PLATFORM:

Windows

 OVERALL RISK RATING:
 REPORTED INFECTION:
 SYSTEM IMPACT RATING:
 INFORMATION EXPOSURE:

  • Threat Type: Hacking Tool

  • Destructiveness: No

  • Encrypted:

  • In the wild: Yes

  OVERVIEW

This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

  TECHNICAL DETAILS

File Size: 4,137,016 bytes
File Type: EXE
Memory Resident: Yes
Initial Samples Received Date: 22 Jan 2020

Arrival Details

This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Installation

This Hacking Tool creates the following folders:

  • %User Profile%\Downloads\Compressed
  • %All Users Profile%\IDM
  • %User Profile%\Downloads\Documents
  • %User Profile%\Downloads\Programs
  • %User Profile%\Downloads\Music
  • %User Profile%\Downloads\Video
  • %Application Data%\DMCache
  • %Application Data%\IDM

(Note: %User Profile% is the current user's profile folder, which is usually C:\Documents and Settings\{user name} on Windows 2000(32-bit), XP, and Server 2003(32-bit), or C:\Users\{user name} on Windows Vista, 7, 8, 8.1, 2008(64-bit), 2012(64-bit) and 10(64-bit).. %All Users Profile% is the common user's profile folder, which is usually C:\Documents and Settings\All Users on Windows 2000(32-bit), XP, and Server 2003(32-bit), or C:\ProgramData on Windows Vista, 7, 8, 8.1, 2008(64-bit), 2012(64-bit) and 10(64-bit). . %Application Data% is the current user's Application Data folder, which is usually C:\Documents and Settings\{user name}\Application Data on Windows 2000(32-bit), XP, and Server 2003(32-bit), or C:\Users\{user name}\AppData\Roaming on Windows Vista, 7, 8, 8.1, 2008(64-bit), 2012(64-bit) and 10(64-bit).)

Autostart Technique

This Hacking Tool registers itself as a BHO to ensure its automatic execution every time Internet Explorer is used by adding the following registry keys:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Explorer\
Browser Helper Objects\{0055C089-8582-441B-A0BF-17B458C2A3A8}

Other System Modifications

This Hacking Tool adds the following registry entries:

HKEY_CURRENT_USER\Software\DownloadManager\
IDMBI\IEXPLORE
name = "Internet Explorer"

HKEY_CURRENT_USER\Software\DownloadManager\
IDMBI\IEXPLORE
int = "1"

HKEY_CURRENT_USER\Software\DownloadManager\
IDMBI\Firefox
name = "Mozilla Firefox"

HKEY_CURRENT_USER\Software\DownloadManager\
IDMBI\Firefox
int = "1"

HKEY_CURRENT_USER\Software\DownloadManager\
IDMBI\chrome
name = "Google Chrome"

HKEY_CURRENT_USER\Software\DownloadManager\
IDMBI\chrome
int = "1"

HKEY_CURRENT_USER\Software\DownloadManager\
IDMBI\OPERA
name = "Opera"

HKEY_CURRENT_USER\Software\DownloadManager\
IDMBI\OPERA
int = "1"

HKEY_CURRENT_USER\Software\DownloadManager\
IDMBI\Safari
name = "Apple Safari"

HKEY_CURRENT_USER\Software\DownloadManager\
IDMBI\Safari
int = "1"

HKEY_CURRENT_USER\Software\DownloadManager\
SpecialKeys
UseKeyToPrevent = "1"

HKEY_CURRENT_USER\Software\DownloadManager\
SpecialKeys
UseKeyToForce = "0"

HKEY_CURRENT_USER\Software\DownloadManager\
SpecialKeys
AltP = "1"

HKEY_CURRENT_USER\Software\DownloadManager\
SpecialKeys
ShiftP = "0"

HKEY_CURRENT_USER\Software\DownloadManager\
SpecialKeys
CtrlP = "0"

HKEY_CURRENT_USER\Software\DownloadManager\
SpecialKeys
DelP = "0"

HKEY_CURRENT_USER\Software\DownloadManager\
SpecialKeys
AltF = "0"

HKEY_CURRENT_USER\Software\DownloadManager\
SpecialKeys
CtrlF = "0"

