File name:

Internet Download Manager v6.42 Build20 by Ghost.exe

Full analysis: https://app.any.run/tasks/32287594-2c19-422c-9562-48fa6389c74b
Verdict: Malicious activity
Analysis date: May 31, 2025, 15:40:27
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
idm
tool
upx
autoit
auto
generic
arch-scr
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed, 3 sections
MD5:

847338A4170A611AECD2DDCCC45985F0

SHA1:

9F6867C54B155E9E3071C7B8860434E62CDD5A22

SHA256:

30D8ECEDFC8BC5B13CAB01ECAC80C4E86C34732169E90DDAFCB05FBA778FE67D

SSDEEP:

98304:p8Cgzkib1obp+hPoMi1hezfq7LtPnDbIjDuaHjulHWzCNbSKkGqLq615AqKVH7/i:H0Mui+OuB7d51sj/e1e2Uz

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Registers / Runs the DLL via REGSVR32.EXE

      • IDM1.tmp (PID: 5568)
      • IDMan.exe (PID: 4560)
      • Uninstall.exe (PID: 4452)
      • IDMan.exe (PID: 7232)
    • GENERIC has been found (auto)

      • rundll32.exe (PID: 1452)
      • Internet Download Manager v6.42 Build20 by Ghost.exe (PID: 5124)
      • drvinst.exe (PID: 1804)
    • Creates internet connection object (SCRIPT)

      • wscript.exe (PID: 7952)
      • wscript.exe (PID: 8096)
    • Opens an HTTP connection (SCRIPT)

      • wscript.exe (PID: 7952)
      • wscript.exe (PID: 8096)
    • Changes the autorun value in the registry

      • rundll32.exe (PID: 1452)
    • Sends HTTP request (SCRIPT)

      • wscript.exe (PID: 7952)
      • wscript.exe (PID: 8096)
    • Deletes a file (SCRIPT)

      • wscript.exe (PID: 7952)
      • wscript.exe (PID: 8096)
    • Starts NET.EXE for service management

      • Uninstall.exe (PID: 4452)
      • net.exe (PID: 7548)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • Internet Download Manager v6.42 Build20 by Ghost.exe (PID: 5124)
      • IDM1.tmp (PID: 5568)
      • IDMan.exe (PID: 4560)
      • Uninstall.exe (PID: 4452)
    • Executable content was dropped or overwritten

      • Internet Download Manager v6.42 Build20 by Ghost.exe (PID: 5124)
      • rundll32.exe (PID: 1452)
      • IDMan.exe (PID: 4560)
      • Fix.exe (PID: 6156)
      • drvinst.exe (PID: 1804)
    • Starts application with an unusual extension

      • idman642build40.exe (PID: 1852)
      • cmd.exe (PID: 1196)
    • The process creates files with name similar to system file names

      • IDM1.tmp (PID: 5568)
    • Creates a software uninstall entry

      • IDM1.tmp (PID: 5568)
    • Creates/Modifies COM task schedule object

      • IDM1.tmp (PID: 5568)
      • regsvr32.exe (PID: 7380)
      • regsvr32.exe (PID: 6880)
      • regsvr32.exe (PID: 5332)
      • IDMan.exe (PID: 4560)
      • regsvr32.exe (PID: 7280)
      • regsvr32.exe (PID: 7768)
      • regsvr32.exe (PID: 900)
      • regsvr32.exe (PID: 2692)
      • regsvr32.exe (PID: 5304)
    • Drops a system driver (possible attempt to evade defenses)

      • rundll32.exe (PID: 1452)
      • drvinst.exe (PID: 1804)
    • Uses RUNDLL32.EXE to load library

      • Uninstall.exe (PID: 4452)
    • Creates files in the driver directory

      • drvinst.exe (PID: 1804)
    • The process downloads a VBScript from the remote host

      • Fix.exe (PID: 6156)
    • The process executes VB scripts

      • Fix.exe (PID: 6156)
    • Creates FileSystem object to access computer's file system (SCRIPT)

