File name:

IDM.Trial.Reset.v1.0.0.zip

Full analysis: https://app.any.run/tasks/cf4ab0ca-aafd-473d-949b-1fc2a61762ec
Verdict: Malicious activity
Analysis date: May 18, 2024, 14:45:02
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

016866100C1BEFF73C59F5E02323BE46

SHA1:

60AA90998FDE73E03FFBE42BF899793B32E2EE65

SHA256:

372DC10FBE87C1744D2852877E0D36D37E034B5507F868DE61C8BA6A46D0E012

SSDEEP:

12288:F3EHTdr/G+70+d5oVe+TghBAcRlbqm9Ks3wjNind3y4/VA/Sznml3gUdfFUWgsD5:BN+g6oVe+TgrVWAAjadF/XAVha2D7l

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Antivirus name has been found in the command line (generic signature)

      • IDM Trial Reset.exe (PID: 4024)
      • IDM Trial Reset.exe (PID: 4084)
    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 3984)
      • IDM Trial Reset.exe (PID: 4024)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 3984)
    • Executable content was dropped or overwritten

      • IDM Trial Reset.exe (PID: 4024)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 4032)
      • IDM Trial Reset.exe (PID: 4024)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 1020)
      • cmd.exe (PID: 124)
    • Starts CMD.EXE for commands execution

      • IDM Trial Reset.exe (PID: 4024)
  • INFO

    • Reads mouse settings

      • IDM Trial Reset.exe (PID: 4024)
      • IDM Trial Reset.exe (PID: 4084)
    • Checks supported languages

      • IDM Trial Reset.exe (PID: 4024)
      • SetACLx32.exe (PID: 1432)
      • SetACLx32.exe (PID: 2312)
      • SetACLx32.exe (PID: 1488)
      • SetACLx32.exe (PID: 312)
      • SetACLx32.exe (PID: 1660)
      • SetACLx32.exe (PID: 1704)
      • SetACLx32.exe (PID: 1944)
      • SetACLx32.exe (PID: 1824)
      • SetACLx32.exe (PID: 2240)
      • SetACLx32.exe (PID: 2264)
      • SetACLx32.exe (PID: 568)
      • SetACLx32.exe (PID: 1940)
      • SetACLx32.exe (PID: 2516)
      • SetACLx32.exe (PID: 2600)
      • SetACLx32.exe (PID: 1244)
      • SetACLx32.exe (PID: 2640)
      • SetACLx32.exe (PID: 960)
      • SetACLx32.exe (PID: 2548)
      • SetACLx32.exe (PID: 2468)
      • SetACLx32.exe (PID: 2416)
      • SetACLx32.exe (PID: 2420)
      • SetACLx32.exe (PID: 948)
      • SetACLx32.exe (PID: 600)
      • SetACLx32.exe (PID: 2684)
      • SetACLx32.exe (PID: 2716)
      • SetACLx32.exe (PID: 2780)
      • SetACLx32.exe (PID: 2876)
      • IDM Trial Reset.exe (PID: 4084)
      • SetACLx32.exe (PID: 2792)
      • SetACLx32.exe (PID: 2988)
      • SetACLx32.exe (PID: 2880)
      • SetACLx32.exe (PID: 2968)
      • SetACLx32.exe (PID: 3068)
      • SetACLx32.exe (PID: 2976)
      • SetACLx32.exe (PID: 2980)
      • SetACLx32.exe (PID: 2720)
      • SetACLx32.exe (PID: 3268)
      • SetACLx32.exe (PID: 3060)
      • SetACLx32.exe (PID: 3456)
      • SetACLx32.exe (PID: 2896)
      • SetACLx32.exe (PID: 3828)
      • SetACLx32.exe (PID: 3536)
      • SetACLx32.exe (PID: 4084)
      • SetACLx32.exe (PID: 3808)
      • SetACLx32.exe (PID: 4040)
      • SetACLx32.exe (PID: 864)
      • SetACLx32.exe (PID: 1872)
      • SetACLx32.exe (PID: 2180)
      • SetACLx32.exe (PID: 1764)
      • SetACLx32.exe (PID: 728)
      • SetACLx32.exe (PID: 1856)
      • SetACLx32.exe (PID: 1616)
      • SetACLx32.exe (PID: 1988)
      • SetACLx32.exe (PID: 2092)
      • SetACLx32.exe (PID: 580)
      • SetACLx32.exe (PID: 2284)
      • SetACLx32.exe (PID: 2252)
      • SetACLx32.exe (PID: 2172)
      • SetACLx32.exe (PID: 1600)
      • SetACLx32.exe (PID: 2528)
      • SetACLx32.exe (PID: 2464)
      • SetACLx32.exe (PID: 1380)
      • SetACLx32.exe (PID: 2684)
      • SetACLx32.exe (PID: 1520)
      • SetACLx32.exe (PID: 1848)
      • SetACLx32.exe (PID: 2560)
      • SetACLx32.exe (PID: 2660)
      • SetACLx32.exe (PID: 2452)
      • SetACLx32.exe (PID: 2300)
      • SetACLx32.exe (PID: 924)
      • SetACLx32.exe (PID: 2872)
      • SetACLx32.exe (PID: 1832)
      • SetACLx32.exe (PID: 2804)
      • SetACLx32.exe (PID: 2824)
      • SetACLx32.exe (PID: 2852)
      • SetACLx32.exe (PID: 2396)
      • SetACLx32.exe (PID: 2812)
      • SetACLx32.exe (PID: 3040)
      • SetACLx32.exe (PID: 2800)
      • SetACLx32.exe (PID: 2772)
      • SetACLx32.exe (PID: 3080)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3984)
    • Create files in a temporary directory