HKEY_CURRENT_USER\Software\DownloadManager\
SpecialKeys
ShiftF = "0"

HKEY_CURRENT_USER\Software\DownloadManager\
SpecialKeys
InsF = "1"

HKEY_CURRENT_USER\Software\DownloadManager\
SpecialKeys
CheckMouse = "0"

HKEY_CURRENT_USER\Software\DownloadManager\
SpecialKeys
SkipHtml = "1"

HKEY_CURRENT_USER\Software\DownloadManager
AppDataIDMFolder = "%Application Data%\IDM"

HKEY_CURRENT_USER\Software\DownloadManager
CommonAppDataIDMFolder = "%All Users Profile%\IDM"

HKEY_CURRENT_USER\Software\DownloadManager\
menuExt
ffdownl1_str = "Download with IDM"

HKEY_CURRENT_USER\Software\DownloadManager\
menuExt
ffdownlAll_str = "Download all links with IDM"

HKEY_CURRENT_USER\Software\DownloadManager\
menuExt
ffdownlFLV_str = "Download last requested FLV video"

HKEY_CURRENT_USER\Software\DownloadManager\
menuExt
ffdownl10FLV_str = "Choose from 10 last requested FLV videos"

HKEY_CURRENT_USER\Software\DownloadManager\
menuExt
ffdownlppFLV_str = "Download FLV video with IDM"

HKEY_CURRENT_USER\Software\DownloadManager\
menuExt
ffdownlFLVa_str = "Download last requested FLV video with IDM"

HKEY_CURRENT_USER\Software\DownloadManager\
menuExt
ffdownl10FLVa_str = "Download FLV videos with IDM from 10 last requested"

HKEY_CURRENT_USER\Software\DownloadManager
ExceptionServers = "{random characters}"

HKEY_CURRENT_USER\Software\DownloadManager\
FoldersTree\Compressed
ID = "7"

HKEY_CURRENT_USER\Software\DownloadManager\
FoldersTree\Compressed
mask = "zip rar r0* r1* arj gz sit sitx sea ace bz2 7z"

HKEY_CURRENT_USER\Software\DownloadManager\
FoldersTree\Compressed
pathW = ""

HKEY_CURRENT_USER\Software\DownloadManager\
FoldersTree\Compressed
rememberLastPath = "0"

HKEY_CURRENT_USER\Software\DownloadManager\
FoldersTree\Compressed
forSiteOnly = "0"

HKEY_CURRENT_USER\Software\DownloadManager\
FoldersTree\Compressed
sites = ""

HKEY_CURRENT_USER\Software\DownloadManager\
FoldersTree\Documents
ID = "5"

HKEY_CURRENT_USER\Software\DownloadManager\
FoldersTree\Documents
mask = "doc pdf ppt pps docx pptx"

HKEY_CURRENT_USER\Software\DownloadManager\
FoldersTree\Documents
pathW = ""

HKEY_CURRENT_USER\Software\DownloadManager\
FoldersTree\Documents
rememberLastPath = "0"

HKEY_CURRENT_USER\Software\DownloadManager\
FoldersTree\Documents
forSiteOnly = "0"

HKEY_CURRENT_USER\Software\DownloadManager\
FoldersTree\Documents
sites = ""

HKEY_CURRENT_USER\Software\DownloadManager\
FoldersTree\Music
ID = "2"

HKEY_CURRENT_USER\Software\DownloadManager\
FoldersTree\Music
mask = "mp3 wav wma mpa ram ra aac aif m4a"

HKEY_CURRENT_USER\Software\DownloadManager\
FoldersTree\Music
pathW = ""

HKEY_CURRENT_USER\Software\DownloadManager\
FoldersTree\Music
rememberLastPath = "0"

HKEY_CURRENT_USER\Software\DownloadManager\
FoldersTree\Music
forSiteOnly = "0"

HKEY_CURRENT_USER\Software\DownloadManager\
FoldersTree\Music
sites = ""

HKEY_CURRENT_USER\Software\DownloadManager\
FoldersTree\Programs
ID = "1"

HKEY_CURRENT_USER\Software\DownloadManager\
FoldersTree\Programs
mask = "exe msi"