      • wscript.exe (PID: 8096)
      • wscript.exe (PID: 7952)
    • Adds, changes, or deletes HTTP request header (SCRIPT)

      • wscript.exe (PID: 8096)
      • wscript.exe (PID: 7952)
    • Creates or modifies Windows services

      • drvinst.exe (PID: 7832)
      • Uninstall.exe (PID: 4452)
    • Sets XML DOM element text (SCRIPT)

      • wscript.exe (PID: 7952)
      • wscript.exe (PID: 8096)
    • Gets full path of the running script (SCRIPT)

      • wscript.exe (PID: 7952)
      • wscript.exe (PID: 8096)
    • There is functionality for taking screenshot (YARA)

      • Internet Download Manager v6.42 Build20 by Ghost.exe (PID: 5124)
    • Uses REG/REGEDIT.EXE to modify registry

      • Fix.exe (PID: 6156)
      • cmd.exe (PID: 1196)
      • cmd.exe (PID: 2908)
    • Starts CMD.EXE for commands execution

      • Fix.exe (PID: 6156)
      • cmd.exe (PID: 516)
      • cmd.exe (PID: 1196)
    • Executing commands from a ".bat" file

      • Fix.exe (PID: 6156)
      • cmd.exe (PID: 1196)
    • Application launched itself

      • cmd.exe (PID: 516)
      • cmd.exe (PID: 1196)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 7716)
      • cmd.exe (PID: 7388)
      • cmd.exe (PID: 1196)
    • Hides command output

      • cmd.exe (PID: 7716)
      • cmd.exe (PID: 2908)
    • Probably obfuscated PowerShell command line is found

      • cmd.exe (PID: 1196)
    • Possibly malicious use of IEX has been detected

      • cmd.exe (PID: 1196)
  • INFO

    • The sample compiled with english language support

      • Internet Download Manager v6.42 Build20 by Ghost.exe (PID: 5124)
      • IDMan.exe (PID: 4560)
      • rundll32.exe (PID: 1452)
      • drvinst.exe (PID: 1804)
      • Fix.exe (PID: 6156)
    • Reads mouse settings

      • Internet Download Manager v6.42 Build20 by Ghost.exe (PID: 5124)
    • Reads the computer name

      • Internet Download Manager v6.42 Build20 by Ghost.exe (PID: 5124)
      • idman642build40.exe (PID: 1852)
      • IDM1.tmp (PID: 5568)
      • idmBroker.exe (PID: 6744)
      • IDMan.exe (PID: 4560)
      • Uninstall.exe (PID: 4452)
      • Fix.exe (PID: 6156)
      • drvinst.exe (PID: 1804)
      • drvinst.exe (PID: 7832)
    • INTERNETDOWNLOADMANAGER mutex has been found

      • idman642build40.exe (PID: 1852)
      • IDM1.tmp (PID: 5568)
      • IDMan.exe (PID: 4560)
    • Checks supported languages

      • Internet Download Manager v6.42 Build20 by Ghost.exe (PID: 5124)
      • idman642build40.exe (PID: 1852)
      • IDM1.tmp (PID: 5568)
      • idmBroker.exe (PID: 6744)
      • IDMan.exe (PID: 4560)
      • Uninstall.exe (PID: 4452)
      • drvinst.exe (PID: 1804)
      • Fix.exe (PID: 6156)
      • drvinst.exe (PID: 7832)
      • chcp.com (PID: 4120)
    • Process checks computer location settings

      • Internet Download Manager v6.42 Build20 by Ghost.exe (PID: 5124)
      • IDM1.tmp (PID: 5568)
      • IDMan.exe (PID: 4560)
      • Uninstall.exe (PID: 4452)
    • Create files in a temporary directory

      • Internet Download Manager v6.42 Build20 by Ghost.exe (PID: 5124)
      • idman642build40.exe (PID: 1852)
      • IDM1.tmp (PID: 5568)
      • IDMan.exe (PID: 4560)
      • rundll32.exe (PID: 1452)
      • Fix.exe (PID: 6156)
      • reg.exe (PID: 7748)
    • Creates files in the program directory

