File name:

IDM.Trial.Reset.v1.0.0.zip

Full analysis: https://app.any.run/tasks/b574eff8-a7fe-4370-938c-9636a090be53
Verdict: Malicious activity
Analysis date: December 07, 2023, 00:43:49
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

016866100C1BEFF73C59F5E02323BE46

SHA1:

60AA90998FDE73E03FFBE42BF899793B32E2EE65

SHA256:

372DC10FBE87C1744D2852877E0D36D37E034B5507F868DE61C8BA6A46D0E012

SSDEEP:

12288:F3EHTdr/G+70+d5oVe+TghBAcRlbqm9Ks3wjNind3y4/VA/Sznml3gUdfFUWgsD5:BN+g6oVe+TgrVWAAjadF/XAVha2D7l

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • IDM Trial Reset.exe (PID: 2632)
  • SUSPICIOUS

    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 2136)
      • IDM Trial Reset.exe (PID: 2632)
      • cmd.exe (PID: 2644)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 1152)
      • cmd.exe (PID: 600)
      • cmd.exe (PID: 604)
      • cmd.exe (PID: 1232)
    • Starts CMD.EXE for commands execution

      • IDM Trial Reset.exe (PID: 2632)
  • INFO

    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 280)
    • Checks supported languages

      • IDM Trial Reset.exe (PID: 2632)
      • SetACLx32.exe (PID: 3144)
      • SetACLx32.exe (PID: 3756)
      • SetACLx32.exe (PID: 3140)
      • SetACLx32.exe (PID: 4036)
      • SetACLx32.exe (PID: 2520)
      • SetACLx32.exe (PID: 3436)
      • SetACLx32.exe (PID: 3016)
      • SetACLx32.exe (PID: 3448)
      • SetACLx32.exe (PID: 4000)
      • SetACLx32.exe (PID: 3228)
      • SetACLx32.exe (PID: 3900)
      • SetACLx32.exe (PID: 3512)
      • SetACLx32.exe (PID: 3644)
      • SetACLx32.exe (PID: 3728)
      • SetACLx32.exe (PID: 556)
      • SetACLx32.exe (PID: 756)
      • SetACLx32.exe (PID: 2488)
      • SetACLx32.exe (PID: 3132)
      • SetACLx32.exe (PID: 1452)
      • SetACLx32.exe (PID: 3536)
      • SetACLx32.exe (PID: 2640)
      • SetACLx32.exe (PID: 3012)
      • SetACLx32.exe (PID: 3364)
      • SetACLx32.exe (PID: 3956)
      • SetACLx32.exe (PID: 3700)
      • SetACLx32.exe (PID: 3152)
      • SetACLx32.exe (PID: 1952)
      • SetACLx32.exe (PID: 2804)
      • SetACLx32.exe (PID: 752)
      • SetACLx32.exe (PID: 3020)
      • SetACLx32.exe (PID: 3524)
      • SetACLx32.exe (PID: 1460)
      • SetACLx32.exe (PID: 3808)
      • SetACLx32.exe (PID: 2644)
      • SetACLx32.exe (PID: 3060)
      • SetACLx32.exe (PID: 1072)
      • SetACLx32.exe (PID: 2524)
      • SetACLx32.exe (PID: 2324)
      • SetACLx32.exe (PID: 3912)
      • SetACLx32.exe (PID: 2512)
      • SetACLx32.exe (PID: 2820)
      • SetACLx32.exe (PID: 2292)
      • SetACLx32.exe (PID: 600)
      • SetACLx32.exe (PID: 1608)
      • SetACLx32.exe (PID: 3680)
      • SetACLx32.exe (PID: 2976)
      • SetACLx32.exe (PID: 4036)
      • SetACLx32.exe (PID: 2548)
      • SetACLx32.exe (PID: 3684)
      • SetACLx32.exe (PID: 3016)
      • SetACLx32.exe (PID: 3000)
      • SetACLx32.exe (PID: 3588)
      • SetACLx32.exe (PID: 3900)
      • SetACLx32.exe (PID: 3228)
      • SetACLx32.exe (PID: 3536)
      • SetACLx32.exe (PID: 1452)
      • SetACLx32.exe (PID: 3512)
      • SetACLx32.exe (PID: 3644)
      • SetACLx32.exe (PID: 4000)
      • SetACLx32.exe (PID: 3556)
      • SetACLx32.exe (PID: 756)
      • SetACLx32.exe (PID: 556)
      • SetACLx32.exe (PID: 3704)
      • SetACLx32.exe (PID: 1752)
