244 cmd.exe 109 PID 4792 wrote to memory of 3088 4792 msedge.exe 120 PID 4792 wrote to memory of 3088 4792 msedge.exe 120 PID 4792 wrote to memory of 4848 4792 msedge.exe 121 PID 4792 wrote to memory of 4848 4792 msedge.exe 121 PID 4792 wrote to memory of 4848 4792 msedge.exe 121 PID 4792 wrote to memory of 4848 4792 msedge.exe 121 PID 4792 wrote to memory of 4848 4792 msedge.exe 121 PID 4792 wrote to memory of 4848 4792 msedge.exe 121 PID 4792 wrote to memory of 4848 4792 msedge.exe 121 PID 4792 wrote to memory of 4848 4792 msedge.exe 121 PID 4792 wrote to memory of 4848 4792 msedge.exe 121 PID 4792 wrote to memory of 4848 4792 msedge.exe 121 PID 4792 wrote to memory of 4848 4792 msedge.exe 121 PID 4792 wrote to memory of 4848 4792 msedge.exe 121 PID 4792 wrote to memory of 4848 4792 msedge.exe 121 PID 4792 wrote to memory of 4848 4792 msedge.exe 121 PID 4792 wrote to memory of 4848 4792 msedge.exe 121 PID 4792 wrote to memory of 4848 4792 msedge.exe 121 PID 4792 wrote to memory of 4848 4792 msedge.exe 121 PID 4792 wrote to memory of 4848 4792 msedge.exe 121 PID 4792 wrote to memory of 4848 4792 msedge.exe 121 PID 4792 wrote to memory of 4848 4792 msedge.exe 121 PID 4792 wrote to memory of 4848 4792 msedge.exe 121 PID 4792 wrote to memory of 4848 4792 msedge.exe 121 PID 4792 wrote to memory of 4848 4792 msedge.exe 121 PID 4792 wrote to memory of 4848 4792 msedge.exe 121 PID 4792 wrote to memory of 4848 4792 msedge.exe 121 PID 4792 wrote to memory of 4848 4792 msedge.exe 121 PID 4792 wrote to memory of 4848 4792 msedge.exe 121 PID 4792 wrote to memory of 4848 4792 msedge.exe 121 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Activation.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ver2⤵PID:4444
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c echo prompt $E | cmd2⤵
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo prompt $E "3⤵PID:4164
-
-
C:\Windows\System32\cmd.execmd3⤵PID:4664
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKCU\Software\DownloadManager" /v ExePath 2>nul2⤵
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\System32\reg.exereg query "HKCU\Software\DownloadManager" /v ExePath3⤵PID:2332
-
-
-
C:\Windows\System32\reg.exereg query HKU\S-1-5-192⤵PID:1984
-
-
C:\Windows\System32\reg.exereg query "HKLM\Hardware\Description\System\CentralProcessor\0" /v "Identifier"2⤵
- Checks processor information in registry
PID:1412
-
-
C:\Windows\System32\find.exefind /i "x86"2⤵PID:876
-
-
C:\Windows\System32\mode.commode 90, 302⤵PID:4848
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile /v EnableFirewall 2>nul2⤵
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\System32\reg.exereg query HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile /v EnableFirewall3⤵
- Modifies registry key
PID:1604
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile /v EnableFirewall 2>nul2⤵
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\System32\reg.exereg query HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile /v EnableFirewall3⤵
- Modifies registry key
PID:3164
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v EnableFirewall 2>nul2⤵
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\System32\reg.exereg query HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v EnableFirewall3⤵PID:4644
-
-
-
C:\Windows\System32\choice.exechoice /C:123456 /N2⤵PID:64
-
-
C:\Windows\System32\mode.commode 93, 322⤵PID:5920
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "&{$W=$Host.UI.RawUI.WindowSize;$B=$Host.UI.RawUI.BufferSize;$W.Height=31;$B.Height=300;$Host.UI.RawUI.WindowSize=$W;$Host.UI.RawUI.BufferSize=$B;}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:740
-
-
C:\Windows\System32\PING.EXEping -n 1 internetdownloadmanager.com2⤵
- Runs ping.exe
PID:4160
-
-
C:\Windows\System32\tasklist.exetasklist /fi "imagename eq idman.exe"2⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5392
-
-
C:\Windows\System32\findstr.exefindstr /i "idman.exe"2⤵PID:3376
-
-
C:\Windows\System32\taskkill.exetaskkill /f /im idman.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4812
-
-
C:\Windows\System32\reg.exereg query "HKCU\Software\DownloadManager" "/v" "FName"2⤵PID:2280
-
-
C:\Windows\System32\reg.exereg query "HKCU\Software\DownloadManager" "/v" "LName"2⤵PID:4988
-
-
C:\Windows\System32\reg.exereg query "HKCU\Software\DownloadManager" "/v" "Email"2⤵PID:4936
-
-
C:\Windows\System32\reg.exereg query "HKCU\Software\DownloadManager" "/v" "Serial"2⤵PID:2052
-
-
C:\Windows\System32\reg.exereg query "HKCU\Software\DownloadManager" "/v" "scansk"2⤵PID:6004
-
-
C:\Windows\System32\reg.exereg query "HKCU\Software\DownloadManager" "/v" "tvfrdt"2⤵PID:664
-
-
C:\Windows\System32\reg.exereg query "HKCU\Software\DownloadManager" "/v" "radxcnt"2⤵PID:2616
-
-
C:\Windows\System32\reg.exereg delete "HKCU\Software\DownloadManager" "/v" "radxcnt" /f2⤵PID:1032
-
-
C:\Windows\System32\reg.exereg query "HKCU\Software\DownloadManager" "/v" "LstCheck"2⤵PID:4520
-
-
C:\Windows\System32\reg.exereg delete "HKCU\Software\DownloadManager" "/v" "LstCheck" /f2⤵PID:440
-
-
C:\Windows\System32\reg.exereg query "HKCU\Software\DownloadManager" "/v" "ptrk_scdt"2⤵PID:960
-
-
C:\Windows\System32\reg.exereg query "HKCU\Software\DownloadManager" "/v" "LastCheckQU"2⤵PID:3280
-
-
C:\Windows\System32\reg.exereg query "HKLM\SOFTWARE\Wow6432Node\Internet Download Manager"2⤵PID:4828
-
-
C:\Windows\System32\reg.exereg delete "HKLM\SOFTWARE\Wow6432Node\Internet Download Manager" /f2⤵PID:4084
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID2⤵
- Modifies registry key
PID:2344
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "(gc C:\Windows\Temp\regdata.txt) -replace 'HKEY_CURRENT_USER', 'HKCU' | Out-File -encoding ASCII C:\Windows\Temp\regdata.txt"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5132
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {018D5C66-4533-4307-9B53-224DE2ED1FE6}"2⤵PID:5356
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:5348
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}2⤵PID:4556
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:3820
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {021E4F06-9DCC-49AD-88CF-ECC2DA314C8A}"2⤵PID:4360
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:1320
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{021E4F06-9DCC-49AD-88CF-ECC2DA314C8A}2⤵PID:1388
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:2332
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {07999AC3-058B-40BF-984F-69EB1E554CA7}"2⤵PID:396
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:2664
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{07999AC3-058B-40BF-984F-69EB1E554CA7}2⤵PID:3144
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:2304
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{07999AC3-058B-40BF-984F-69EB1E554CA7}2⤵
- Modifies registry key
PID:4484
-
-
C:\Windows\System32\find.exefind /i "H"2⤵PID:4344
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCU\Software\Classes\Wow6432Node\CLSID\{07999AC3-058B-40BF-984F-69EB1E554CA7} /ve 2>nul2⤵PID:2364
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{07999AC3-058B-40BF-984F-69EB1E554CA7} /ve3⤵
- Modifies registry key
PID:1548
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo (Default) REG_SZ (value not set)"2⤵PID:5408
-
-
C:\Windows\System32\findstr.exefindstr /r /e "[^0-9]"2⤵PID:928
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCU\Software\Classes\Wow6432Node\CLSID\{07999AC3-058B-40BF-984F-69EB1E554CA7}\Version /ve 2>nul2⤵PID:1884
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{07999AC3-058B-40BF-984F-69EB1E554CA7}\Version /ve3⤵PID:940
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCU\Software\Classes\Wow6432Node\CLSID\{07999AC3-058B-40BF-984F-69EB1E554CA7} 2>nul2⤵PID:5396
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{07999AC3-058B-40BF-984F-69EB1E554CA7}3⤵
- Modifies registry key
PID:5192
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Model"2⤵PID:4440
-
-
C:\Windows\System32\findstr.exefindstr /i "MData Model scansk Therad"2⤵PID:4928
-
-
C:\Windows\System32\reg.exereg delete HKCU\Software\Classes\Wow6432Node\CLSID\{07999AC3-058B-40BF-984F-69EB1E554CA7} /f2⤵PID:5328
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {1BF42E4C-4AF4-4CFD-A1A0-CF2960B8F63E}"2⤵PID:3584
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:5916
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{1BF42E4C-4AF4-4CFD-A1A0-CF2960B8F63E}2⤵PID:1920
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:5472
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {20894375-46AE-46E2-BAFD-CB38975CDCE6}"2⤵PID:4900
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:5924
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{20894375-46AE-46E2-BAFD-CB38975CDCE6}2⤵PID:5344
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:1904
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {2e7c0a19-0438-41e9-81e3-3ad3d64f55ba}"2⤵PID:2760
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:5372
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{2e7c0a19-0438-41e9-81e3-3ad3d64f55ba}2⤵PID:1840
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:5316
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {389510b7-9e58-40d7-98bf-60b911cb0ea9}"2⤵PID:5268
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:1716
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{389510b7-9e58-40d7-98bf-60b911cb0ea9}2⤵
- Modifies registry key
PID:4688
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:1296
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {4410DC33-BC7C-496B-AA84-4AEA3EEE75F7}"2⤵PID:3480
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:5596
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{4410DC33-BC7C-496B-AA84-4AEA3EEE75F7}2⤵
- Modifies registry key
PID:5632
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:5476
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {47E6DCAF-41F8-441C-BD0E-A50D5FE6C4D1}"2⤵PID:1036
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:3652
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{47E6DCAF-41F8-441C-BD0E-A50D5FE6C4D1}2⤵PID:5000
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:2316
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {5999E1EE-711E-48D2-9884-851A709F543D}"2⤵PID:5952
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:5296
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{5999E1EE-711E-48D2-9884-851A709F543D}2⤵PID:4308
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:5236
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {5AB7172C-9C11-405C-8DD5-AF20F3606282}"2⤵PID:4100
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:3648
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{5AB7172C-9C11-405C-8DD5-AF20F3606282}2⤵PID:3032
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:2084
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {6bb93b4e-44d8-40e2-bd97-42dbcf18a40f}"2⤵PID:2100
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:1960
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{6bb93b4e-44d8-40e2-bd97-42dbcf18a40f}2⤵
- Modifies registry key
PID:4460
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:2968
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {71DCE5D6-4B57-496B-AC21-CD5B54EB93FD}"2⤵PID:5876
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:6136
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{71DCE5D6-4B57-496B-AC21-CD5B54EB93FD}2⤵PID:5724
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:5700
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {7AFDFDDB-F914-11E4-8377-6C3BE50D980C}"2⤵PID:872