      • IDM Trial Reset.exe (PID: 4024)
      • IDM Trial Reset.exe (PID: 4084)
    • Reads the computer name

      • SetACLx32.exe (PID: 1432)
      • SetACLx32.exe (PID: 2312)
      • SetACLx32.exe (PID: 312)
      • SetACLx32.exe (PID: 1488)
      • SetACLx32.exe (PID: 1660)
      • SetACLx32.exe (PID: 1704)
      • SetACLx32.exe (PID: 1944)
      • SetACLx32.exe (PID: 2516)
      • SetACLx32.exe (PID: 2600)
      • SetACLx32.exe (PID: 1824)
      • SetACLx32.exe (PID: 2240)
      • SetACLx32.exe (PID: 2264)
      • SetACLx32.exe (PID: 568)
      • SetACLx32.exe (PID: 1940)
      • SetACLx32.exe (PID: 1244)
      • SetACLx32.exe (PID: 960)
      • SetACLx32.exe (PID: 2468)
      • SetACLx32.exe (PID: 2640)
      • SetACLx32.exe (PID: 2548)
      • SetACLx32.exe (PID: 2684)
      • SetACLx32.exe (PID: 948)
      • SetACLx32.exe (PID: 2416)
      • SetACLx32.exe (PID: 600)
      • SetACLx32.exe (PID: 2716)
      • SetACLx32.exe (PID: 2420)
      • SetACLx32.exe (PID: 2876)
      • SetACLx32.exe (PID: 2792)
      • SetACLx32.exe (PID: 2880)
      • SetACLx32.exe (PID: 2968)
      • SetACLx32.exe (PID: 2780)
      • SetACLx32.exe (PID: 2980)
      • SetACLx32.exe (PID: 2720)
      • SetACLx32.exe (PID: 3068)
      • SetACLx32.exe (PID: 3060)
      • SetACLx32.exe (PID: 3268)
      • SetACLx32.exe (PID: 3456)
      • SetACLx32.exe (PID: 2988)
      • SetACLx32.exe (PID: 2896)
      • SetACLx32.exe (PID: 2976)
      • SetACLx32.exe (PID: 3808)
      • SetACLx32.exe (PID: 3536)
      • SetACLx32.exe (PID: 3828)
      • SetACLx32.exe (PID: 4040)
      • SetACLx32.exe (PID: 4084)
      • SetACLx32.exe (PID: 864)
      • SetACLx32.exe (PID: 1872)
      • SetACLx32.exe (PID: 2180)
      • SetACLx32.exe (PID: 1764)
      • SetACLx32.exe (PID: 728)
      • SetACLx32.exe (PID: 1856)
      • SetACLx32.exe (PID: 1616)
      • SetACLx32.exe (PID: 1988)
      • SetACLx32.exe (PID: 2092)
      • SetACLx32.exe (PID: 2284)
      • SetACLx32.exe (PID: 2172)
      • SetACLx32.exe (PID: 1600)
      • SetACLx32.exe (PID: 2528)
      • SetACLx32.exe (PID: 2464)
      • SetACLx32.exe (PID: 580)
      • SetACLx32.exe (PID: 2252)
      • SetACLx32.exe (PID: 2300)
      • SetACLx32.exe (PID: 1380)
      • SetACLx32.exe (PID: 2560)
      • SetACLx32.exe (PID: 2660)
      • SetACLx32.exe (PID: 2684)
      • SetACLx32.exe (PID: 2452)
      • SetACLx32.exe (PID: 1520)
      • SetACLx32.exe (PID: 1848)
      • SetACLx32.exe (PID: 1832)
      • SetACLx32.exe (PID: 2872)
      • SetACLx32.exe (PID: 2852)
      • SetACLx32.exe (PID: 2824)
      • SetACLx32.exe (PID: 2396)
      • SetACLx32.exe (PID: 2812)
      • SetACLx32.exe (PID: 924)
      • SetACLx32.exe (PID: 2804)
      • SetACLx32.exe (PID: 3080)
      • SetACLx32.exe (PID: 3040)
      • SetACLx32.exe (PID: 2800)
      • SetACLx32.exe (PID: 2772)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2016:09:06 05:20:26
ZipCRC: 0xd3e76a9d
ZipCompressedSize: 881964
ZipUncompressedSize: 895488
ZipFileName: IDM Trial Reset.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
214
Monitored processes
95
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe idm trial reset.exe cmd.exe no specs reg.exe no specs idm trial reset.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs findstr.exe no specs findstr.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs setaclx32.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
116findstr /b -1:C:\Windows\System32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
2
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\imm32.dll
124"C:\Windows\system32\cmd.exe" /c findstr /N . C:\Users\admin\AppData\Local\Temp\reg_query.tmp | findstr /b -1:C:\Windows\System32\cmd.exeIDM Trial Reset.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
2
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
312"C:\Users\admin\AppData\Local\Temp\SetACLx32.exe" -on HKLM\Software\Classes\CLSID\{6DDF00DB-1234-46EC-8356-27E7B2051192} -ot reg -actn setowner -ownr "n:S-1-1-0" -silentC:\Users\admin\AppData\Local\Temp\SetACLx32.exeIDM Trial Reset.exe