      • SetACLx32.exe (PID: 3020)
      • SetACLx32.exe (PID: 2640)
      • SetACLx32.exe (PID: 3132)
      • SetACLx32.exe (PID: 3220)
      • SetACLx32.exe (PID: 2296)
      • SetACLx32.exe (PID: 2260)
      • SetACLx32.exe (PID: 2040)
      • SetACLx32.exe (PID: 2804)
      • SetACLx32.exe (PID: 3912)
      • SetACLx32.exe (PID: 1448)
      • SetACLx32.exe (PID: 952)
      • SetACLx32.exe (PID: 316)
      • SetACLx32.exe (PID: 3744)
      • SetACLx32.exe (PID: 3060)
      • SetACLx32.exe (PID: 2528)
      • SetACLx32.exe (PID: 1560)
      • SetACLx32.exe (PID: 2668)
      • SetACLx32.exe (PID: 3208)
      • SetACLx32.exe (PID: 3452)
      • SetACLx32.exe (PID: 2856)
      • SetACLx32.exe (PID: 3808)
      • SetACLx32.exe (PID: 3936)
      • SetACLx32.exe (PID: 900)
      • SetACLx32.exe (PID: 3360)
      • SetACLx32.exe (PID: 3340)
      • SetACLx32.exe (PID: 1696)
      • SetACLx32.exe (PID: 2988)
      • SetACLx32.exe (PID: 2536)
      • SetACLx32.exe (PID: 3932)
      • SetACLx32.exe (PID: 3464)
      • SetACLx32.exe (PID: 1784)
      • SetACLx32.exe (PID: 3752)
      • SetACLx32.exe (PID: 3380)
      • SetACLx32.exe (PID: 3260)
      • SetACLx32.exe (PID: 3596)
      • SetACLx32.exe (PID: 3412)
      • SetACLx32.exe (PID: 3660)
      • SetACLx32.exe (PID: 3960)
      • SetACLx32.exe (PID: 2892)
      • SetACLx32.exe (PID: 3460)
      • SetACLx32.exe (PID: 3472)
      • SetACLx32.exe (PID: 1436)
      • SetACLx32.exe (PID: 3620)
      • SetACLx32.exe (PID: 2904)
      • SetACLx32.exe (PID: 1376)
      • SetACLx32.exe (PID: 3524)
      • SetACLx32.exe (PID: 3720)
      • SetACLx32.exe (PID: 2004)
      • SetACLx32.exe (PID: 3232)
      • SetACLx32.exe (PID: 2836)
      • SetACLx32.exe (PID: 3004)
      • SetACLx32.exe (PID: 844)
      • SetACLx32.exe (PID: 476)
      • SetACLx32.exe (PID: 3788)
      • SetACLx32.exe (PID: 2504)
      • SetACLx32.exe (PID: 1832)
      • SetACLx32.exe (PID: 2132)
      • SetACLx32.exe (PID: 3032)
      • SetACLx32.exe (PID: 1892)
      • SetACLx32.exe (PID: 2140)
      • SetACLx32.exe (PID: 3128)
      • SetACLx32.exe (PID: 3104)
      • SetACLx32.exe (PID: 1116)
      • SetACLx32.exe (PID: 2532)
      • SetACLx32.exe (PID: 3216)
      • SetACLx32.exe (PID: 2316)
      • SetACLx32.exe (PID: 2788)
      • SetACLx32.exe (PID: 3028)
      • SetACLx32.exe (PID: 3796)
      • SetACLx32.exe (PID: 644)
      • SetACLx32.exe (PID: 3092)
      • SetACLx32.exe (PID: 3184)
      • SetACLx32.exe (PID: 2968)
      • SetACLx32.exe (PID: 4064)
      • SetACLx32.exe (PID: 1608)
      • SetACLx32.exe (PID: 3636)
      • SetACLx32.exe (PID: 2848)
      • SetACLx32.exe (PID: 3564)
      • SetACLx32.exe (PID: 3448)
      • SetACLx32.exe (PID: 2932)
      • SetACLx32.exe (PID: 3728)
      • SetACLx32.exe (PID: 3228)
      • SetACLx32.exe (PID: 3124)
      • SetACLx32.exe (PID: 1452)
      • SetACLx32.exe (PID: 3876)
      • SetACLx32.exe (PID: 2448)
      • SetACLx32.exe (PID: 3900)
      • SetACLx32.exe (PID: 1604)
      • SetACLx32.exe (PID: 3704)
      • SetACLx32.exe (PID: 528)
      • SetACLx32.exe (PID: 1248)
      • SetACLx32.exe (PID: 952)
      • SetACLx32.exe (PID: 3220)
      • SetACLx32.exe (PID: 3548)
      • SetACLx32.exe (PID: 316)
      • SetACLx32.exe (PID: 1820)
    • Reads mouse settings