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:6084
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{7AFDFDDB-F914-11E4-8377-6C3BE50D980C}2⤵
- Modifies registry key
PID:6048
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:6056
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {7B37E4E2-C62F-4914-9620-8FB5062718CC}"2⤵PID:2292
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:1184
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{7B37E4E2-C62F-4914-9620-8FB5062718CC}2⤵
- Modifies registry key
PID:4320
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:5548
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {82CA8DE3-01AD-4CEA-9D75-BE4C51810A9E}"2⤵PID:2396
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:5456
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{82CA8DE3-01AD-4CEA-9D75-BE4C51810A9E}2⤵
- Modifies registry key
PID:5200
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:5852
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {917E8742-AA3B-7318-FA12-10485FB322A2}"2⤵PID:812
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:5904
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{917E8742-AA3B-7318-FA12-10485FB322A2}2⤵PID:4436
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:4664
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {94269C4E-071A-4116-90E6-52E557067E4E}"2⤵PID:2388
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:4148
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{94269C4E-071A-4116-90E6-52E557067E4E}2⤵
- Modifies registry key
PID:5060
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:3904
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {9489FEB2-1925-4D01-B788-6D912C70F7F2}"2⤵PID:5640
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:4644
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{9489FEB2-1925-4D01-B788-6D912C70F7F2}2⤵PID:2448
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:932
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {9AA2F32D-362A-42D9-9328-24A483E2CCC3}"2⤵PID:5864
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:5884
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{9AA2F32D-362A-42D9-9328-24A483E2CCC3}2⤵PID:3836
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:2296
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {A0396A93-DC06-4AEF-BEE9-95FFCCAEF20E}"2⤵PID:4032
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:1684
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{A0396A93-DC06-4AEF-BEE9-95FFCCAEF20E}2⤵PID:5920
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:5424
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {A3CA1CF4-5F3E-4AC0-91B9-0D3716E1EAC3}"2⤵PID:1628
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:1744
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{A3CA1CF4-5F3E-4AC0-91B9-0D3716E1EAC3}2⤵PID:3060
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:3708
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {A78ED123-AB77-406B-9962-2A5D9D2F7F30}"2⤵PID:1544
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:4596
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{A78ED123-AB77-406B-9962-2A5D9D2F7F30}2⤵
- Modifies registry key
PID:3456
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:5796
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {A926714B-7BFC-4D08-A035-80021395FFA8}"2⤵PID:5064
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:1004
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{A926714B-7BFC-4D08-A035-80021395FFA8}2⤵
- Modifies registry key
PID:1600
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:3376
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {AB807329-7324-431B-8B36-DBD581F56E0B}"2⤵PID:4228
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:840
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{AB807329-7324-431B-8B36-DBD581F56E0B}2⤵PID:2060
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:5880
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {BBACC218-34EA-4666-9D7A-C78F2274A524}"2⤵PID:2796
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:2632
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{BBACC218-34EA-4666-9D7A-C78F2274A524}2⤵
- Modifies registry key
PID:4340
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:4876
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {C5FF006E-2AE9-408C-B85B-2DFDD5449D9C}"2⤵PID:5280
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:180
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{C5FF006E-2AE9-408C-B85B-2DFDD5449D9C}2⤵
- Modifies registry key
PID:5552
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:1704
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {CB3D0F55-BC2C-4C1A-85ED-23ED75B5106B}"2⤵PID:3468
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:1780
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{CB3D0F55-BC2C-4C1A-85ED-23ED75B5106B}2⤵PID:3076
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:4616
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {F241C880-6982-4CE5-8CF7-7085BA96DA5A}"2⤵PID:3280
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:5104
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{F241C880-6982-4CE5-8CF7-7085BA96DA5A}2⤵PID:876
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:4828
-
-
C:\Windows\System32\reg.exereg add "HKLM\SOFTWARE\Wow6432Node\Internet Download Manager" /v "AdvIntDriverEnabled2" /t REG_DWORD /d "1" /f2⤵PID:5524
-
-
C:\Windows\System32\reg.exereg add HKCU\SOFTWARE\DownloadManager /v FName /t REG_SZ /d "Soft98.iR [ SalaR ]"2⤵PID:5460
-
-
C:\Windows\System32\reg.exereg add HKCU\SOFTWARE\DownloadManager /v LName /t REG_SZ /d ""2⤵
- Modifies registry key
PID:3764
-
-
C:\Windows\System32\reg.exePID:2344
-
-
C:\Windows\System32\reg.exereg add HKCU\SOFTWARE\DownloadManager /v Serial /t REG_SZ /d "FOX6H-3KWH4-7TSIN-Q4US7"2⤵
- Modifies registry key
PID:3980
-
-
C:\Windows\System32\tasklist.exetasklist /fi "imagename eq idman.exe"2⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5140
-
-
C:\Windows\System32\findstr.exefindstr /i "idman.exe"2⤵PID:5152
-
-
C:\Program Files (x86)\Internet Download Manager\IDMan.exe"C:\Program Files (x86)\Internet Download Manager\IDMan.exe" /n /d "https://www.internetdownloadmanager.com/images/idm_box_min.png" /p "C:\Windows\Temp" /f temp.png2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5136 -
C:\Program Files (x86)\Internet Download Manager\IDMIntegrator64.exe"C:\Program Files (x86)\Internet Download Manager\IDMIntegrator64.exe" -runcm3⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3820
-
-
C:\Program Files (x86)\Internet Download Manager\Uninstall.exe"C:\Program Files (x86)\Internet Download Manager\Uninstall.exe" -instdriv3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1320 -
C:\Windows\system32\RUNDLL32.EXE"C:\Windows\Sysnative\RUNDLL32.EXE" SETUPAPI.DLL,InstallHinfSection DefaultInstall 128 C:\Program Files (x86)\Internet Download Manager\idmwfp.inf4⤵
- Adds Run key to start application
- Drops file in Windows directory
PID:5648 -
C:\Windows\system32\runonce.exe"C:\Windows\system32\runonce.exe" -r5⤵
- Checks processor information in registry
PID:2304 -
C:\Windows\System32\grpconv.exe"C:\Windows\System32\grpconv.exe" -o6⤵PID:2340
-
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" start IDMWFP4⤵PID:5400
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start IDMWFP5⤵PID:3668
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" start IDMWFP4⤵PID:5388
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start IDMWFP5⤵PID:1824
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" start IDMWFP4⤵PID:5372
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start IDMWFP5⤵PID:5268
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" start IDMWFP4⤵PID:4712
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start IDMWFP5⤵PID:5596
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" start IDMWFP4⤵PID:5096
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start IDMWFP5⤵PID:1620
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" start IDMWFP4⤵PID:3960
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start IDMWFP5⤵PID:3648
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\IDMShellExt64.dll"4⤵
- Loads dropped DLL
PID:5624 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\Internet Download Manager\IDMShellExt64.dll"5⤵
- Loads dropped DLL
- Registers COM server for autorun
PID:4864
-
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\IDMShellExt64.dll"3⤵
- Loads dropped DLL
PID:6076 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\Internet Download Manager\IDMShellExt64.dll"4⤵
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:528
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\IDMIECC64.dll"3⤵
- Loads dropped DLL
PID:6028 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\Internet Download Manager\IDMIECC64.dll"4⤵
- Loads dropped DLL
- Registers COM server for autorun
PID:4192
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\IDMGetAll64.dll"3⤵
- Loads dropped DLL
PID:6036 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\Internet Download Manager\IDMGetAll64.dll"4⤵
- Loads dropped DLL
- Registers COM server for autorun
PID:6044
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\downlWithIDM64.dll"3⤵
- Loads dropped DLL
PID:3208 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\Internet Download Manager\downlWithIDM64.dll"4⤵
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:4804
-
-
-
-
C:\Windows\System32\timeout.exetimeout /t 12⤵
- Delays execution with timeout.exe
PID:5380
-
-
C:\Windows\System32\timeout.exetimeout /t 12⤵
- Delays execution with timeout.exe
PID:1976
-
-
C:\Windows\System32\timeout.exetimeout /t 12⤵
- Delays execution with timeout.exe
PID:2252
-
-
C:\Windows\System32\timeout.exetimeout /t 12⤵
- Delays execution with timeout.exe
PID:3124
-
-
C:\Windows\System32\timeout.exetimeout /t 12⤵
- Delays execution with timeout.exe
PID:1768
-
-
C:\Windows\System32\timeout.exetimeout /t 12⤵
- Delays execution with timeout.exe
PID:4652
-
-
C:\Windows\System32\timeout.exetimeout /t 12⤵
- Delays execution with timeout.exe
PID:4020
-
-
C:\Windows\System32\timeout.exetimeout /t 12⤵
- Delays execution with timeout.exe
PID:5564
-
-
C:\Program Files (x86)\Internet Download Manager\IDMan.exe"C:\Program Files (x86)\Internet Download Manager\IDMan.exe" /n /d "https://www.internetdownloadmanager.com/register/IDMlib/images/idman_logos.png" /p "C:\Windows\Temp" /f temp.png2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6064
-
-
C:\Windows\System32\timeout.exetimeout /t 12⤵
- Delays execution with timeout.exe
PID:5992
-
-
C:\Windows\System32\timeout.exetimeout /t 12⤵
- Delays execution with timeout.exe
PID:5500
-
-
C:\Windows\System32\timeout.exetimeout /t 12⤵
- Delays execution with timeout.exe
PID:5064
-
-
C:\Windows\System32\timeout.exetimeout /t 12⤵
- Delays execution with timeout.exe
PID:2436
-
-
C:\Windows\System32\timeout.exetimeout /t 12⤵
- Delays execution with timeout.exe
PID:3752
-
-
C:\Windows\System32\timeout.exetimeout /t 32⤵
- Delays execution with timeout.exe
PID:5184
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID2⤵
- Modifies registry key
PID:5772
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "(gc C:\Windows\Temp\regdata.txt) -replace 'HKEY_CURRENT_USER', 'HKCU' | Out-File -encoding ASCII C:\Windows\Temp\regdata.txt"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:456
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {018D5C66-4533-4307-9B53-224DE2ED1FE6}"2⤵PID:3724
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:3468