      • IDM1.tmp (PID: 5568)
      • IDMan.exe (PID: 4560)
      • Fix.exe (PID: 6156)
    • Creates files or folders in the user directory

      • IDM1.tmp (PID: 5568)
      • IDMan.exe (PID: 4560)
      • Fix.exe (PID: 6156)
    • Reads the machine GUID from the registry

      • IDMan.exe (PID: 4560)
      • drvinst.exe (PID: 1804)
    • Reads the software policy settings

      • IDMan.exe (PID: 4560)
      • drvinst.exe (PID: 1804)
    • Disables trace logs

      • IDMan.exe (PID: 4560)
    • Checks proxy server information

      • IDMan.exe (PID: 4560)
      • wscript.exe (PID: 7952)
      • wscript.exe (PID: 8096)
    • Launch of the file from Registry key

      • rundll32.exe (PID: 1452)
    • Reads the time zone

      • runonce.exe (PID: 7456)
    • Reads security settings of Internet Explorer

      • runonce.exe (PID: 7456)
    • The process uses AutoIt

      • Internet Download Manager v6.42 Build20 by Ghost.exe (PID: 5124)
    • UPX packer has been detected

      • Internet Download Manager v6.42 Build20 by Ghost.exe (PID: 5124)
    • Checks operating system version

      • cmd.exe (PID: 1196)
    • Checks whether the specified file exists (POWERSHELL)

      • powershell.exe (PID: 7292)
      • powershell.exe (PID: 1180)
    • Changes the display of characters in the console

      • cmd.exe (PID: 1196)
    • Manual execution by a user

      • IDMan.exe (PID: 7232)
    • Application launched itself

      • firefox.exe (PID: 4224)
      • firefox.exe (PID: 6560)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 EXE PECompact compressed (generic) (40)
.exe | UPX compressed Win32 Executable (26)
.exe | Win32 EXE Yoda's Crypter (25.6)
.exe | Win32 Executable (generic) (4.3)
.exe | Generic Win/DOS Executable (1.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:05:31 06:59:07+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 14.16
CodeSize: 385024
InitializedDataSize: 12623872
UninitializedDataSize: 13172736
EntryPoint: 0xcee9d0
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 6.42.20.0
ProductVersionNumber: 16.42.20.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: English (British)
CharacterSet: Unicode
FileVersion: 6.42.20.0
Comments: Silent install
FileDescription: Internet Download Manager
ProductVersion: 16.42.20.0
CompanyName: Ghost Productions
LegalCopyright: Ghost
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
236
Monitored processes
103
Malicious processes
11
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #GENERIC internet download manager v6.42 build20 by ghost.exe idman642build40.exe no specs idm1.tmp no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs idmbroker.exe no specs regsvr32.exe no specs idman.exe regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs uninstall.exe no specs #GENERIC rundll32.exe #GENERIC drvinst.exe fix.exe wscript.exe wscript.exe drvinst.exe no specs runonce.exe no specs grpconv.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs regsvr32.exe no specs regsvr32.exe no specs reg.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs reg.exe no specs find.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs find.exe no specs powershell.exe no specs find.exe no specs powershell.exe no specs find.exe no specs cmd.exe no specs powershell.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs cmd.exe no specs powershell.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs powershell.exe no specs chcp.com no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs idman.exe no specs regsvr32.exe no specs idmintegrator64.exe no specs regsvr32.exe no specs firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs slui.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs internet download manager v6.42 build20 by ghost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
132"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4988 -childID 3 -isForBrowser -prefsHandle 4980 -prefMapHandle 4248 -prefsLen 38176 -prefMapSize 244583 -jsInitHandle 1352 -jsInitLen 235124 -parentBuildID 20240213221259 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1e40817b-a549-478f-89ae-3d84c1f2aa2b} 4224 "\\.\pipe\gecko-crash-server-pipe.4224" 142ddc72a10 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Version:
123.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ucrtbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\msvcp140.dll
232cmdC:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winbrand.dll
444"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4872 -parentBuildID 20240213221259 -sandboxingKind 0 -prefsHandle 4860 -prefMapHandle 4864 -prefsLen 36588 -prefMapSize 244583 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {91bb8d83-12cf-4a4f-90cd-72f8e0350632} 4224 "\\.\pipe\gecko-crash-server-pipe.4224" 142ddab5310 utilityC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Version:
123.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ucrtbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\msvcp140.dll
516C:\WINDOWS\system32\cmd.exe /c echo prompt $E | cmdC:\Windows\SysWOW64\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
616\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
632\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exereg.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
632reg query "HKCU\Software\DownloadManager" "/v" "LstCheck" C:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
680powershell.exe "([System.Security.Principal.NTAccount](Get-WmiObject -Class Win32_ComputerSystem).UserName).Translate([System.Security.Principal.SecurityIdentifier]).Value" C:\Windows\System32\WindowsPowerShell\v1.0\powershell.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
716reg query "HKCU\Software\DownloadManager" "/v" "radxcnt" C:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
776"C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\IDMShellExt64.dll"C:\Windows\SysWOW64\regsvr32.exeIDMan.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
Total events
55 286
Read events
54 813
Write events
331
Delete events
142