      • IDM Trial Reset.exe (PID: 2632)
    • Reads the computer name

      • SetACLx32.exe (PID: 3144)
      • SetACLx32.exe (PID: 3140)
      • SetACLx32.exe (PID: 3756)
      • SetACLx32.exe (PID: 4036)
      • SetACLx32.exe (PID: 2520)
      • SetACLx32.exe (PID: 3436)
      • SetACLx32.exe (PID: 3016)
      • SetACLx32.exe (PID: 4000)
      • SetACLx32.exe (PID: 3900)
      • SetACLx32.exe (PID: 3228)
      • SetACLx32.exe (PID: 3448)
      • SetACLx32.exe (PID: 3512)
      • SetACLx32.exe (PID: 3644)
      • SetACLx32.exe (PID: 3728)
      • SetACLx32.exe (PID: 3132)
      • SetACLx32.exe (PID: 756)
      • SetACLx32.exe (PID: 556)
      • SetACLx32.exe (PID: 2488)
      • SetACLx32.exe (PID: 1452)
      • SetACLx32.exe (PID: 3536)
      • SetACLx32.exe (PID: 2640)
      • SetACLx32.exe (PID: 3012)
      • SetACLx32.exe (PID: 3524)
      • SetACLx32.exe (PID: 3956)
      • SetACLx32.exe (PID: 3700)
      • SetACLx32.exe (PID: 3152)
      • SetACLx32.exe (PID: 1952)
      • SetACLx32.exe (PID: 752)
      • SetACLx32.exe (PID: 3020)
      • SetACLx32.exe (PID: 3364)
      • SetACLx32.exe (PID: 2512)
      • SetACLx32.exe (PID: 3808)
      • SetACLx32.exe (PID: 1460)
      • SetACLx32.exe (PID: 3060)
      • SetACLx32.exe (PID: 1072)
      • SetACLx32.exe (PID: 2644)
      • SetACLx32.exe (PID: 2524)
      • SetACLx32.exe (PID: 2324)
      • SetACLx32.exe (PID: 2804)
      • SetACLx32.exe (PID: 3912)
      • SetACLx32.exe (PID: 2820)
      • SetACLx32.exe (PID: 2976)
      • SetACLx32.exe (PID: 1608)
      • SetACLx32.exe (PID: 600)
      • SetACLx32.exe (PID: 2292)
      • SetACLx32.exe (PID: 3680)
      • SetACLx32.exe (PID: 4036)
      • SetACLx32.exe (PID: 2548)
      • SetACLx32.exe (PID: 3684)
      • SetACLx32.exe (PID: 3016)
      • SetACLx32.exe (PID: 3000)
      • SetACLx32.exe (PID: 3588)
      • SetACLx32.exe (PID: 3512)
      • SetACLx32.exe (PID: 3556)
      • SetACLx32.exe (PID: 3228)
      • SetACLx32.exe (PID: 1452)
      • SetACLx32.exe (PID: 3644)
      • SetACLx32.exe (PID: 4000)
      • SetACLx32.exe (PID: 3900)
      • SetACLx32.exe (PID: 3536)
      • SetACLx32.exe (PID: 756)
      • SetACLx32.exe (PID: 3704)
      • SetACLx32.exe (PID: 556)
      • SetACLx32.exe (PID: 1752)
      • SetACLx32.exe (PID: 3020)
      • SetACLx32.exe (PID: 2640)
      • SetACLx32.exe (PID: 3132)
      • SetACLx32.exe (PID: 3220)
      • SetACLx32.exe (PID: 952)
      • SetACLx32.exe (PID: 2040)
      • SetACLx32.exe (PID: 2260)
      • SetACLx32.exe (PID: 3744)
      • SetACLx32.exe (PID: 2804)
      • SetACLx32.exe (PID: 3912)
      • SetACLx32.exe (PID: 1448)
      • SetACLx32.exe (PID: 316)
      • SetACLx32.exe (PID: 2296)
      • SetACLx32.exe (PID: 3808)
      • SetACLx32.exe (PID: 3060)
      • SetACLx32.exe (PID: 1560)