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}2⤵PID:3076
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:3228
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {021E4F06-9DCC-49AD-88CF-ECC2DA314C8A}"2⤵PID:3280
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:5104
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{021E4F06-9DCC-49AD-88CF-ECC2DA314C8A}2⤵PID:4456
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:4828
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {117d8d8c-f3c5-78eb-fdd0-2e12e282ce38}"2⤵PID:3596
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:5460
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{117d8d8c-f3c5-78eb-fdd0-2e12e282ce38}2⤵
- Modifies registry key
PID:5820
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:2344
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{117d8d8c-f3c5-78eb-fdd0-2e12e282ce38}2⤵PID:5828
-
-
C:\Windows\System32\find.exefind /i "H"2⤵PID:5148
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {1a1cd5b8-87c0-8f72-c626-fe56aa45cf0e}"2⤵PID:5540
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:5152
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{1a1cd5b8-87c0-8f72-c626-fe56aa45cf0e}2⤵PID:4756
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:5380
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{1a1cd5b8-87c0-8f72-c626-fe56aa45cf0e}2⤵PID:536
-
-
C:\Windows\System32\find.exefind /i "H"2⤵PID:1548
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {1BF42E4C-4AF4-4CFD-A1A0-CF2960B8F63E}"2⤵PID:1384
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:4484
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{1BF42E4C-4AF4-4CFD-A1A0-CF2960B8F63E}2⤵PID:2304
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:2228
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {1d445b43-8fa0-91d2-e11d-c75224b492c1}"2⤵PID:1980
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:5288
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{1d445b43-8fa0-91d2-e11d-c75224b492c1}2⤵
- Modifies registry key
PID:5612
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:5340
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{1d445b43-8fa0-91d2-e11d-c75224b492c1}2⤵
- Modifies registry key
PID:3644
-
-
C:\Windows\System32\find.exefind /i "H"2⤵PID:5328
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCU\Software\Classes\Wow6432Node\CLSID\{1d445b43-8fa0-91d2-e11d-c75224b492c1} /ve 2>nul2⤵PID:4040
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{1d445b43-8fa0-91d2-e11d-c75224b492c1} /ve3⤵
- Modifies registry key
PID:2496
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo (Default) REG_SZ 23"2⤵PID:3020
-
-
C:\Windows\System32\findstr.exefindstr /r /e "[^0-9]"2⤵PID:5788
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {20894375-46AE-46E2-BAFD-CB38975CDCE6}"2⤵PID:2908
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:5020
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{20894375-46AE-46E2-BAFD-CB38975CDCE6}2⤵PID:2004
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:5712
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {2e7c0a19-0438-41e9-81e3-3ad3d64f55ba}"2⤵PID:1824
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:944
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{2e7c0a19-0438-41e9-81e3-3ad3d64f55ba}2⤵PID:5416
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:1716
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {389510b7-9e58-40d7-98bf-60b911cb0ea9}"2⤵PID:3756
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:2472
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{389510b7-9e58-40d7-98bf-60b911cb0ea9}2⤵
- Modifies registry key
PID:5372
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:5908
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {4410DC33-BC7C-496B-AA84-4AEA3EEE75F7}"2⤵PID:3124
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:5776
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{4410DC33-BC7C-496B-AA84-4AEA3EEE75F7}2⤵PID:5888
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:4712
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {47E6DCAF-41F8-441C-BD0E-A50D5FE6C4D1}"2⤵PID:1036
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:5544
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{47E6DCAF-41F8-441C-BD0E-A50D5FE6C4D1}2⤵PID:2300
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:2852
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {5999E1EE-711E-48D2-9884-851A709F543D}"2⤵PID:400
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:5096
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{5999E1EE-711E-48D2-9884-851A709F543D}2⤵PID:5352
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:5236
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {5AB7172C-9C11-405C-8DD5-AF20F3606282}"2⤵PID:6140
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:1624
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{5AB7172C-9C11-405C-8DD5-AF20F3606282}2⤵
- Modifies registry key
PID:3876
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:4312
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {6bb93b4e-44d8-40e2-bd97-42dbcf18a40f}"2⤵PID:5648
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:5716
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{6bb93b4e-44d8-40e2-bd97-42dbcf18a40f}2⤵PID:4864
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:5300
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {6df1156a-4e9a-0112-58b5-f725cb396858}"2⤵PID:3624
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:1144
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{6df1156a-4e9a-0112-58b5-f725cb396858}2⤵PID:5296
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:5488
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{6df1156a-4e9a-0112-58b5-f725cb396858}2⤵PID:6092
-
-
C:\Windows\System32\find.exefind /i "H"2⤵PID:4508
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {71DCE5D6-4B57-496B-AC21-CD5B54EB93FD}"2⤵PID:4284
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:6080
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{71DCE5D6-4B57-496B-AC21-CD5B54EB93FD}2⤵
- Modifies registry key
PID:2636
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:6096
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {79873CC5-3951-43ED-BDF9-D8759474B6FD}"2⤵PID:6048
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:4980
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{79873CC5-3951-43ED-BDF9-D8759474B6FD}2⤵
- Modifies registry key
PID:2292
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:6088
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{79873CC5-3951-43ED-BDF9-D8759474B6FD}2⤵
- Modifies registry key
PID:5724
-
-
C:\Windows\System32\find.exefind /i "H"2⤵PID:5940
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCU\Software\Classes\Wow6432Node\CLSID\{79873CC5-3951-43ED-BDF9-D8759474B6FD} /ve 2>nul2⤵PID:5200
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{79873CC5-3951-43ED-BDF9-D8759474B6FD} /ve3⤵
- Modifies registry key
PID:3168
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo (Default) REG_SZ (value not set)"2⤵PID:952
-
-
C:\Windows\System32\findstr.exefindstr /r /e "[^0-9]"2⤵PID:696
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCU\Software\Classes\Wow6432Node\CLSID\{79873CC5-3951-43ED-BDF9-D8759474B6FD}\Version /ve 2>nul2⤵PID:3616
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{79873CC5-3951-43ED-BDF9-D8759474B6FD}\Version /ve3⤵
- Modifies registry key
PID:3192
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCU\Software\Classes\Wow6432Node\CLSID\{79873CC5-3951-43ED-BDF9-D8759474B6FD} 2>nul2⤵PID:4148
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{79873CC5-3951-43ED-BDF9-D8759474B6FD}3⤵PID:608
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Model"2⤵PID:3904
-
-
C:\Windows\System32\findstr.exefindstr /i "MData Model scansk Therad"2⤵PID:4904
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {7AFDFDDB-F914-11E4-8377-6C3BE50D980C}"2⤵PID:5640
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:3140
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{7AFDFDDB-F914-11E4-8377-6C3BE50D980C}2⤵
- Modifies registry key
PID:4116
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:2448
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {7B37E4E2-C62F-4914-9620-8FB5062718CC}"2⤵PID:5864
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:2964
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{7B37E4E2-C62F-4914-9620-8FB5062718CC}2⤵PID:5256
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:5564
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {82CA8DE3-01AD-4CEA-9D75-BE4C51810A9E}"2⤵PID:2660
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:692
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{82CA8DE3-01AD-4CEA-9D75-BE4C51810A9E}2⤵PID:2296
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:2676
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {917E8742-AA3B-7318-FA12-10485FB322A2}"2⤵PID:3156
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:4408
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{917E8742-AA3B-7318-FA12-10485FB322A2}2⤵PID:4808
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:3708
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {94269C4E-071A-4116-90E6-52E557067E4E}"2⤵PID:3836
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:1100
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{94269C4E-071A-4116-90E6-52E557067E4E}2⤵
- Modifies registry key
PID:740
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:4164
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {9489FEB2-1925-4D01-B788-6D912C70F7F2}"2⤵PID:4160
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:1912
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{9489FEB2-1925-4D01-B788-6D912C70F7F2}2⤵
- Modifies registry key
PID:5500
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:4960
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {9AA2F32D-362A-42D9-9328-24A483E2CCC3}"2⤵PID:5392
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:4812
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{9AA2F32D-362A-42D9-9328-24A483E2CCC3}2⤵
- Modifies registry key
PID:840
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:2032
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {A0396A93-DC06-4AEF-BEE9-95FFCCAEF20E}"2⤵PID:1392
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:5832
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{A0396A93-DC06-4AEF-BEE9-95FFCCAEF20E}2⤵PID:3752
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:6000
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {A3CA1CF4-5F3E-4AC0-91B9-0D3716E1EAC3}"2⤵PID:2380
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:6004
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{A3CA1CF4-5F3E-4AC0-91B9-0D3716E1EAC3}2⤵
- Modifies registry key
PID:180
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:5772
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {A78ED123-AB77-406B-9962-2A5D9D2F7F30}"2⤵PID:4340
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:4908
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{A78ED123-AB77-406B-9962-2A5D9D2F7F30}2⤵PID:1300
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:5188
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {A926714B-7BFC-4D08-A035-80021395FFA8}"2⤵PID:2796
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:1780
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{A926714B-7BFC-4D08-A035-80021395FFA8}2⤵PID:3468
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:4972
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {AB807329-7324-431B-8B36-DBD581F56E0B}"2⤵PID:3228