User:
admin
Company:
Helge Klein
Integrity Level:
MEDIUM
Description:
SetACL 3
Exit code:
5
Version:
3.0.6.0
Modules
Images
c:\users\admin\appdata\local\temp\setaclx32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\activeds.dll
568"C:\Users\admin\AppData\Local\Temp\SetACLx32.exe" -on HKLM\Software\Classes\CLSID\{D5B91409-A8CA-4973-9A0B-59F713D25671} -ot reg -actn setowner -ownr "n:S-1-1-0" -silentC:\Users\admin\AppData\Local\Temp\SetACLx32.exeIDM Trial Reset.exe
User:
admin
Company:
Helge Klein
Integrity Level:
MEDIUM
Description:
SetACL 3
Exit code:
5
Version:
3.0.6.0
Modules
Images
c:\users\admin\appdata\local\temp\setaclx32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\activeds.dll
580"C:\Users\admin\AppData\Local\Temp\SetACLx32.exe" -on HKCU\Software\Classes\Wow6432Node\CLSID\{5ED60779-4DE2-4E07-B862-974CA4FF2E9C} -ot reg -actn ace -ace "n:everyone;p:read" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silentC:\Users\admin\AppData\Local\Temp\SetACLx32.exeIDM Trial Reset.exe
User:
admin
Company:
Helge Klein
Integrity Level:
MEDIUM
Description:
SetACL 3
Exit code:
12
Version:
3.0.6.0
Modules
Images
c:\users\admin\appdata\local\temp\setaclx32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\activeds.dll
600"C:\Users\admin\AppData\Local\Temp\SetACLx32.exe" -on HKLM\Software\Classes\Wow6432Node\CLSID\{07999AC3-058B-40BF-984F-69EB1E554CA7} -ot reg -actn setowner -ownr "n:S-1-1-0" -silentC:\Users\admin\AppData\Local\Temp\SetACLx32.exeIDM Trial Reset.exe
User:
admin
Company:
Helge Klein
Integrity Level:
MEDIUM
Description:
SetACL 3
Exit code:
5
Version:
3.0.6.0
Modules
Images
c:\users\admin\appdata\local\temp\setaclx32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\activeds.dll
728"C:\Users\admin\AppData\Local\Temp\SetACLx32.exe" -on HKCU\Software\Classes\CLSID\{D5B91409-A8CA-4973-9A0B-59F713D25671} -ot reg -actn ace -ace "n:everyone;p:read" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silentC:\Users\admin\AppData\Local\Temp\SetACLx32.exeIDM Trial Reset.exe
User:
admin
Company:
Helge Klein
Integrity Level:
MEDIUM
Description:
SetACL 3
Exit code:
12
Version:
3.0.6.0
Modules
Images
c:\users\admin\appdata\local\temp\setaclx32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\activeds.dll
864"C:\Users\admin\AppData\Local\Temp\SetACLx32.exe" -on HKCU\Software\Classes\CLSID\{7B8E9164-324D-4A2E-A46D-0165FB2000EC} -ot reg -actn ace -ace "n:everyone;p:read" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silentC:\Users\admin\AppData\Local\Temp\SetACLx32.exeIDM Trial Reset.exe
User:
admin
Company:
Helge Klein
Integrity Level:
MEDIUM
Description:
SetACL 3
Exit code:
12
Version:
3.0.6.0
Modules
Images
c:\users\admin\appdata\local\temp\setaclx32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\activeds.dll
924"C:\Users\admin\AppData\Local\Temp\SetACLx32.exe" -on HKLM\Software\Classes\CLSID\{D5B91409-A8CA-4973-9A0B-59F713D25671} -ot reg -actn setowner -ownr "n:S-1-0-0" -silentC:\Users\admin\AppData\Local\Temp\SetACLx32.exeIDM Trial Reset.exe
User:
admin
Company:
Helge Klein
Integrity Level:
MEDIUM
Description:
SetACL 3
Exit code:
5
Version:
3.0.6.0
Modules
Images
c:\users\admin\appdata\local\temp\setaclx32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\activeds.dll
948"C:\Users\admin\AppData\Local\Temp\SetACLx32.exe" -on HKCU\Software\Classes\CLSID\{7B8E9164-324D-4A2E-A46D-0165FB2000EC} -ot reg -actn ace -ace "n:everyone;p:full" -actn setprot -op "dacl:p_nc;sacl:p_nc" -silentC:\Users\admin\AppData\Local\Temp\SetACLx32.exeIDM Trial Reset.exe
User:
admin
Company:
Helge Klein
Integrity Level:
MEDIUM
Description:
SetACL 3
Exit code:
12
Version:
3.0.6.0
Modules
Images
c:\users\admin\appdata\local\temp\setaclx32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\activeds.dll
Total events
37 108
Read events
37 073
Write events
29
Delete events
6