      • SetACLx32.exe (PID: 2668)
      • SetACLx32.exe (PID: 3208)
      • SetACLx32.exe (PID: 3452)
      • SetACLx32.exe (PID: 2856)
      • SetACLx32.exe (PID: 2528)
      • SetACLx32.exe (PID: 1696)
      • SetACLx32.exe (PID: 2988)
      • SetACLx32.exe (PID: 3360)
      • SetACLx32.exe (PID: 2536)
      • SetACLx32.exe (PID: 3936)
      • SetACLx32.exe (PID: 3932)
      • SetACLx32.exe (PID: 3340)
      • SetACLx32.exe (PID: 900)
      • SetACLx32.exe (PID: 3660)
      • SetACLx32.exe (PID: 3380)
      • SetACLx32.exe (PID: 1784)
      • SetACLx32.exe (PID: 3260)
      • SetACLx32.exe (PID: 2892)
      • SetACLx32.exe (PID: 3596)
      • SetACLx32.exe (PID: 3960)
      • SetACLx32.exe (PID: 3464)
      • SetACLx32.exe (PID: 3752)
      • SetACLx32.exe (PID: 3620)
      • SetACLx32.exe (PID: 1436)
      • SetACLx32.exe (PID: 1376)
      • SetACLx32.exe (PID: 2904)
      • SetACLx32.exe (PID: 3412)
      • SetACLx32.exe (PID: 3460)
      • SetACLx32.exe (PID: 3472)
      • SetACLx32.exe (PID: 3524)
      • SetACLx32.exe (PID: 3788)
      • SetACLx32.exe (PID: 2004)
      • SetACLx32.exe (PID: 2504)
      • SetACLx32.exe (PID: 3004)
      • SetACLx32.exe (PID: 3232)
      • SetACLx32.exe (PID: 844)
      • SetACLx32.exe (PID: 3720)
      • SetACLx32.exe (PID: 476)
      • SetACLx32.exe (PID: 2836)
      • SetACLx32.exe (PID: 1892)
      • SetACLx32.exe (PID: 2132)
      • SetACLx32.exe (PID: 2140)
      • SetACLx32.exe (PID: 3128)
      • SetACLx32.exe (PID: 3104)
      • SetACLx32.exe (PID: 1832)
      • SetACLx32.exe (PID: 3032)
      • SetACLx32.exe (PID: 3216)
      • SetACLx32.exe (PID: 2316)
      • SetACLx32.exe (PID: 2788)
      • SetACLx32.exe (PID: 3028)
      • SetACLx32.exe (PID: 3796)
      • SetACLx32.exe (PID: 1116)
      • SetACLx32.exe (PID: 2532)
      • SetACLx32.exe (PID: 644)
      • SetACLx32.exe (PID: 3564)
      • SetACLx32.exe (PID: 3092)
      • SetACLx32.exe (PID: 3448)
      • SetACLx32.exe (PID: 4064)
      • SetACLx32.exe (PID: 1608)
      • SetACLx32.exe (PID: 3636)
      • SetACLx32.exe (PID: 2848)
      • SetACLx32.exe (PID: 2968)
      • SetACLx32.exe (PID: 2932)
      • SetACLx32.exe (PID: 3728)
      • SetACLx32.exe (PID: 3900)
      • SetACLx32.exe (PID: 3228)
      • SetACLx32.exe (PID: 3124)
      • SetACLx32.exe (PID: 3876)
      • SetACLx32.exe (PID: 1452)
      • SetACLx32.exe (PID: 3184)
      • SetACLx32.exe (PID: 3548)
      • SetACLx32.exe (PID: 528)
      • SetACLx32.exe (PID: 1248)
      • SetACLx32.exe (PID: 952)
      • SetACLx32.exe (PID: 2448)
      • SetACLx32.exe (PID: 3220)
      • SetACLx32.exe (PID: 1604)
      • SetACLx32.exe (PID: 3704)
      • SetACLx32.exe (PID: 316)
      • SetACLx32.exe (PID: 1820)
    • Create files in a temporary directory