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:5216
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{AB807329-7324-431B-8B36-DBD581F56E0B}2⤵PID:5104
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:2696
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {BBACC218-34EA-4666-9D7A-C78F2274A524}"2⤵PID:5084
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:2732
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{BBACC218-34EA-4666-9D7A-C78F2274A524}2⤵
- Modifies registry key
PID:3764
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:5460
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {C5FF006E-2AE9-408C-B85B-2DFDD5449D9C}"2⤵PID:5960
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:2188
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{C5FF006E-2AE9-408C-B85B-2DFDD5449D9C}2⤵PID:880
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:5148
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {CB3D0F55-BC2C-4C1A-85ED-23ED75B5106B}"2⤵PID:4516
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:5152
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{CB3D0F55-BC2C-4C1A-85ED-23ED75B5106B}2⤵
- Modifies registry key
PID:4568
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:1388
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {E6871B76-C3C8-44DD-B947-ABFFE144860D}"2⤵PID:4884
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:1548
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{E6871B76-C3C8-44DD-B947-ABFFE144860D}2⤵PID:2220
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:4484
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{E6871B76-C3C8-44DD-B947-ABFFE144860D}2⤵
- Modifies registry key
PID:4344
-
-
C:\Windows\System32\find.exefind /i "H"2⤵PID:2228
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {e8db64d1-a324-8243-5b3e-0b07b841e613}"2⤵PID:676
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:3668
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{e8db64d1-a324-8243-5b3e-0b07b841e613}2⤵
- Modifies registry key
PID:5528
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:5616
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{e8db64d1-a324-8243-5b3e-0b07b841e613}2⤵PID:5408
-
-
C:\Windows\System32\find.exefind /i "H"2⤵PID:3620
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {F241C880-6982-4CE5-8CF7-7085BA96DA5A}"2⤵PID:4264
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:2496
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{F241C880-6982-4CE5-8CF7-7085BA96DA5A}2⤵
- Modifies registry key
PID:1920
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:3020
-
-
C:\Windows\System32\tasklist.exetasklist /fi "imagename eq idman.exe"2⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5124
-
-
C:\Windows\System32\findstr.exefindstr /i "idman.exe"2⤵PID:1904
-
-
C:\Windows\System32\taskkill.exetaskkill /f /im idman.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4136
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID2⤵PID:6068
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "(gc C:\Windows\Temp\regdata.txt) -replace 'HKEY_CURRENT_USER', 'HKCU' | Out-File -encoding ASCII C:\Windows\Temp\regdata.txt"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {018D5C66-4533-4307-9B53-224DE2ED1FE6}"2⤵PID:1036
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:5544
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}2⤵PID:5000
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:1340
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {021E4F06-9DCC-49AD-88CF-ECC2DA314C8A}"2⤵PID:1620
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:5520
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{021E4F06-9DCC-49AD-88CF-ECC2DA314C8A}2⤵PID:5512
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:3960
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {117d8d8c-f3c5-78eb-fdd0-2e12e282ce38}"2⤵PID:2488
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:5088
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{117d8d8c-f3c5-78eb-fdd0-2e12e282ce38}2⤵
- Modifies registry key
PID:1552
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:2100
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{117d8d8c-f3c5-78eb-fdd0-2e12e282ce38}2⤵PID:2900
-
-
C:\Windows\System32\find.exefind /i "H"2⤵PID:3032
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe $A='HKCU\Software\Classes\Wow6432Node\CLSID\{117d8d8c-f3c5-78eb-fdd0-2e12e282ce38}','','S-1-1-0','S-1-0-0','Deny','FullControl';iex(([io.file]::ReadAllText('C:\Users\Admin\AppData\Local\Temp\Activation.cmd')-split':Own1\:.*')[1])2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
-
C:\Windows\System32\reg.exereg delete HKCU\Software\Classes\Wow6432Node\CLSID\{117d8d8c-f3c5-78eb-fdd0-2e12e282ce38} /f2⤵
- Modifies registry key
PID:2636
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {1a1cd5b8-87c0-8f72-c626-fe56aa45cf0e}"2⤵PID:5964
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:6048
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{1a1cd5b8-87c0-8f72-c626-fe56aa45cf0e}2⤵PID:636
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:2292
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{1a1cd5b8-87c0-8f72-c626-fe56aa45cf0e}2⤵
- Modifies registry key
PID:2936
-
-
C:\Windows\System32\find.exefind /i "H"2⤵PID:5944
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe $A='HKCU\Software\Classes\Wow6432Node\CLSID\{1a1cd5b8-87c0-8f72-c626-fe56aa45cf0e}','','S-1-1-0','S-1-0-0','Deny','FullControl';iex(([io.file]::ReadAllText('C:\Users\Admin\AppData\Local\Temp\Activation.cmd')-split':Own1\:.*')[1])2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4668
-
-
C:\Windows\System32\reg.exereg delete HKCU\Software\Classes\Wow6432Node\CLSID\{1a1cd5b8-87c0-8f72-c626-fe56aa45cf0e} /f2⤵PID:4644
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {1BF42E4C-4AF4-4CFD-A1A0-CF2960B8F63E}"2⤵PID:5640
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:5484
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{1BF42E4C-4AF4-4CFD-A1A0-CF2960B8F63E}2⤵PID:932
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:3104
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {1d445b43-8fa0-91d2-e11d-c75224b492c1}"2⤵PID:5904
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:5884
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{1d445b43-8fa0-91d2-e11d-c75224b492c1}2⤵
- Modifies registry key
PID:64
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:4132
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{1d445b43-8fa0-91d2-e11d-c75224b492c1}2⤵
- Modifies registry key
PID:5424
-
-
C:\Windows\System32\find.exefind /i "H"2⤵PID:5176
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCU\Software\Classes\Wow6432Node\CLSID\{1d445b43-8fa0-91d2-e11d-c75224b492c1} /ve 2>nul2⤵PID:1628
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{1d445b43-8fa0-91d2-e11d-c75224b492c1} /ve3⤵PID:5572
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo (Default) REG_SZ 23"2⤵PID:3060
-
-
C:\Windows\System32\findstr.exefindstr /r /e "[^0-9]"2⤵PID:2644
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe $A='HKCU\Software\Classes\Wow6432Node\CLSID\{1d445b43-8fa0-91d2-e11d-c75224b492c1}','','S-1-1-0','S-1-0-0','Deny','FullControl';iex(([io.file]::ReadAllText('C:\Users\Admin\AppData\Local\Temp\Activation.cmd')-split':Own1\:.*')[1])2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
C:\Windows\System32\reg.exereg delete HKCU\Software\Classes\Wow6432Node\CLSID\{1d445b43-8fa0-91d2-e11d-c75224b492c1} /f2⤵
- Modifies registry key
PID:2216
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {20894375-46AE-46E2-BAFD-CB38975CDCE6}"2⤵PID:4812
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:4872
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{20894375-46AE-46E2-BAFD-CB38975CDCE6}2⤵
- Modifies registry key
PID:2032
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:4048
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {2e7c0a19-0438-41e9-81e3-3ad3d64f55ba}"2⤵PID:5832
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:5880
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{2e7c0a19-0438-41e9-81e3-3ad3d64f55ba}2⤵PID:5052
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:2052
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {389510b7-9e58-40d7-98bf-60b911cb0ea9}"2⤵PID:6004
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:6060
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{389510b7-9e58-40d7-98bf-60b911cb0ea9}2⤵
- Modifies registry key
PID:5772
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:4988
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {4410DC33-BC7C-496B-AA84-4AEA3EEE75F7}"2⤵PID:4908
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:1704
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{4410DC33-BC7C-496B-AA84-4AEA3EEE75F7}2⤵
- Modifies registry key
PID:5188
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:456
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {47E6DCAF-41F8-441C-BD0E-A50D5FE6C4D1}"2⤵PID:1780
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:2872
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{47E6DCAF-41F8-441C-BD0E-A50D5FE6C4D1}2⤵PID:4972
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:3280
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {5999E1EE-711E-48D2-9884-851A709F543D}"2⤵PID:5216
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:4456
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{5999E1EE-711E-48D2-9884-851A709F543D}2⤵PID:5792
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:2212
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {5AB7172C-9C11-405C-8DD5-AF20F3606282}"2⤵PID:5840
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:3764
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{5AB7172C-9C11-405C-8DD5-AF20F3606282}2⤵
- Modifies registry key
PID:3980
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:5960
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {6bb93b4e-44d8-40e2-bd97-42dbcf18a40f}"2⤵PID:5140
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:5540
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{6bb93b4e-44d8-40e2-bd97-42dbcf18a40f}2⤵PID:5356
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:4516
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {6df1156a-4e9a-0112-58b5-f725cb396858}"2⤵PID:316
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:536
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{6df1156a-4e9a-0112-58b5-f725cb396858}2⤵PID:2368
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:1384
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{6df1156a-4e9a-0112-58b5-f725cb396858}2⤵
- Modifies registry key
PID:332
-
-
C:\Windows\System32\find.exefind /i "H"2⤵PID:2304
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe $A='HKCU\Software\Classes\Wow6432Node\CLSID\{6df1156a-4e9a-0112-58b5-f725cb396858}','','S-1-1-0','S-1-0-0','Deny','FullControl';iex(([io.file]::ReadAllText('C:\Users\Admin\AppData\Local\Temp\Activation.cmd')-split':Own1\:.*')[1])2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2424
-
-
C:\Windows\System32\reg.exereg delete HKCU\Software\Classes\Wow6432Node\CLSID\{6df1156a-4e9a-0112-58b5-f725cb396858} /f2⤵PID:5984
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {71DCE5D6-4B57-496B-AC21-CD5B54EB93FD}"2⤵PID:5924
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:3020
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{71DCE5D6-4B57-496B-AC21-CD5B54EB93FD}2⤵
- Modifies registry key
PID:2004
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:5020
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {79873CC5-3951-43ED-BDF9-D8759474B6FD}"2⤵PID:1412