HKEY_CURRENT_USER\Software\DownloadManager\
FoldersTree\Programs
pathW = ""

HKEY_CURRENT_USER\Software\DownloadManager\
FoldersTree\Programs
rememberLastPath = "0"

HKEY_CURRENT_USER\Software\DownloadManager\
FoldersTree\Programs
forSiteOnly = "0"

HKEY_CURRENT_USER\Software\DownloadManager\
FoldersTree\Programs
sites = ""

HKEY_CURRENT_USER\Software\DownloadManager\
FoldersTree\Video
ID = "3"

HKEY_CURRENT_USER\Software\DownloadManager\
FoldersTree\Video
mask = "avi mpg mpe mpeg asf wmv mov qt rm mp4 flv m4v webm ogv ogg mkv ts"

HKEY_CURRENT_USER\Software\DownloadManager\
FoldersTree\Video
pathW = ""

HKEY_CURRENT_USER\Software\DownloadManager\
FoldersTree\Video
rememberLastPath = "0"

HKEY_CURRENT_USER\Software\DownloadManager\
FoldersTree\Video
forSiteOnly = "0"

HKEY_CURRENT_USER\Software\DownloadManager\
FoldersTree\Video
sites = ""

HKEY_LOCAL_MACHINE\SOFTWARE\Classes\
IDMan.CIDMLinkTransmitter\CLSID
(Default) = "{AC746233-E9D3-49CD-862F-068F7B7CCCA4}"

HKEY_LOCAL_MACHINE\SOFTWARE\Classes\
Wow6432Node\CLSID\{AC746233-E9D3-49CD-862F-068F7B7CCCA4}
(Default) = "IDMan.CIDMLinkTransmitter"

HKEY_LOCAL_MACHINE\SOFTWARE\Classes\
Wow6432Node\CLSID\{AC746233-E9D3-49CD-862F-068F7B7CCCA4}
AppID = "{AC746233-E9D3-49CD-862F-068F7B7CCCA4}"

HKEY_LOCAL_MACHINE\SOFTWARE\Classes\
Wow6432Node\CLSID\{AC746233-E9D3-49CD-862F-068F7B7CCCA4}\
LocalServer32
(Default) = "{malware file path and name}"

HKEY_LOCAL_MACHINE\SOFTWARE\Classes\
AppID\{AC746233-E9D3-49CD-862F-068F7B7CCCA4}
(Default) = "IDMan"

HKEY_LOCAL_MACHINE\SOFTWARE\Classes\
AppID\{AC746233-E9D3-49CD-862F-068F7B7CCCA4}
RunAs = "Interactive User"

HKEY_LOCAL_MACHINE\SOFTWARE\Classes\
AppID\{AC746233-E9D3-49CD-862F-068F7B7CCCA4}
ROTFlags = "1"

HKEY_CURRENT_USER\Software\DownloadManager\
menuExt
iedownl1_str = "Download with IDM"

HKEY_CURRENT_USER\Software\DownloadManager\
menuExt
iedownlAll_str = "Download all links with IDM"

HKEY_CURRENT_USER\Software\Microsoft\
Internet Explorer
DownloadUI = "{7D11E719-FF90-479C-B0D7-96EB43EE55D7}"

HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\
Microsoft\Internet Explorer
DownloadUI = "{7D11E719-FF90-479C-B0D7-96EB43EE55D7}"

HKEY_CURRENT_USER\Software\Microsoft\
Edge\Extensions\ngpampappnmepgilojfohadhhmbhlaek
path = "%User Temp%\IDMGCExt.crx"

HKEY_CURRENT_USER\Software\Microsoft\
Edge\Extensions\ngpampappnmepgilojfohadhhmbhlaek
version = "6.35.18"

HKEY_CURRENT_USER\Software\Microsoft\
Edge\NativeMessagingHosts\com.tonec.idm
(Default) = "%User Temp%\IDMMsgHost.json"

HKEY_CURRENT_USER\Software\CocCoc\
Browser\Extensions\ngpampappnmepgilojfohadhhmbhlaek
path = "%User Temp%\IDMGCExt.crx"

HKEY_CURRENT_USER\Software\CocCoc\
Browser\Extensions\ngpampappnmepgilojfohadhhmbhlaek
version = "6.35.18"