Modification events

(PID) Process:(3984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3984) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(3984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(3984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip
(PID) Process:(3984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\IDM.Trial.Reset.v1.0.0.zip
(PID) Process:(3984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
Executable files
4
Suspicious files
10
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
4032cmd.exeC:\Users\admin\AppData\Local\Temp\reg_query.tmp
MD5:
SHA256:
3984WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa3984.32361\IDM Trial Reset.exeexecutable
MD5:064F82094AE6A6E22C28A6F1EF868A26
SHA256:A2D2B22CD0D5628976EB5996A8B20F3B5AC468907910DBC3F826F1069D435587
4024IDM Trial Reset.exeC:\Users\admin\AppData\Local\Temp\aut42EA.tmpbinary
MD5:2EBB8A2070729BC3CAE5B5E1CC27C963
SHA256:B951A1F1EC92F71EEF08E59988267CC19BF35286B90A2CBE50C4B1062C2FD0AC
4024IDM Trial Reset.exeC:\Users\admin\AppData\Local\Temp\idm_reset.regtext
MD5:17EBF21FCCAC9756EAB46EB64BA6C029
SHA256:290A3F67BBBDBD5C1101E90921475C2B95E97DC69A3141412FBAC79FCADD3EE8
4024IDM Trial Reset.exeC:\Users\admin\AppData\Local\Temp\aut42D8.tmpbinary
MD5:E68C65421712C99C0FA515EB087B412B
SHA256:2CE685037E366A0FD2FF1827C20F1866BCBE23D646DFCE30A459B8FF3C1B4F2E
4024IDM Trial Reset.exeC:\Users\admin\AppData\Local\Temp\idm_reg.regtext
MD5:3DEDFE7770A57CA2BCB76D01D1756EE6
SHA256:832134EB65B2A91BE5B6584B48AB69B4B7CE9B6228EA4738F6D1B7A8A0E1915E
4024IDM Trial Reset.exeC:\Users\admin\AppData\Local\Temp\aut42D7.tmpbinary
MD5:D71743C02DF05822F49FF9E232DE76F0
SHA256:62AAECFD2ECA11B635DDC0AC246F9EFC991A56CAE43E009EABA9367BB287AD89
4024IDM Trial Reset.exeC:\Users\admin\AppData\Local\Temp\idm_trial.regtext
MD5:237962E36948F3D0C9EC42EFA289AC52
SHA256:40AD93CF424EEE41A0877B11ACB92F7F12D58AB3AA6FA6D64D92CFBBE11695A2
4024IDM Trial Reset.exeC:\Users\admin\AppData\Local\Temp\aut431A.tmpbinary
MD5:715EC543E4A386475E2105954DAD0929
SHA256:C28E0CB287457A5B00BF34983D00256E263C00231B5CBB0F8BEF4233C47F7D55
4024IDM Trial Reset.exeC:\Users\admin\AppData\Local\Temp\SetACLx64.exeexecutable
MD5:3E350EB5DF15C06DEC400A39DD1C6F29
SHA256:427FF43693CB3CA2812C4754F607F107A6B2D3F5A8B313ADDEE57D89982DF419
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
4
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
1088
svchost.exe
224.0.0.252:5355
unknown

DNS requests

No data

Threats

No threats detected
No debug info