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:5348
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{79873CC5-3951-43ED-BDF9-D8759474B6FD}2⤵
- Modifies registry key
PID:2020
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:1320
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{79873CC5-3951-43ED-BDF9-D8759474B6FD}2⤵PID:6036
-
-
C:\Windows\System32\find.exefind /i "H"2⤵PID:5712
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCU\Software\Classes\Wow6432Node\CLSID\{79873CC5-3951-43ED-BDF9-D8759474B6FD} /ve 2>nul2⤵PID:5416
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{79873CC5-3951-43ED-BDF9-D8759474B6FD} /ve3⤵PID:764
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo (Default) REG_SZ (value not set)"2⤵PID:1296
-
-
C:\Windows\System32\findstr.exefindstr /r /e "[^0-9]"2⤵PID:908
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCU\Software\Classes\Wow6432Node\CLSID\{79873CC5-3951-43ED-BDF9-D8759474B6FD}\Version /ve 2>nul2⤵PID:1792
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{79873CC5-3951-43ED-BDF9-D8759474B6FD}\Version /ve3⤵PID:5888
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKCU\Software\Classes\Wow6432Node\CLSID\{79873CC5-3951-43ED-BDF9-D8759474B6FD} 2>nul2⤵PID:3696
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{79873CC5-3951-43ED-BDF9-D8759474B6FD}3⤵
- Modifies registry key
PID:3756
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Model"2⤵PID:3124
-
-
C:\Windows\System32\findstr.exefindstr /i "MData Model scansk Therad"2⤵PID:5112
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe $A='HKCU\Software\Classes\Wow6432Node\CLSID\{79873CC5-3951-43ED-BDF9-D8759474B6FD}','','S-1-1-0','S-1-0-0','Deny','FullControl';iex(([io.file]::ReadAllText('C:\Users\Admin\AppData\Local\Temp\Activation.cmd')-split':Own1\:.*')[1])2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:852
-
-
C:\Windows\System32\reg.exereg delete HKCU\Software\Classes\Wow6432Node\CLSID\{79873CC5-3951-43ED-BDF9-D8759474B6FD} /f2⤵
- Modifies registry key
PID:2332
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {7AFDFDDB-F914-11E4-8377-6C3BE50D980C}"2⤵PID:5932
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:3240
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{7AFDFDDB-F914-11E4-8377-6C3BE50D980C}2⤵PID:1552
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:5648
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {7B37E4E2-C62F-4914-9620-8FB5062718CC}"2⤵PID:5808
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:1960
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{7B37E4E2-C62F-4914-9620-8FB5062718CC}2⤵
- Modifies registry key
PID:5488
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:2024
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {82CA8DE3-01AD-4CEA-9D75-BE4C51810A9E}"2⤵PID:4284
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:4508
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{82CA8DE3-01AD-4CEA-9D75-BE4C51810A9E}2⤵PID:5860
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:1608
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {917E8742-AA3B-7318-FA12-10485FB322A2}"2⤵PID:1304
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:5324
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{917E8742-AA3B-7318-FA12-10485FB322A2}2⤵PID:2084
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:6096
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {94269C4E-071A-4116-90E6-52E557067E4E}"2⤵PID:5964
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:4980
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{94269C4E-071A-4116-90E6-52E557067E4E}2⤵
- Modifies registry key
PID:5472
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:2396
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {9489FEB2-1925-4D01-B788-6D912C70F7F2}"2⤵PID:5724
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:4020
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{9489FEB2-1925-4D01-B788-6D912C70F7F2}2⤵PID:4664
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:2308
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {9AA2F32D-362A-42D9-9328-24A483E2CCC3}"2⤵PID:5680
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:4660
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{9AA2F32D-362A-42D9-9328-24A483E2CCC3}2⤵PID:4420
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:3592
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {A0396A93-DC06-4AEF-BEE9-95FFCCAEF20E}"2⤵PID:5600
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:4148
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{A0396A93-DC06-4AEF-BEE9-95FFCCAEF20E}2⤵PID:4668
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:6108
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {A3CA1CF4-5F3E-4AC0-91B9-0D3716E1EAC3}"2⤵PID:5220
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:4116
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{A3CA1CF4-5F3E-4AC0-91B9-0D3716E1EAC3}2⤵PID:932
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:5560
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {A78ED123-AB77-406B-9962-2A5D9D2F7F30}"2⤵PID:2336
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:5256
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{A78ED123-AB77-406B-9962-2A5D9D2F7F30}2⤵
- Modifies registry key
PID:64
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:5320
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {A926714B-7BFC-4D08-A035-80021395FFA8}"2⤵PID:2296
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:692
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{A926714B-7BFC-4D08-A035-80021395FFA8}2⤵
- Modifies registry key
PID:3156
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:5708
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {AB807329-7324-431B-8B36-DBD581F56E0B}"2⤵PID:2840
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:3060
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{AB807329-7324-431B-8B36-DBD581F56E0B}2⤵PID:5848
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:4888
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {BBACC218-34EA-4666-9D7A-C78F2274A524}"2⤵PID:4364
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:2436
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{BBACC218-34EA-4666-9D7A-C78F2274A524}2⤵PID:5992
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:3708
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {C5FF006E-2AE9-408C-B85B-2DFDD5449D9C}"2⤵PID:3024
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:1600
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{C5FF006E-2AE9-408C-B85B-2DFDD5449D9C}2⤵
- Modifies registry key
PID:4036
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:2216
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {CB3D0F55-BC2C-4C1A-85ED-23ED75B5106B}"2⤵PID:5812
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:4872
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{CB3D0F55-BC2C-4C1A-85ED-23ED75B5106B}2⤵PID:2032
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:5244
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {E6871B76-C3C8-44DD-B947-ABFFE144860D}"2⤵PID:5832
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:1396
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{E6871B76-C3C8-44DD-B947-ABFFE144860D}2⤵PID:5052
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:2380
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{E6871B76-C3C8-44DD-B947-ABFFE144860D}2⤵PID:180
-
-
C:\Windows\System32\find.exefind /i "H"2⤵PID:4448
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe $A='HKCU\Software\Classes\Wow6432Node\CLSID\{E6871B76-C3C8-44DD-B947-ABFFE144860D}','','S-1-1-0','S-1-0-0','Deny','FullControl';iex(([io.file]::ReadAllText('C:\Users\Admin\AppData\Local\Temp\Activation.cmd')-split':Own1\:.*')[1])2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4340
-
-
C:\Windows\System32\reg.exereg delete HKCU\Software\Classes\Wow6432Node\CLSID\{E6871B76-C3C8-44DD-B947-ABFFE144860D} /f2⤵PID:5156
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {e8db64d1-a324-8243-5b3e-0b07b841e613}"2⤵PID:3228
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:1972
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{e8db64d1-a324-8243-5b3e-0b07b841e613}2⤵
- Modifies registry key
PID:5800
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:4828
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{e8db64d1-a324-8243-5b3e-0b07b841e613}2⤵PID:5084
-
-
C:\Windows\System32\find.exefind /i "H"2⤵PID:5144
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe $A='HKCU\Software\Classes\Wow6432Node\CLSID\{e8db64d1-a324-8243-5b3e-0b07b841e613}','','S-1-1-0','S-1-0-0','Deny','FullControl';iex(([io.file]::ReadAllText('C:\Users\Admin\AppData\Local\Temp\Activation.cmd')-split':Own1\:.*')[1])2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5820
-
-
C:\Windows\System32\reg.exereg delete HKCU\Software\Classes\Wow6432Node\CLSID\{e8db64d1-a324-8243-5b3e-0b07b841e613} /f2⤵PID:4884
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo {F241C880-6982-4CE5-8CF7-7085BA96DA5A}"2⤵PID:4676
-
-
C:\Windows\System32\findstr.exefindstr /r "{.*-.*-.*-.*-.*}"2⤵PID:3700
-
-
C:\Windows\System32\reg.exereg query HKCU\Software\Classes\Wow6432Node\CLSID\{F241C880-6982-4CE5-8CF7-7085BA96DA5A}2⤵
- Modifies registry key
PID:2220
-
-
C:\Windows\System32\findstr.exefindstr /i "LocalServer32 InProcServer32 InProcHandler32"2⤵PID:396
-
-
C:\Windows\System32\mode.commode 90, 302⤵PID:1884
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile /v EnableFirewall 2>nul2⤵PID:5328
-
C:\Windows\System32\reg.exereg query HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile /v EnableFirewall3⤵PID:4040
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile /v EnableFirewall 2>nul2⤵PID:676
-
C:\Windows\System32\reg.exereg query HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile /v EnableFirewall3⤵
- Modifies registry key
PID:5400
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v EnableFirewall 2>nul2⤵PID:5528
-
C:\Windows\System32\reg.exereg query HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v EnableFirewall3⤵PID:3744
-
-
-