HKEY_CURRENT_USER\Software\CocCoc\
Browser\NativeMessagingHosts\com.tonec.idm
(Default) = "%User Temp%\IDMMsgHost.json"

HKEY_CURRENT_USER\Software\DownloadManager
EnableDriver = "1"

HKEY_CURRENT_USER\Software\DownloadManager
FSPSSettingsChecked = "1"

HKEY_CURRENT_USER\Software\DownloadManager
FSSettingsChecked = "1"

HKEY_CURRENT_USER\Software\DownloadManager
mzcc_ext_vers = "73120"

HKEY_CURRENT_USER\Software\DownloadManager
intAOFRWE = "1"

HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\
Microsoft\Windows\CurrentVersion\
explorer\Browser Helper Objects\{0055C089-8582-441B-A0BF-17B458C2A3A8}
(Default) = "IDM Helper"

HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\
Microsoft\Windows\CurrentVersion\
explorer\Browser Helper Objects\{0055C089-8582-441B-A0BF-17B458C2A3A8}
NoExplorer = "1"

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Explorer\
Browser Helper Objects\{0055C089-8582-441B-A0BF-17B458C2A3A8}
(Default) = "IDM Helper"

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Explorer\
Browser Helper Objects\{0055C089-8582-441B-A0BF-17B458C2A3A8}
NoExplorer = "1"

HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\
Google\Chrome\NativeMessagingHosts\
com.tonec.idm
(Default) = "%User Temp%\IDMMsgHost.json"

HKEY_LOCAL_MACHINE\SOFTWARE\Google\
Chrome\NativeMessagingHosts\com.tonec.idm
(Default) = "%User Temp%\IDMMsgHost.json"

HKEY_LOCAL_MACHINE\SOFTWARE\Google\
Chrome\Extensions\ngpampappnmepgilojfohadhhmbhlaek
path = "%User Temp%\IDMGCExt.crx"

HKEY_LOCAL_MACHINE\SOFTWARE\Google\
Chrome\Extensions\ngpampappnmepgilojfohadhhmbhlaek
version = "6.35.18"

HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\
Google\Chrome\Extensions\
ngpampappnmepgilojfohadhhmbhlaek
path = "%User Temp%\IDMGCExt.crx"

HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\
Google\Chrome\Extensions\
ngpampappnmepgilojfohadhhmbhlaek
version = "6.35.18"

Dropping Routine

This Hacking Tool drops the following files:

  • %Application Data%\IDM\idmfc.dat

(Note: %Application Data% is the current user's Application Data folder, which is usually C:\Documents and Settings\{user name}\Application Data on Windows 2000(32-bit), XP, and Server 2003(32-bit), or C:\Users\{user name}\AppData\Roaming on Windows Vista, 7, 8, 8.1, 2008(64-bit), 2012(64-bit) and 10(64-bit).)

This report is generated via an automated analysis system.

  SOLUTION

Minimum Scan Engine: 9.850

Step 1

Before doing any scans, Windows 7, Windows 8, Windows 8.1, and Windows 10 users must disable System Restore to allow full scanning of their computers.

Step 2

Close all opened browser windows

Step 3

Delete this registry value

[ Learn More ]

Important: Editing the Windows Registry incorrectly can lead to irreversible system malfunction. Please do this step only if you know how or you can ask assistance from your system administrator. Else, check this Microsoft article first before modifying your computer's registry.