Modification events

(PID) Process:(5568) IDM1.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Internet Download Manager
Operation:writeName:UninstallString
Value:
C:\Program Files (x86)\Internet Download Manager\Uninstall.exe
(PID) Process:(5568) IDM1.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Internet Download Manager
Operation:writeName:DisplayName
Value:
Internet Download Manager
(PID) Process:(5568) IDM1.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Internet Download Manager
Operation:writeName:DisplayVersion
Value:
6.42.40
(PID) Process:(5568) IDM1.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Internet Download Manager
Operation:writeName:DisplayIcon
Value:
C:\Program Files (x86)\Internet Download Manager\IDMan.exe
(PID) Process:(5568) IDM1.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Internet Download Manager
Operation:writeName:Publisher
Value:
Tonec Inc.
(PID) Process:(5568) IDM1.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Internet Download Manager
Operation:writeName:URLInfoAbout
Value:
http://www.internetdownloadmanager.com
(PID) Process:(5568) IDM1.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Internet Download Manager
Operation:writeName:HelpLink
Value:
http://www.internetdownloadmanager.com/contact_us.html
(PID) Process:(5568) IDM1.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{94D09862-1875-4FC9-B434-91CF25C840A1}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(5568) IDM1.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4BD46AAE-C51F-4BF7-8BC0-2E86E33D1873}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(5568) IDM1.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0055C089-8582-441B-A0BF-17B458C2A3A8}
Operation:writeName:NoExplorer
Value:
1
Executable files
20
Suspicious files
73
Text files
38
Unknown types
0