C:\Windows\System32\choice.exechoice /C:123456 /N2⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdb70e46f8,0x7ffdb70e4708,0x7ffdb70e47182⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,6505511628693179266,12422464601888933617,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,6505511628693179266,12422464601888933617,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2456 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,6505511628693179266,12422464601888933617,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6505511628693179266,12422464601888933617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6505511628693179266,12422464601888933617,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6505511628693179266,12422464601888933617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4228 /prefetch:12⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6505511628693179266,12422464601888933617,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4268 /prefetch:12⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,6505511628693179266,12422464601888933617,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3552 /prefetch:82⤵PID:5236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,6505511628693179266,12422464601888933617,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3552 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6505511628693179266,12422464601888933617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:12⤵PID:5344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6505511628693179266,12422464601888933617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3512 /prefetch:12⤵PID:5676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6505511628693179266,12422464601888933617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:5960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6505511628693179266,12422464601888933617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:6060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2076,6505511628693179266,12422464601888933617,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4036 /prefetch:82⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2076,6505511628693179266,12422464601888933617,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=4760 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6505511628693179266,12422464601888933617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6505511628693179266,12422464601888933617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:5504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6505511628693179266,12422464601888933617,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:5520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6505511628693179266,12422464601888933617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:5808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6505511628693179266,12422464601888933617,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:5816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2076,6505511628693179266,12422464601888933617,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6108 /prefetch:82⤵PID:5488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6505511628693179266,12422464601888933617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6028 /prefetch:12⤵PID:5472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2076,6505511628693179266,12422464601888933617,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6748 /prefetch:82⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,6505511628693179266,12422464601888933617,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5912 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6505511628693179266,12422464601888933617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:6068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6505511628693179266,12422464601888933617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6572 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6505511628693179266,12422464601888933617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1332 /prefetch:12⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2076,6505511628693179266,12422464601888933617,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5916 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4320
-
-
C:\Users\Admin\Downloads\idman642build3.exe"C:\Users\Admin\Downloads\idman642build3.exe"2⤵
- Executes dropped EXE
PID:5716 -
C:\Users\Admin\AppData\Local\Temp\IDM_Setup_Temp\IDM1.tmp"C:\Users\Admin\AppData\Local\Temp\IDM_Setup_Temp\IDM1.tmp" -d "C:\Users\Admin\AppData\Local\Temp\IDM_Setup_Temp\"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4696 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\IDMIECC64.dll"4⤵
- Loads dropped DLL
PID:5680 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\Internet Download Manager\IDMIECC64.dll"5⤵
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:316
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\IDMGetAll64.dll"4⤵
- Loads dropped DLL
PID:5608 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\Internet Download Manager\IDMGetAll64.dll"5⤵
- Loads dropped DLL
- Registers COM server for autorun
PID:3600
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\downlWithIDM64.dll"4⤵
- Loads dropped DLL
PID:5396 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\Internet Download Manager\downlWithIDM64.dll"5⤵
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:2316
-
-
-
C:\Program Files (x86)\Internet Download Manager\idmBroker.exe"C:\Program Files (x86)\Internet Download Manager\idmBroker.exe" -RegServer4⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Modifies registry class
PID:5560
-
-
C:\Program Files (x86)\Internet Download Manager\IDMan.exe"C:\Program Files (x86)\Internet Download Manager\IDMan.exe" /rtr4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3744 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\IDMShellExt64.dll"5⤵
- Loads dropped DLL
PID:5684 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\Internet Download Manager\IDMShellExt64.dll"6⤵
- Loads dropped DLL
- Registers COM server for autorun
PID:4168
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\IDMIECC64.dll"5⤵
- Loads dropped DLL
PID:5916 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\Internet Download Manager\IDMIECC64.dll"6⤵
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:5112
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\IDMGetAll64.dll"5⤵
- Loads dropped DLL
PID:3584 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\Internet Download Manager\IDMGetAll64.dll"6⤵
- Loads dropped DLL
- Registers COM server for autorun
PID:2620
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\downlWithIDM64.dll"5⤵
- Loads dropped DLL
PID:5788 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\Internet Download Manager\downlWithIDM64.dll"6⤵
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:5892
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.internetdownloadmanager.com/support/installffextfrommozillasite.html5⤵PID:5548
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.internetdownloadmanager.com/support/installffextfrommozillasite.html6⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2396 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2396.0.1579913087\1700644260" -parentBuildID 20221007134813 -prefsHandle 1876 -prefMapHandle 1868 -prefsLen 20749 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8b95832a-23f2-485f-a7e3-75a4e298f086} 2396 "\\.\pipe\gecko-crash-server-pipe.2396" 1968 202a1eda758 gpu7⤵PID:2060
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2396.1.1209925919\983810522" -parentBuildID 20221007134813 -prefsHandle 2404 -prefMapHandle 2400 -prefsLen 21565 -prefMapSize 233444 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b3c5ae0d-0dc9-40ee-bddb-ec70d00a69e1} 2396 "\\.\pipe\gecko-crash-server-pipe.2396" 2432 202a1bfd858 socket7⤵
- Checks processor information in registry
PID:5616
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2396.2.1862584100\340910993" -childID 1 -isForBrowser -prefsHandle 3232 -prefMapHandle 3228 -prefsLen 21668 -prefMapSize 233444 -jsInitHandle 1124 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {691c7624-dec5-4139-b612-1357243f2334} 2396 "\\.\pipe\gecko-crash-server-pipe.2396" 3244 2029542d858 tab7⤵PID:5632
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2396.3.1183442599\1306555870" -childID 2 -isForBrowser -prefsHandle 3460 -prefMapHandle 3464 -prefsLen 26066 -prefMapSize 233444 -jsInitHandle 1124 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {73e826db-df98-40aa-8c60-b08292013ce7} 2396 "\\.\pipe\gecko-crash-server-pipe.2396" 3084 202a6d6e858 tab7⤵PID:1808
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2396.4.1659740431\423626227" -childID 3 -isForBrowser -prefsHandle 4868 -prefMapHandle 4860 -prefsLen 26206 -prefMapSize 233444 -jsInitHandle 1124 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {51c99ffd-f1a8-4896-b768-cbbe57b3f14a} 2396 "\\.\pipe\gecko-crash-server-pipe.2396" 4596 20295465358 tab7⤵PID:3152
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2396.5.1021163250\10374432" -childID 4 -isForBrowser -prefsHandle 5164 -prefMapHandle 5168 -prefsLen 26206 -prefMapSize 233444 -jsInitHandle 1124 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {07034cfc-5793-453c-b472-5f9b3fbb96d7} 2396 "\\.\pipe\gecko-crash-server-pipe.2396" 5156 202a809de58 tab7⤵PID:3080
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2396.6.922485931\713005101" -childID 5 -isForBrowser -prefsHandle 5364 -prefMapHandle 5368 -prefsLen 26206 -prefMapSize 233444 -jsInitHandle 1124 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ac32eaa5-042f-469c-9cf2-798f258efd7c} 2396 "\\.\pipe\gecko-crash-server-pipe.2396" 5352 202a809fc58 tab7⤵PID:2976
-
-
-
-
C:\Program Files (x86)\Internet Download Manager\Uninstall.exe"C:\Program Files (x86)\Internet Download Manager\Uninstall.exe" -instdriv5⤵
- Checks computer location settings
- Executes dropped EXE
PID:2044 -
C:\Windows\system32\RUNDLL32.EXE"C:\Windows\Sysnative\RUNDLL32.EXE" SETUPAPI.DLL,InstallHinfSection DefaultInstall 128 C:\Program Files (x86)\Internet Download Manager\idmwfp.inf6⤵
- Adds Run key to start application
- Drops file in Windows directory
PID:5868 -
C:\Windows\system32\runonce.exe"C:\Windows\system32\runonce.exe" -r7⤵
- Checks processor information in registry
PID:5932 -
C:\Windows\System32\grpconv.exe"C:\Windows\System32\grpconv.exe" -o8⤵PID:6136
-
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" start IDMWFP6⤵PID:3256
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start IDMWFP7⤵PID:1920
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" start IDMWFP6⤵PID:3732
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start IDMWFP7⤵PID:3984
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" start IDMWFP6⤵PID:1056
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start IDMWFP7⤵PID:4364
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" start IDMWFP6⤵PID:1624
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start IDMWFP7⤵PID:2488
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" start IDMWFP6⤵PID:4460
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start IDMWFP7⤵PID:184
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" start IDMWFP6⤵PID:5272
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start IDMWFP7⤵PID:2900
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\IDMShellExt64.dll"6⤵
- Loads dropped DLL
PID:872 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\Internet Download Manager\IDMShellExt64.dll"7⤵
- Loads dropped DLL
- Registers COM server for autorun
PID:4020
-
-
-
-
C:\Program Files (x86)\Internet Download Manager\MediumILStart.exe"C:\Program Files (x86)\Internet Download Manager\MediumILStart.exe"5⤵
- Executes dropped EXE
PID:4900
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2076,6505511628693179266,12422464601888933617,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2180 /prefetch:82⤵PID:5312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2076,6505511628693179266,12422464601888933617,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3112 /prefetch:82⤵PID:5880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2076,6505511628693179266,12422464601888933617,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5936 /prefetch:82⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2076,6505511628693179266,12422464601888933617,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5992 /prefetch:82⤵PID:4028
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4808
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:452
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2644
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:3180 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{10bf8880-7fb7-9a4e-86de-70f2c1e2e243}\idmwfp.inf" "9" "4fc2928b3" "000000000000015C" "WinSta0\Default" "000000000000016C" "208" "C:\Program Files (x86)\Internet Download Manager"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:5392