  • In HKEY_CURRENT_USER\Software\DownloadManager\IDMBI\IEXPLORE
    • name = "Internet Explorer"
  • In HKEY_CURRENT_USER\Software\DownloadManager\IDMBI\IEXPLORE
    • int = "1"
  • In HKEY_CURRENT_USER\Software\DownloadManager\IDMBI\Firefox
    • name = "Mozilla Firefox"
  • In HKEY_CURRENT_USER\Software\DownloadManager\IDMBI\Firefox
    • int = "1"
  • In HKEY_CURRENT_USER\Software\DownloadManager\IDMBI\chrome
    • name = "Google Chrome"
  • In HKEY_CURRENT_USER\Software\DownloadManager\IDMBI\chrome
    • int = "1"
  • In HKEY_CURRENT_USER\Software\DownloadManager\IDMBI\OPERA
    • name = "Opera"
  • In HKEY_CURRENT_USER\Software\DownloadManager\IDMBI\OPERA
    • int = "1"
  • In HKEY_CURRENT_USER\Software\DownloadManager\IDMBI\Safari
    • name = "Apple Safari"
  • In HKEY_CURRENT_USER\Software\DownloadManager\IDMBI\Safari
    • int = "1"
  • In HKEY_CURRENT_USER\Software\DownloadManager\SpecialKeys
    • UseKeyToPrevent = "1"
  • In HKEY_CURRENT_USER\Software\DownloadManager\SpecialKeys
    • UseKeyToForce = "0"
  • In HKEY_CURRENT_USER\Software\DownloadManager\SpecialKeys
    • AltP = "1"
  • In HKEY_CURRENT_USER\Software\DownloadManager\SpecialKeys
    • ShiftP = "0"
  • In HKEY_CURRENT_USER\Software\DownloadManager\SpecialKeys
    • CtrlP = "0"
  • In HKEY_CURRENT_USER\Software\DownloadManager\SpecialKeys
    • DelP = "0"
  • In HKEY_CURRENT_USER\Software\DownloadManager\SpecialKeys
    • AltF = "0"
  • In HKEY_CURRENT_USER\Software\DownloadManager\SpecialKeys
    • CtrlF = "0"
  • In HKEY_CURRENT_USER\Software\DownloadManager\SpecialKeys
    • ShiftF = "0"
  • In HKEY_CURRENT_USER\Software\DownloadManager\SpecialKeys
    • InsF = "1"
  • In HKEY_CURRENT_USER\Software\DownloadManager\SpecialKeys
    • CheckMouse = "0"
  • In HKEY_CURRENT_USER\Software\DownloadManager\SpecialKeys
    • SkipHtml = "1"
  • In HKEY_CURRENT_USER\Software\DownloadManager
    • AppDataIDMFolder = "%Application Data%\IDM"
  • In HKEY_CURRENT_USER\Software\DownloadManager
    • CommonAppDataIDMFolder = "%All Users Profile%\IDM"
  • In HKEY_CURRENT_USER\Software\DownloadManager\menuExt
    • ffdownl1_str = "Download with IDM"
  • In HKEY_CURRENT_USER\Software\DownloadManager\menuExt
    • ffdownlAll_str = "Download all links with IDM"
  • In HKEY_CURRENT_USER\Software\DownloadManager\menuExt
    • ffdownlFLV_str = "Download last requested FLV video"
  • In HKEY_CURRENT_USER\Software\DownloadManager\menuExt
    • ffdownl10FLV_str = "Choose from 10 last requested FLV videos"
  • In HKEY_CURRENT_USER\Software\DownloadManager\menuExt
    • ffdownlppFLV_str = "Download FLV video with IDM"
  • In HKEY_CURRENT_USER\Software\DownloadManager\menuExt
    • ffdownlFLVa_str = "Download last requested FLV video with IDM"
  • In HKEY_CURRENT_USER\Software\DownloadManager\menuExt
    • ffdownl10FLVa_str = "Download FLV videos with IDM from 10 last requested"
  • In HKEY_CURRENT_USER\Software\DownloadManager
    • ExceptionServers = "{random characters}"
  • In HKEY_CURRENT_USER\Software\DownloadManager\FoldersTree\Compressed
    • ID = "7"
  • In HKEY_CURRENT_USER\Software\DownloadManager\FoldersTree\Compressed
    • mask = "zip rar r0* r1* arj gz sit sitx sea ace bz2 7z"
  • In HKEY_CURRENT_USER\Software\DownloadManager\FoldersTree\Compressed
    • pathW = ""
  • In HKEY_CURRENT_USER\Software\DownloadManager\FoldersTree\Compressed
    • rememberLastPath = "0"
  • In HKEY_CURRENT_USER\Software\DownloadManager\FoldersTree\Compressed
    • forSiteOnly = "0"
  • In HKEY_CURRENT_USER\Software\DownloadManager\FoldersTree\Compressed
    • sites = ""
  • In HKEY_CURRENT_USER\Software\DownloadManager\FoldersTree\Documents