      • IDM Trial Reset.exe (PID: 2632)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2016:09:06 05:20:26
ZipCRC: 0xd3e76a9d
ZipCompressedSize: 881964
ZipUncompressedSize: 895488
ZipFileName: IDM Trial Reset.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
391
Monitored processes
183
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs idm trial reset.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs findstr.exe no specs findstr.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs reg.exe no specs reg.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs findstr.exe no specs findstr.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
280"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\IDM.Trial.Reset.v1.0.0.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
316"C:\Users\admin\AppData\Local\Temp\SetACLx32.exe" -on HKCU\Software\Classes\Wow6432Node\CLSID\{D5B91409-A8CA-4973-9A0B-59F713D25671} -ot reg -actn setowner -ownr "n:S-1-0-0" -silentC:\Users\admin\AppData\Local\Temp\SetACLx32.exeIDM Trial Reset.exe
User:
admin
Company:
Helge Klein
Integrity Level:
MEDIUM
Description:
SetACL 3
Exit code:
5
Version:
3.0.6.0
Modules
Images
c:\users\admin\appdata\local\temp\setaclx32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\activeds.dll
316"C:\Users\admin\AppData\Local\Temp\SetACLx32.exe" -on HKLM\Software\Classes\CLSID\{07999AC3-058B-40BF-984F-69EB1E554CA7} -ot reg -actn setowner -ownr "n:S-1-0-0" -silentC:\Users\admin\AppData\Local\Temp\SetACLx32.exeIDM Trial Reset.exe
User:
admin
Company:
Helge Klein
Integrity Level:
MEDIUM
Description:
SetACL 3
Exit code:
5
Version:
3.0.6.0
Modules
Images
c:\users\admin\appdata\local\temp\setaclx32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\activeds.dll
476"C:\Users\admin\AppData\Local\Temp\SetACLx32.exe" -on HKLM\Software\Classes\Wow6432Node\CLSID\{D5B91409-A8CA-4973-9A0B-59F713D25671} -ot reg -actn ace -ace "n:everyone;p:full" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silentC:\Users\admin\AppData\Local\Temp\SetACLx32.exeIDM Trial Reset.exe
User:
admin
Company:
Helge Klein
Integrity Level:
MEDIUM
Description:
SetACL 3
Exit code:
12
Version:
3.0.6.0
Modules
Images
c:\users\admin\appdata\local\temp\setaclx32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\activeds.dll
528"C:\Users\admin\AppData\Local\Temp\SetACLx32.exe" -on HKLM\Software\Classes\Wow6432Node\CLSID\{5ED60779-4DE2-4E07-B862-974CA4FF2E9C} -ot reg -actn setowner -ownr "n:S-1-0-0" -silentC:\Users\admin\AppData\Local\Temp\SetACLx32.exeIDM Trial Reset.exe
User:
admin
Company:
Helge Klein
Integrity Level:
MEDIUM
Description:
SetACL 3
Exit code:
5
Version:
3.0.6.0
Modules
Images
c:\users\admin\appdata\local\temp\setaclx32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\activeds.dll
556"C:\Users\admin\AppData\Local\Temp\SetACLx32.exe" -on HKCU\Software\Classes\CLSID\{6DDF00DB-1234-46EC-8356-27E7B2051192} -ot reg -actn ace -ace "n:everyone;p:full" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silentC:\Users\admin\AppData\Local\Temp\SetACLx32.exeIDM Trial Reset.exe
User:
admin
Company:
Helge Klein
Integrity Level:
MEDIUM
Description:
SetACL 3
Exit code:
12
Version:
3.0.6.0
Modules
Images
c:\users\admin\appdata\local\temp\setaclx32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\activeds.dll
556"C:\Users\admin\AppData\Local\Temp\SetACLx32.exe" -on HKCU\Software\Classes\CLSID\{7B8E9164-324D-4A2E-A46D-0165FB2000EC} -ot reg -actn setowner -ownr "n:S-1-0-0" -silentC:\Users\admin\AppData\Local\Temp\SetACLx32.exeIDM Trial Reset.exe
User:
admin
Company:
Helge Klein
Integrity Level:
MEDIUM
Description:
SetACL 3
Exit code:
5
Version:
3.0.6.0
Modules
Images
c:\users\admin\appdata\local\temp\setaclx32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\activeds.dll
600"C:\Windows\system32\cmd.exe" /c findstr /N . C:\Users\admin\AppData\Local\Temp\reg_query.tmp | findstr /b -1:C:\Windows\System32\cmd.exeIDM Trial Reset.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
2
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
600"C:\Users\admin\AppData\Local\Temp\SetACLx32.exe" -on HKLM\Software\Classes\Wow6432Node\CLSID\{6DDF00DB-1234-46EC-8356-27E7B2051192} -ot reg -actn ace -ace "n:everyone;p:read" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silentC:\Users\admin\AppData\Local\Temp\SetACLx32.exeIDM Trial Reset.exe
User:
admin
Company:
Helge Klein
Integrity Level:
MEDIUM
Description:
SetACL 3
Exit code:
12
Version:
3.0.6.0
Modules
Images
c:\users\admin\appdata\local\temp\setaclx32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\activeds.dll
604"C:\Windows\system32\cmd.exe" /c findstr /N . C:\Users\admin\AppData\Local\Temp\reg_query.tmp | findstr /b -1:C:\Windows\System32\cmd.exeIDM Trial Reset.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
2
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
62 972
Read events
62 952
Write events
18
Delete events
2