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "8" "4" "C:\Windows\System32\DriverStore\FileRepository\idmwfp.inf_amd64_8b0ebbc2b4585464\idmwfp.inf" "0" "4fc2928b3" "0000000000000178" "WinSta0\Default"2⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:5092
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "8" "4" "C:\Windows\System32\DriverStore\FileRepository\idmwfp.inf_amd64_8b0ebbc2b4585464\idmwfp.inf" "0" "4fc2928b3" "000000000000015C" "WinSta0\Default"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "8" "4" "C:\Windows\System32\DriverStore\FileRepository\idmwfp.inf_amd64_8b0ebbc2b4585464\idmwfp.inf" "0" "4fc2928b3" "00000000000000E8" "WinSta0\Default"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4568
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "8" "4" "C:\Windows\System32\DriverStore\FileRepository\idmwfp.inf_amd64_8b0ebbc2b4585464\idmwfp.inf" "0" "4fc2928b3" "00000000000000B8" "WinSta0\Default"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1320
-
-
C:\Program Files (x86)\Internet Download Manager\IDMan.exe"C:\Program Files (x86)\Internet Download Manager\IDMan.exe" -Embedding1⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1216 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\IDMShellExt64.dll"2⤵
- Loads dropped DLL
PID:6000 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\Internet Download Manager\IDMShellExt64.dll"3⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:5344
-
-
-
C:\Program Files (x86)\Internet Download Manager\Uninstall.exe"C:\Program Files (x86)\Internet Download Manager\Uninstall.exe" -instdriv2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5184 -
C:\Windows\system32\RUNDLL32.EXE"C:\Windows\Sysnative\RUNDLL32.EXE" SETUPAPI.DLL,InstallHinfSection DefaultInstall 128 C:\Program Files (x86)\Internet Download Manager\idmwfp.inf3⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:5412 -
C:\Windows\system32\runonce.exe"C:\Windows\system32\runonce.exe" -r4⤵
- Checks processor information in registry
PID:4688 -
C:\Windows\System32\grpconv.exe"C:\Windows\System32\grpconv.exe" -o5⤵PID:4700
-
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" start IDMWFP3⤵PID:4572
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start IDMWFP4⤵PID:5476
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" start IDMWFP3⤵PID:6140
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start IDMWFP4⤵PID:5520
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" start IDMWFP3⤵PID:1908
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start IDMWFP4⤵PID:3656
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" start IDMWFP3⤵PID:5724
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start IDMWFP4⤵PID:6136
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" start IDMWFP3⤵PID:4284
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start IDMWFP4⤵PID:6072
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" start IDMWFP3⤵PID:6080
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start IDMWFP4⤵PID:4192
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\IDMShellExt64.dll"3⤵
- Loads dropped DLL
PID:3496 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\Internet Download Manager\IDMShellExt64.dll"4⤵
- Loads dropped DLL
- Registers COM server for autorun
- Suspicious use of AdjustPrivilegeToken
PID:812
-
-
-
-
C:\Program Files (x86)\Internet Download Manager\IDMan.exe"C:\Program Files (x86)\Internet Download Manager\IDMan.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5984 -
C:\Program Files (x86)\Internet Download Manager\Uninstall.exe"C:\Program Files (x86)\Internet Download Manager\Uninstall.exe" -instdriv2⤵
- Checks computer location settings
- Executes dropped EXE
PID:5692 -
C:\Windows\system32\RUNDLL32.EXE"C:\Windows\Sysnative\RUNDLL32.EXE" SETUPAPI.DLL,InstallHinfSection DefaultInstall 128 C:\Program Files (x86)\Internet Download Manager\idmwfp.inf3⤵
- Adds Run key to start application
- Drops file in Windows directory
PID:6028 -
C:\Windows\system32\runonce.exe"C:\Windows\system32\runonce.exe" -r4⤵
- Checks processor information in registry
PID:5920 -
C:\Windows\System32\grpconv.exe"C:\Windows\System32\grpconv.exe" -o5⤵PID:2944
-
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" start IDMWFP3⤵PID:1988
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start IDMWFP4⤵PID:4712
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" start IDMWFP3⤵PID:2300
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start IDMWFP4⤵PID:5512
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" start IDMWFP3⤵PID:5088
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start IDMWFP4⤵PID:2900
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" start IDMWFP3⤵PID:4460
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start IDMWFP4⤵PID:4284
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" start IDMWFP3⤵PID:5860
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start IDMWFP4⤵PID:5324
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" start IDMWFP3⤵PID:4044
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start IDMWFP4⤵PID:5508
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\IDMShellExt64.dll"3⤵PID:2396
-
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\Internet Download Manager\IDMShellExt64.dll"4⤵PID:3768
-
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\IDMShellExt64.dll"2⤵PID:608
-
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\Internet Download Manager\IDMShellExt64.dll"3⤵
- Registers COM server for autorun
PID:4420
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\IDMIECC64.dll"2⤵PID:6124
-
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\Internet Download Manager\IDMIECC64.dll"3⤵
- Registers COM server for autorun
- Modifies registry class
PID:2392
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\IDMGetAll64.dll"2⤵PID:696
-
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\Internet Download Manager\IDMGetAll64.dll"3⤵
- Registers COM server for autorun
- Modifies registry class
PID:5368
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\downlWithIDM64.dll"2⤵PID:3140
-
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\Internet Download Manager\downlWithIDM64.dll"3⤵
- Registers COM server for autorun
- Modifies registry class
PID:5640
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Browser Extensions
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5d04845fab1c667c04458d0a981f3898e
SHA1f30267bb7037a11669605c614fb92734be998677
SHA25633a8a6b9413d60a38237bafc4c331dfebf0bf64f8057abc335b4a6a6b95c9381
SHA512ccd166dbe9aaba3795963af7d63b1a561de90153c2eaefb12f3e9f9ddebd9b1f7861ee76f45b4ef19d41ca514f3796e98b3c3660596730be8d8eb9e1048ef59e
-
Filesize
93KB
MD5597164da15b26114e7f1136965533d72
SHA19eeaa7f7de2d04415b8c435a82ee7eea7bbf5c8a
SHA256117abaeb27451944c72ffee804e674046c58d769bd2e940c71e66edec0725bd1
SHA5127a2d31a1342286e1164f80c6da3a9c07418ebeafb9b4d5b702c0f03065ee26949da22193eb403c8aeec012b6f1c5ff21179104943943302972492fcdccc850d9
-
Filesize
463KB
MD523efcfffee040fdc1786add815ccdf0a
SHA10d535387c904eba74e3cb83745cb4a230c6e0944
SHA2569a9989644213043f2cfff177b907ef2bdd496c2f65803d8f158eae9034918878
SHA512cf69ed7af446a83c084b3bd4b0a3dbb5f013d93013cd7f2369fc8a075fe05db511cfe6b6afdef78026f551b53ad0cb7c786193c579b7f868dd0840b53dbb5e9f
-
Filesize
656KB
MD5e032a50d2cf9c5bf6ff602c1855d5a08
SHA1f1292134eaad69b611a3d7e99c5a317c191468aa
SHA256d0c6d455d067e8717efe2cfb9bdcbeae27b48830fe77e9d45c351fbfb164716d
SHA51277099b44e4822b4a556b4ea6417cf0a131ffb5ee65c3f7537ab4cdc9939f806b15d21972ea4d14a0d95cf946013b9997a9127d798016f68bcd957bbffdab6c11
-
Filesize
448KB
MD5ea3a00a31acfe886a30c1969dcb128b2
SHA14f23bb79556ff588de3af58c9ece74d6d70380b4
SHA256830e5d7baa238e320aa3b8aa5e820449236d1911efba192c1aa97cdfbdac1b5e
SHA512669819a32a28a316a298de21dd103b278ae339545d24c12a0e4bb23cebff2b0586b7464860fb94685c9310269018e79321a6b0bf2797d0eda851a400600395c1
-
Filesize
36KB
MD5a3c44204992e307d121df09dd6a1577c
SHA19482d8ffda34904b1dfd0226b374d1db41ca093d
SHA25648e5c5916f100880e68c9e667c4457eb0065c5c7ab40fb6d85028fd23d3e4838
SHA512f700cf7accab0333bc412f68cdcfb25d68c693a27829bc38a655d52cb313552b59f9243fc51357e9dccd92863deecb529cc68adbc40387aad1437d625fd577f1
-
Filesize
5.7MB
MD5f71b14bc1e75b34b92755b7fa6074ab1
SHA1b4ed20f7a561295085968acc6f1cff8c490e6685
SHA256fe865b89ad67f1f07a5ddd759450a8589a8d59f8c20f8006fa9b76cae87bde50
SHA512e636e28c301548ab78f47079cba1dab300a02fd9df65afed28257646b560e8d02ff7e2c291272ad890e93d2c677c38db4096f7e87e54a37adb039a79d54fd35f
-
Filesize
197KB
MD5b94d0711637b322b8aa1fb96250c86b6
SHA14f555862896014b856763f3d667bce14ce137c8b
SHA25638ac192d707f3ec697dd5fe01a0c6fc424184793df729f427c0cf5dfab6705fe
SHA51272cdb05b4f45e9053ae2d12334dae412e415aebd018568c522fa5fe0f94dd26c7fe7bb81ccd8d6c7b5b42c795b3207dffa6345b8db24ce17beb601829e37a369
-
Filesize
155KB
MD513c99cbf0e66d5a8003a650c5642ca30
SHA170f161151cd768a45509aff91996046e04e1ac2d
SHA2568a51ece1c4c8bcb8c56ca10cb9d97bff0dfe75052412a8d8d970a5eb6933427b
SHA512f3733ef2074f97768c196ad662565b28e9463c2c8cf768166fed95350b21c2eb6845d945778c251093c00c65d7a879186843eb334a8321b9956738d9257ce432
-
Filesize
153KB
MD5e2f17e16e2b1888a64398900999e9663
SHA1688d39cb8700ceb724f0fe2a11b8abb4c681ad41
SHA25697810e0b3838a7dca94d73a8b9e170107642b064713c084c231de6632cb68a9c
SHA5128bde415db03463398e5e546a89c73fff9378f34f5c2854a7c24d7e6e58d5cdf7c52218cb3fc8f1b4052ce473bb522a2e7e2677781bcdec3216284f22d65fc40b
-
Filesize
94KB
MD5235f64226fcd9926fb3a64a4bf6f4cc8
SHA18f7339ca7577ff80e3df5f231c3c2c69f20a412a
SHA2566f0ed0a7a21e73811675e8a13d35c7daa6309214477296a07fe52a3d477578ad
SHA5129c6be540cffb43211e464656c16cb0f6f88fb7224087b690ca910acbd433eaf5479508f088b6e6b5437dd260923e26dd928a861db6a3ce76607ad9e77628262d
-
Filesize
37KB
MD577c37aaa507b49990ec1e787c3526b94
SHA1677d75078e43314e76380658e09a8aabd7a6836c
SHA2561c55021653c37390b3f4f519f7680101d7aaf0892aef5457fe656757632b2e10
SHA512a9474cefe267b9f0c4e207a707a7c05d69ac571ae48bf174a49d2453b41cffd91aa48d8e3278d046df4b9ce81af8755e80f4fa8a7dacbf3b5a1df56f704417b2
-
Filesize
152B
MD547b2c6613360b818825d076d14c051f7
SHA17df7304568313a06540f490bf3305cb89bc03e5c
SHA25647a22bea2e7d0154c59bf5d8790ec68274eb05e9fa6cf0eab0d648121f1a02ac
SHA51208d2366fc1ce87dbe96b9bf997e4c59c9206fcfea47c1f17b01e79aeb0580f25cac5c7349bb453a50775b2743053446653f4129f835f81f4a8547ca392557aac
-
Filesize
152B
MD5e0811105475d528ab174dfdb69f935f3
SHA1dd9689f0f70a07b4e6fb29607e42d2d5faf1f516
SHA256c91388c87878a9e2c530c6096dbdd993b0a26fefe8ad797e0133547225032d6c
SHA5128374a721ea3ff3a1ea70d8a074e5c193dbba27ba7e301f19cea89d648b2378c376e48310c33fe81078cd40b1863daec935e8ac22e8e3878dc3a5bb529d028852
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\67ef7402-ea36-4053-b3bc-2d58e49e9eee.tmp
Filesize27KB
MD5e945cb9a70ccad01303e2eb6490afee8
SHA1ffbb5503bca9df0748e5abfba1c81376c5c71cd6
SHA2569b1c3e0e4f91e21f418dbf3f93e8c7c2cf81c16b68238296339a6eae361a5701
SHA5125c2453079f1bacf3bb7abd63c590b4de3c54339272aa05d951707bb2795427af14af6c0809cb964ba0234a9266b9707f2ab339316119b3811e62ff53a8a72425
-
Filesize
11.5MB
MD584582a8bb1288350b17d9fec4323a8a4
SHA12703a051f265c72a46099021e7873bfcbe073787
SHA25626e1d8e4838ee3334b1d9c2622ed6197c93e87487bc0fefcf29216cee72858f5
SHA5124bf7c1fefb62c055d703505b742484bb3250d98bb95f01690090414966a2711ba2991b312944b32c058b6ca4ee7cfebb9f323b274b4326a178502d032ecd1739
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD599d44a23973f30b9cc42bbf099709019
SHA1e973fe7cc6dc2382a7e6969f587f215ef0e1e373
SHA256e1969a82f32ac2dc473e4e9566527cae288e03988e7c6e10b0d5e304c20b024f