    • ID = "5"
  • In HKEY_CURRENT_USER\Software\DownloadManager\FoldersTree\Documents
    • mask = "doc pdf ppt pps docx pptx"
  • In HKEY_CURRENT_USER\Software\DownloadManager\FoldersTree\Documents
    • pathW = ""
  • In HKEY_CURRENT_USER\Software\DownloadManager\FoldersTree\Documents
    • rememberLastPath = "0"
  • In HKEY_CURRENT_USER\Software\DownloadManager\FoldersTree\Documents
    • forSiteOnly = "0"
  • In HKEY_CURRENT_USER\Software\DownloadManager\FoldersTree\Documents
    • sites = ""
  • In HKEY_CURRENT_USER\Software\DownloadManager\FoldersTree\Music
    • ID = "2"
  • In HKEY_CURRENT_USER\Software\DownloadManager\FoldersTree\Music
    • mask = "mp3 wav wma mpa ram ra aac aif m4a"
  • In HKEY_CURRENT_USER\Software\DownloadManager\FoldersTree\Music
    • pathW = ""
  • In HKEY_CURRENT_USER\Software\DownloadManager\FoldersTree\Music
    • rememberLastPath = "0"
  • In HKEY_CURRENT_USER\Software\DownloadManager\FoldersTree\Music
    • forSiteOnly = "0"
  • In HKEY_CURRENT_USER\Software\DownloadManager\FoldersTree\Music
    • sites = ""
  • In HKEY_CURRENT_USER\Software\DownloadManager\FoldersTree\Programs
    • ID = "1"
  • In HKEY_CURRENT_USER\Software\DownloadManager\FoldersTree\Programs
    • mask = "exe msi"
  • In HKEY_CURRENT_USER\Software\DownloadManager\FoldersTree\Programs
    • pathW = ""
  • In HKEY_CURRENT_USER\Software\DownloadManager\FoldersTree\Programs
    • rememberLastPath = "0"
  • In HKEY_CURRENT_USER\Software\DownloadManager\FoldersTree\Programs
    • forSiteOnly = "0"
  • In HKEY_CURRENT_USER\Software\DownloadManager\FoldersTree\Programs
    • sites = ""
  • In HKEY_CURRENT_USER\Software\DownloadManager\FoldersTree\Video
    • ID = "3"
  • In HKEY_CURRENT_USER\Software\DownloadManager\FoldersTree\Video
    • mask = "avi mpg mpe mpeg asf wmv mov qt rm mp4 flv m4v webm ogv ogg mkv ts"
  • In HKEY_CURRENT_USER\Software\DownloadManager\FoldersTree\Video
    • pathW = ""
  • In HKEY_CURRENT_USER\Software\DownloadManager\FoldersTree\Video
    • rememberLastPath = "0"
  • In HKEY_CURRENT_USER\Software\DownloadManager\FoldersTree\Video
    • forSiteOnly = "0"
  • In HKEY_CURRENT_USER\Software\DownloadManager\FoldersTree\Video
    • sites = ""
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Classes\IDMan.CIDMLinkTransmitter\CLSID
    • (Default) = "{AC746233-E9D3-49CD-862F-068F7B7CCCA4}"
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AC746233-E9D3-49CD-862F-068F7B7CCCA4}
    • (Default) = "IDMan.CIDMLinkTransmitter"
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AC746233-E9D3-49CD-862F-068F7B7CCCA4}
    • AppID = "{AC746233-E9D3-49CD-862F-068F7B7CCCA4}"
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AC746233-E9D3-49CD-862F-068F7B7CCCA4}\LocalServer32
    • (Default) = "{malware file path and name}"
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{AC746233-E9D3-49CD-862F-068F7B7CCCA4}
    • (Default) = "IDMan"
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{AC746233-E9D3-49CD-862F-068F7B7CCCA4}
    • RunAs = "Interactive User"
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{AC746233-E9D3-49CD-862F-068F7B7CCCA4}
    • ROTFlags = "1"
  • In HKEY_CURRENT_USER\Software\DownloadManager\menuExt
    • iedownl1_str = "Download with IDM"
  • In HKEY_CURRENT_USER\Software\DownloadManager\menuExt
    • iedownlAll_str = "Download all links with IDM"
  • In HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer
    • DownloadUI = "{7D11E719-FF90-479C-B0D7-96EB43EE55D7}"
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer
    • DownloadUI = "{7D11E719-FF90-479C-B0D7-96EB43EE55D7}"