Modification events

(PID) Process:(280) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\17F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(280) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(280) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(280) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(280) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(280) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(280) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(280) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(280) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(280) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
Executable files
3
Suspicious files
5
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
2136cmd.exeC:\Users\admin\AppData\Local\Temp\reg_query.tmp
MD5:
SHA256:
2632IDM Trial Reset.exeC:\Users\admin\AppData\Local\Temp\idm_trial.regtext
MD5:237962E36948F3D0C9EC42EFA289AC52
SHA256:40AD93CF424EEE41A0877B11ACB92F7F12D58AB3AA6FA6D64D92CFBBE11695A2
2632IDM Trial Reset.exeC:\Users\admin\AppData\Local\Temp\idm_reg.regtext
MD5:3DEDFE7770A57CA2BCB76D01D1756EE6
SHA256:832134EB65B2A91BE5B6584B48AB69B4B7CE9B6228EA4738F6D1B7A8A0E1915E
2632IDM Trial Reset.exeC:\Users\admin\AppData\Local\Temp\autB3D.tmpbinary
MD5:2EBB8A2070729BC3CAE5B5E1CC27C963
SHA256:B951A1F1EC92F71EEF08E59988267CC19BF35286B90A2CBE50C4B1062C2FD0AC
2632IDM Trial Reset.exeC:\Users\admin\AppData\Local\Temp\autB7D.tmpbinary
MD5:715EC543E4A386475E2105954DAD0929
SHA256:C28E0CB287457A5B00BF34983D00256E263C00231B5CBB0F8BEF4233C47F7D55
280WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa280.32257\IDM Trial Reset.exeexecutable
MD5:064F82094AE6A6E22C28A6F1EF868A26
SHA256:A2D2B22CD0D5628976EB5996A8B20F3B5AC468907910DBC3F826F1069D435587
2632IDM Trial Reset.exeC:\Users\admin\AppData\Local\Temp\autB2A.tmpbinary
MD5:D71743C02DF05822F49FF9E232DE76F0
SHA256:62AAECFD2ECA11B635DDC0AC246F9EFC991A56CAE43E009EABA9367BB287AD89
2632IDM Trial Reset.exeC:\Users\admin\AppData\Local\Temp\autB2C.tmpbinary
MD5:90585D687B4426794D2DED4DD0E5FBE2
SHA256:84DE96E94FEAFB174FD2BF79007F27BC8B43C462FB7B4A1C5137D8BA0EEB8840
2632IDM Trial Reset.exeC:\Users\admin\AppData\Local\Temp\idm_reset.regtext
MD5:17EBF21FCCAC9756EAB46EB64BA6C029
SHA256:290A3F67BBBDBD5C1101E90921475C2B95E97DC69A3141412FBAC79FCADD3EE8
2632IDM Trial Reset.exeC:\Users\admin\AppData\Local\Temp\SetACLx64.exeexecutable
MD5:3E350EB5DF15C06DEC400A39DD1C6F29
SHA256:427FF43693CB3CA2812C4754F607F107A6B2D3F5A8B313ADDEE57D89982DF419
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
4
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2588
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown

DNS requests

No data

Threats

No threats detected
No debug info