SHA512f542afd04d51e9362e6d61f27fc92c69f7e70ccdc9876dde1c54d4c15ef69e6dc49dd370ad77e4b44f8bcb4df70ba56d181013b1066a7e017e84ccb5a8324fc8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\llbjbkhnmlidjebalopleeepgdfgcpec\6.41.20_0\_locales\en\messages.json
Filesize1KB
MD5b8e6bcbcf876da1bb693d8dfe401034a
SHA11d23b94d68d06be519579fcf21b19e77f3b8218e
SHA2564bde9375572bea04b287d9811d02ab5cc93ae8f2118f6b803275899644bb5dc4
SHA512598bf44814f4a8edc8de7402c81e7aa0e92e3922c92deea913035974f573ccaa2b192b412c3fd0cf78d2f03e916aa3929421837b09ee2e2fc45b366e2319be5e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\llbjbkhnmlidjebalopleeepgdfgcpec\6.41.20_0\manifest.json
Filesize1KB
MD578df55cc7486bb9e3c43d3c48de61c78
SHA1b58bc786cd5f2cbb2427edc7e3af02d273cbb9a6
SHA25650f7ff7554c3a64fd09f4ebf6f88b0e78507a628baed26133cb357dae1128b3d
SHA512972f3ee33a654cbc9f50ba4a982fe79dd3f548acaea3c5ac894eeb841e631fb8d98b6d070c954194ccd66a4cf1f2bb543ed8a0ac2a52721b99164132cb4dd99a
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
1006B
MD5422d89414c8c329358e9729969b32966
SHA19112dd4c7bb5c88e93731fb91937ff40ae1c688f
SHA256eb8bd48f0ceec82637bba6d26ec239132c797721d0a7889d83106079843f5cf2
SHA512d6d2efd50d01b37d52f46330d74d4a137cbbdd7f814cdf05cb354dada236e98aa600d46e9fc6b42b29f80c31b04ee7431a74a8d284f2fc0ad62aba44829a3b17
-
Filesize
639B
MD5938bf52d56100e6d6e12c247ba58ae16
SHA196b1b33b13c81b16822cdabe12e416518eb7ec58
SHA2561ba9047b73d54e28b7db803194af586ef40ffa0af42ffd7b2c4830c60cdd5892
SHA5127822a47d6031b0c9295a390ef5dbe587ce1836cf50bf61628cfa48e1ad5a82464471d2e8aaea986af2af15a0ec0f6d6633d84c6180302c76c0ea88666d0c4cc7
-
Filesize
1006B
MD57c5175f5b35bbfde7bb5858f192a8379
SHA1a154a2345eb31ce44b1079d43b47c5661a824329
SHA2567253a8fc3f66618572b412739deab28201f0d5767afceb55c8586d2ac5d9c6a1
SHA51278ebe3b39956c8fc6c94ba4c923245f2181c3a6f193583e31f112c27c2b801799ea2d82810ad5c3790f1ba81bb960c209621281a3ffddf4ab9bbdb1edbe6f142
-
Filesize
6KB
MD534943d29c8dcfc9f6131a442026ae687
SHA17cce00071721fbc1b6e4f3b6fae4c3c5d6307933
SHA256e2406bf04b4a3b8b7d403916245157660464a4c38f89690bd427e0a3e5e53a57
SHA512ffc14653fb00b06540588f1ed5c458cf8ec2a2076de6facb561bbd2dd98bdd71175bad4fa37d600b0045d88790b8d319b5588e03eb50ee1f0ac7aaa0f34ff145
-
Filesize
6KB
MD5d2400d198c67dc41bfe0605c3d201430
SHA19f5714367226b4801d35fb13ba531220157cbba2
SHA2562da4e248e25247f409e3b96fedd2aac7ba3754c0425631264b5e000eee3832d3
SHA51291d127beded6eaf784c7c80aac33c3ba39e616ef2ec1c1a845314fa6cb9a177361240e56b92dbb30cd5d05104a81f4a82a4a417d83d173c77a8816d0068024e9
-
Filesize
7KB
MD5677b8b9f648ee75bfef8fb91e2e93e26
SHA157616cb49ac48079d26504ce02657269d875c335
SHA256e59b5cb1f83237da7fad6b84dfeb9bc41f8fd2b31f7fa176811869726a794dce
SHA512045edae0ac1680e95ab15aafa428e39c1d9b50ef176a3935a0fd396892ff598830d0db89b31770a650f794c62739d0cfade164a1a3dc9b9277ccdf5b197f8382
-
Filesize
6KB
MD5f9bbfe9549017755e9e507a3a3a32eb1
SHA1fac86f46f2d1033bb5079fa8881a218d31880566
SHA256eaa4fc0ed55c55980d8223ea3cf82ed02a627fe97d09ca343e5e7ad4142e3ccc
SHA512ef3afee9c41dad81d9e93cfe5bba2a83f143b4a527aa898504705105f0e7a46a31ede4fa50eda351b0f16bccd721be4a3a80ebeb4aeb0fbf6ba4c796c665f277
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52fa6f400d84b0a98717b09bd306455fb
SHA1c8ec2e0756adc034abe5e3e8c8bd8bc2292428c8
SHA256d6784d1b05073e1c563d6acf76605caf19c24fabf1a495fc36f64605e858e7ae
SHA512734e4fbe9d3e2da41c97f0be34798eda7789e335df53b2cba7cc5008a048e42c09b1d26769ef524eaed20c93c2b3bb4f7fc73bd9ae9bec15f149c0deac1d9846
-
Filesize
12KB
MD50c9f8eb6d46600fe30d91b7f345a6b25
SHA13070e46311474c5347a64a23aa4c502a1cb027ac
SHA2566de9fb4f84681747ed30e090de06c7cdb9e0ed709039df0a4e76cec02ba228a3
SHA5122eee04e76ec373c8afc05025ec2112cafde5783fb848884a7de5be268c3b40d32390ade45fafbd4c0c31fb7ee28e1377ae1fbf3abf841775f746c69bfa0103b8
-
Filesize
12KB
MD5e3d5a3838cea720f1677f7b26d8801f7
SHA1b3a697fb787f30e806b867c48e3707432ca16f86
SHA25601f36ca7c2e0a104ebe025aecf2446f30eb6c0b268394037fbcd1f1e8059c4ac
SHA512dfea5c2d1b6898da875c1dca3362621e36701a90b5abd68e12c237f05f14c2d91a1b5af36147291fb603eab577de06f049b49975ba66fd10b320de52f91031b5
-
Filesize
11KB
MD52ff88b91dd50e01e41e8acc14503b55c
SHA1ede8d2829007f36264e3279727c20d6684a564b4
SHA256ba9983fa662130faa586a8880fd9ad3d179accf789ad1683ce1b28935583d6aa
SHA512e29358669dd052f84c4523722f3a8db6121ebceb242c1a39b09fbab173bb8decdf2b686f452b9ae9f239e65e6c4933f31e6d6750a5981ce2683004ead496801e
-
Filesize
12KB
MD5fcbaac39f491c4edb518d6e73b140d57
SHA1079309eeb58636c18fb31b82e60fd6278b0c37d6
SHA2564eef4ad800bfca7d783340d5507d9ae7a12c478ea6392b03737c46b093a15688
SHA512947215a5f2b43f0404e5d130ae23e70437176f1ef86bbad71c5acd7c036014f596ff95c2dcd2aeaaa63005b2079921de3f6514822fd166bfdfa3fab86a8b5b5f
-
Filesize
12KB
MD58177c8526b5f8fc2ef08a3fe25e4bf01
SHA100026266ce70c39849bc1d42c66ae00b47506d7f
SHA25658c6ab33c49d86430f9e537a1f3cad522f848898ae698ebdd68f742a91965265
SHA5124acb4b987543dacc9687f6450881f72f51c4f5c974b8613933ea6ec76bc716e3dacc0c2e7fee79b74d9c2dde74834aea2c280c7fc879f06fb47dddc2ab25439a
-
Filesize
162KB
MD5b9be2bb9b8141b80903cc2fe83bfe30b
SHA15e03b00a3d601717a47d90dec8ab20ae2dbd2f45
SHA256ab22a282915750e9d07ddbe300a7d4a3b23b69074a0311a1a5ba4fa2bea48e7f
SHA5128727fc335cd1750d36889f08d2b12489b6382c668edcbcb1224e6cf0b50b6ec5caf1801e1ccf09593863cd5f48556f8faafd7955fe8553d60176ab0814e83a3b
-
Filesize
478B
MD5037b1fe5fc234d083575584a8688190c
SHA15d0323913a2810b5ea1b61a930ae0c2841a8ba4a
SHA2568364ada954a900039f0ea21b5548ad6da7cfda56b73a2ab5b0d7a970f8730cbe
SHA5120489316229884ff4be6731ff3c9e02e80e79410bc39cb698b41595420bc93477bdb26d735098c4bd98c66dd31a266d29e8a754aa8850099a3fa3f2c9df948441
-
Filesize
4KB
MD595603374b9eb7270e9e6beca6f474427
SHA12448e71bcdf4fdbe42558745a62f25ed0007ce62
SHA2564ff66e3c1e781d92abb757f537af13b1fb3fa167b86d330b7ed302728c7da53a
SHA512d3987f207ad05e142d864b3ffe4ff6758d22b56f75d60ebcd79e0c760cf27106d7ff74bfbc7569389710e50602d3359b4ab20ddc14fbafcf526478dc85bfe593
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
21KB
MD52e447852fefa5218d00f255ba6900ed9
SHA10e940ec0a61ca50c48d27d5b7a40f1949ec3b914
SHA2564ec99a3dc06530d5c20f536f62b475ed65263a8e1e417f0da74ecb403e757c89
SHA512d6bdc3636425ea123c756afd8f10b2331c20485c2c89488b511684528948b1198463ab78aa596a6493dcd56fa7e734a25bd2f09bc343d92d4a3f76a1bfcad646
-
Filesize
2KB
MD5f8f346d967dcb225c417c4cf3ab217a0
SHA1daca3954f2a882f220b862993b0d5ddf0f207e34
SHA256a54e0ac05254a464180e30f21a6b26651e7495427353bba9c246ba1d2388e7cc
SHA512760c2914f3e937a2a3443a032cf74b68b6d24d082d0f50d65058a0fd87d8eeab229fb8d3105e442f0b3b0b2f3824439981951266425512e51e7ff36669a652fa
-
Filesize
355B
MD5830a29e2fb17dbd8c7dba37e52a52721
SHA16873f1c963f4e1605779a589d9ead6e0271318c9
SHA256a360faac9c8c5a934008f5fbafcbb567bca67cd31a6a2fe1a942afb81c109ca3
SHA51218ac432c6c5effadf57d22e432ff53834aed308536f76e3edef8352f89dca6a815d466156905fcde829018e9c2483cbbf829eef3a2a9d284b73d6bfc8652a3f9
-
Filesize
64B
MD506debf4b3feae84edf7ece5573073a08
SHA138a31ec3678f4b31e899b0cbde38d091a76c1288
SHA2565bc35c20d5476eea550e34045228580d5d08d6c899cf41750800bec3ebba54e0
SHA512e0e204e2650e156f9a9f94a4b0837a16585d9e0340556521fa1a968128b34f77a89ecda2a292cbe7a9c8cebe57efd9f699868c344ebf281198895c76c4f05ba8
-
Filesize
355B
MD51447f6624579eddca1695cd44adc91eb
SHA139990b766c0ae020fc94f21aded0566124e52521
SHA256dbbb1935663b955ef44520ff492813682712bac92ac2bcf30362d012649d9afe
SHA5128b6c81419563125d46fcce1564c792cc99e8c99935b0d3504d48091e23cf2ae4995021b1fddeaeb1b8ace975ff2e8e9e0e48977ce0bb283c6ac21c4b5b6c39a7
-
Filesize
348B
MD5b127df5e429a42128933621637ba3df6
SHA164b8e3d69569fad9422a1f821510035f3051a62b
SHA25618ff04f2d9f03b47c7b0dd3a11ab9683f41d69876c1d36a62c51577bcec9281c
SHA512213d32d5e445bdf82deec5e6628718e9518860f1f45d9f68e7725c42672e5fa41beef40b9c34ce51d3a9501a01d2031cd4416458bdaad3d36bd13497be4b047e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xh4b7nwe.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5fc382b2b818c80677b4be950cbedb7c9
SHA1e71c5bb4c3e4aa2e8ae77d096615c34a35547215
SHA256017eaf994bbcd3eeed5efd48cd7264b40ad9afab8cf48acdd7f377d14206e382
SHA51288bbeecba6ad7d9667c121ec70fefd8b53345ee7cfbbe1bc350f3261701b2f279a4d65a2f9f0d39a1cc8fd84ba30f56116019c0e0364e218dfd4659aca4bd17b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xh4b7nwe.default-release\datareporting\glean\pending_pings\9820beb4-6c31-443f-a95a-413dd639bd47
Filesize746B
MD5800b58fd85146d6f4a4935bdeb5f890f
SHA1baee2df7c44cde4ca21af3b9af289e02b83aade0
SHA256f29aaba3af83ddad9e42449826b104d27a225e1c7dfb6351a0cec0926c50dbf0
SHA51249f20e601b66d3387fef7b0f966c1daa8542ea97050fc9f959d3a411c1fdf45ae9ae1c8496f417ff9d1a1b1f8edcc86247d03302eaf54767ac53205c3c48b37b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xh4b7nwe.default-release\datareporting\glean\pending_pings\bb060d92-ad8f-4fe4-b072-7591fec67332
Filesize11KB
MD5ac5c4c28f7974cdc58a91068229bed9d
SHA1bd3453f8333ef8f601ce0fdc6a0bf40e282697eb
SHA256a02a42cb050bc96dfc83cb6a00a503669fdb2270832863179689e8b580bbefa9
SHA5128c352c3c15dc74f6fc64407464676ac9a8fbcf490b1e46b17fc44cfe071b1af41c743c377d570580cd01aa9c92a419582939dffb39542494196133eb51c3d947
-
Filesize
6KB
MD5acc0e34bf3d8c70df8a3a35d983305bc
SHA1dbe82c4e43cad9011be7e1fb8a0e8d24a80fdd87
SHA256ecff82a9b178609b6923f5cc7af209703948608166108f58efa1f2be0afcad44
SHA5123953e7c01db23381e0d75b7cf373abe67f510b98d389999df4469351043b90de9696cd4181ba17e33db1dfb3e833aaf241a5566062b5145a9ec08f615eb604f2
-
Filesize
6KB
MD5cb98669cf210ccbe7a83a07a30c49519
SHA1a1747158dd6715e3d2044c53ad3cd371eb707214
SHA25690d51ccb13ea9cc2022d0afa89e5649c6e46daa76fd43ad82b2d29a53824eb76
SHA5128957f30c93aeb98ef5b5e034c990d5db2cae4ddf18eb04e1ca9d066e41982375e071e1b421433170fee2f62d27eb42821126793da8da5ae711fa065ae567613f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xh4b7nwe.default-release\sessionCheckpoints.json.tmp
Filesize259B
MD5700fe59d2eb10b8cd28525fcc46bc0cc
SHA1339badf0e1eba5332bff317d7cf8a41d5860390d
SHA2564f5d849bdf4a5eeeb5da8836589e064e31c8e94129d4e55b1c69a6f98fb9f9ea
SHA5123fa1b3fd4277d5900140e013b1035cb4c72065afcc6b6a8595b43101cfe7d09e75554a877e4a01bb80b0d7a58cdcfe553c4a9ef308c5695c5e77cb0ea99bada4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xh4b7nwe.default-release\sessionstore.jsonlz4
Filesize444B
MD5f781e40efe5ca3e2ad2c6425e7bb42cd
SHA178b631f81d35da2e31d1c7f1e1c77c5ca7d2f6ea
SHA256704c97ffbfc6f652fcf3546ef0aaad8162a121ef6161db866ec59ca2336f3292
SHA512c0421e0e1d7332269f9c93dec820ff170040476d9938abb5338bbc584c2dafb558bd833a57b12216c43f2a8be1cac80f7d476c3438d6f0735fc064dc82c92d1a
-
Filesize
169KB
MD57d55ad6b428320f191ed8529701ac2fa
SHA1515c36115e6eba2699afbf196ae929f56dc8fe4c
SHA256753a1386e7b37ee313db908183afe7238f1a2aec5e6c1e59e9c11d471b6aaa8d
SHA512a260aae4ff4f064b10388d88bb0cb9ea547ed0bc02c88dc1770935207e0429471d8cd60fcc5f9ee51ecd34767bf7d44c75ea6fbe427c39cc4114aad25100f40d
-
Filesize
12KB
MD5d5e0819228c5c2fbee1130b39f5908f3
SHA1ce83de8e675bfbca775a45030518c2cf6315e175
SHA25652818c67be219bc3b05c58b40e51b99a65c2f4bcafe38a995610b4ec10928def
SHA512bb397004f2256db781385de3e7e7b7993be8fbb2cb701ead99a7878c2bcca6c9ae4a7aa61c329aeeb6711c8c74081e971e85af38af6b32b58888c932fd51d218
-
Filesize
51KB
MD5076ab35d6cd3a9bbc418cf0bdb77cf8d
SHA1c8d4cdf2a796b47edc1fbe2d871973968b28e9cd
SHA2568f3dc3389af46078d30556cf56e9d2a621f78dad02e00c398c3d2d5d63ec64e6
SHA512d3c7dd84f8d4c2f34162359ed7eca591262ab9f3bd10a420223fd00862e5d98b6b2bf1f1017d605dd2e7cef1c77bf4c6b97f59a782a51f37eeca7517c76b78f6
-
Filesize
10KB
MD59b35f9d2bdbd5129eb5fc172a7745b7e
SHA152a5063246e45f24877afabbf45714bf04b49ed8
SHA256fefe2e856f60023fa08d628749fdb8904e0bd70da486c98c3bd5ad17a05dc11f
SHA5125bc64993b0e1986017fc7d2265b1ff336bfe6dc05c7bb874416709d02b55926df4887adfe63b6a7adbf51b2ff3ad8da59377962dd0085cee33546f086ea8769e