  • In HKEY_CURRENT_USER\Software\Microsoft\Edge\Extensions\ngpampappnmepgilojfohadhhmbhlaek
    • path = "%User Temp%\IDMGCExt.crx"
  • In HKEY_CURRENT_USER\Software\Microsoft\Edge\Extensions\ngpampappnmepgilojfohadhhmbhlaek
    • version = "6.35.18"
  • In HKEY_CURRENT_USER\Software\Microsoft\Edge\NativeMessagingHosts\com.tonec.idm
    • (Default) = "%User Temp%\IDMMsgHost.json"
  • In HKEY_CURRENT_USER\Software\CocCoc\Browser\Extensions\ngpampappnmepgilojfohadhhmbhlaek
    • path = "%User Temp%\IDMGCExt.crx"
  • In HKEY_CURRENT_USER\Software\CocCoc\Browser\Extensions\ngpampappnmepgilojfohadhhmbhlaek
    • version = "6.35.18"
  • In HKEY_CURRENT_USER\Software\CocCoc\Browser\NativeMessagingHosts\com.tonec.idm
    • (Default) = "%User Temp%\IDMMsgHost.json"
  • In HKEY_CURRENT_USER\Software\DownloadManager
    • EnableDriver = "1"
  • In HKEY_CURRENT_USER\Software\DownloadManager
    • FSPSSettingsChecked = "1"
  • In HKEY_CURRENT_USER\Software\DownloadManager
    • FSSettingsChecked = "1"
  • In HKEY_CURRENT_USER\Software\DownloadManager
    • mzcc_ext_vers = "73120"
  • In HKEY_CURRENT_USER\Software\DownloadManager
    • intAOFRWE = "1"
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{0055C089-8582-441B-A0BF-17B458C2A3A8}
    • (Default) = "IDM Helper"
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{0055C089-8582-441B-A0BF-17B458C2A3A8}
    • NoExplorer = "1"
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0055C089-8582-441B-A0BF-17B458C2A3A8}
    • (Default) = "IDM Helper"
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0055C089-8582-441B-A0BF-17B458C2A3A8}
    • NoExplorer = "1"
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Google\Chrome\NativeMessagingHosts\com.tonec.idm
    • (Default) = "%User Temp%\IDMMsgHost.json"
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Google\Chrome\NativeMessagingHosts\com.tonec.idm
    • (Default) = "%User Temp%\IDMMsgHost.json"
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Google\Chrome\Extensions\ngpampappnmepgilojfohadhhmbhlaek
    • path = "%User Temp%\IDMGCExt.crx"
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Google\Chrome\Extensions\ngpampappnmepgilojfohadhhmbhlaek
    • version = "6.35.18"
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Google\Chrome\Extensions\ngpampappnmepgilojfohadhhmbhlaek
    • path = "%User Temp%\IDMGCExt.crx"
  • In HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Google\Chrome\Extensions\ngpampappnmepgilojfohadhhmbhlaek
    • version = "6.35.18"

Step 4

Search and delete this file

[ Learn More ]
There may be some files that are hidden. Please make sure you check the Search Hidden Files and Folders checkbox in the "More advanced options" option to include all hidden files and folders in the search result.
  • %Application Data%\IDM\idmfc.dat

Step 5

Search and delete these folders

[ Learn More ]
Please make sure you check the Search Hidden Files and Folders checkbox in the More advanced options option to include all hidden folders in the search result.
  • %User Profile%\Downloads\Compressed
  • %All Users Profile%\IDM
  • %User Profile%\Downloads\Documents
  • %User Profile%\Downloads\Programs
  • %User Profile%\Downloads\Music
  • %User Profile%\Downloads\Video
  • %Application Data%\DMCache
  • %Application Data%\IDM

Step 6

Scan your computer with your Trend Micro product to delete files detected as HackTool.Win32.IDMPatcher.AE. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check the following Trend Micro Support pages for more information:


Did this description help? Tell us how we did.