Dropped files

PID
Process
Filename
Type
5124Internet Download Manager v6.42 Build20 by Ghost.exeC:\Users\admin\AppData\Local\Temp\autC4.tmpexecutable
MD5:C523542A1E9D110FA18357D4BEC6CF45
SHA256:F7694BE6DDE9B2D60C2FEE25D44F6AA58757A16C5D45F8BBF4D7DA217559A65F
5124Internet Download Manager v6.42 Build20 by Ghost.exeC:\Users\admin\AppData\Local\Temp\Ghost\idman642build40.exeexecutable
MD5:C523542A1E9D110FA18357D4BEC6CF45
SHA256:F7694BE6DDE9B2D60C2FEE25D44F6AA58757A16C5D45F8BBF4D7DA217559A65F
5124Internet Download Manager v6.42 Build20 by Ghost.exeC:\Users\admin\AppData\Local\Temp\Ghost\Banner.jpgimage
MD5:AA2A2EBD443366E37324B87E399A78AE
SHA256:9B4C3645E0AC4D30BE53802511EC952976D2E21847E67485C211B1E6A63F5169
5124Internet Download Manager v6.42 Build20 by Ghost.exeC:\Users\admin\AppData\Local\Temp\autFFD9.tmpimage
MD5:AA2A2EBD443366E37324B87E399A78AE
SHA256:9B4C3645E0AC4D30BE53802511EC952976D2E21847E67485C211B1E6A63F5169
5568IDM1.tmpC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Internet Download Manager\Grabber Help.lnkbinary
MD5:8EACB34050FBF863FA914FB61563FA53
SHA256:832E774CAF996F9F4375D68CC0838294E8F8C1F71115E01A77FE3D4504577D1E
5568IDM1.tmpC:\Program Files (x86)\Internet Download Manager\IDMSetup2.logbinary
MD5:E571B9F7F8462CF2E232B8C018E53F28
SHA256:9C1E2874D7135A2C7BACC46FFA1D967AAC23FE766498486DFCE0DFC39C4B3BD3
5568IDM1.tmpC:\Users\admin\Desktop\Internet Download Manager.lnkbinary
MD5:46C626C5EF11969BBF632B92BD47D896
SHA256:EEED06DBC27C93FA1B9ABBA1BB7FDF8BD3D7EF4B0BC7B1A03EC938E58E11C0E3
5568IDM1.tmpC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Internet Download Manager\TUTORIALS.lnkbinary
MD5:2CFF46ACD0E79C2D8C2EABD602DAD3EB
SHA256:57AADB29FAE4564BD17B794A3D60B2F5BC300EA92E20BD3115114A12549D03CC
5568IDM1.tmpC:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Download Manager\Internet Download Manager.lnkbinary
MD5:ED00CB0E6093A7C589DD8586B3EB88E9
SHA256:A387F3E5A5BC510FB10CC7856BCE760B02E3B506C9D70A42DA3369FCB9094919
5568IDM1.tmpC:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Download Manager\TUTORIALS.lnkbinary
MD5:01EC76B8D57C65AEDE6F1E4FF0488A39
SHA256:84CD1C02150C1B8759EB124EC2072197A621780CCE0F33CCFFE8570BED4E0B5D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
23
DNS requests
24
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7560
svchost.exe
GET
200
2.20.245.139:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7560
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7952
wscript.exe
GET
200
142.250.185.227:80
http://c.pki.goog/r/gsr1.crl
unknown
whitelisted
7952
wscript.exe
GET
200
142.250.185.227:80
http://c.pki.goog/r/r4.crl
unknown
whitelisted
8096
wscript.exe
GET
200
18.173.205.43:80
http://ocsps.ssl.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQg3SSkKA74hABkhmlBtJTz8w3hlAQU%2BWC71OPVNPa49QaAJadz20ZpqJ4CEAOj9NBgMFKjN844CogwMYw%3D
unknown
whitelisted
8096
wscript.exe
GET
200
18.173.205.43:80
http://ocsps.ssl.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSOZnI3uW4l91H%2Fnmb99iT4JNV7YwQUv8Fah%2F8o%2BkE9%2FbdP5B2voGFYKb0CEF67H4z5kSV9LdlHbOP2Rts%3D
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5604
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5604
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
7504
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
7560
svchost.exe
2.20.245.139:80
crl.microsoft.com
Akamai International B.V.
SE
whitelisted
7560
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
5496
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
7560
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
8096
wscript.exe
169.61.27.133:443
www.internetdownloadmanager.com
SOFTLAYER
US
whitelisted
7952
wscript.exe
188.114.97.3:443
idm.0dy.ir
CLOUDFLARENET
NL
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
google.com
  • 142.250.184.206
whitelisted
crl.microsoft.com
  • 2.20.245.139
  • 2.20.245.137
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 23.219.150.101
whitelisted
idm.0dy.ir
  • 188.114.97.3
  • 188.114.96.3
unknown
www.internetdownloadmanager.com
  • 169.61.27.133
whitelisted
c.pki.goog
  • 142.250.185.227
whitelisted
ocsps.ssl.com
  • 18.173.205.43
  • 18.173.205.57
  • 18.173.205.76
  • 18.173.205.113
whitelisted
login.live.com
  • 20.190.160.5
  • 40.126.32.133
  • 20.190.160.132
  • 40.126.32.68
  • 20.190.160.4
  • 40.126.32.72
  • 20.190.160.14
  • 20.190.160.3
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
2196
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
2196
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
No debug info