Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
164s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
04/05/2023, 06:46
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20230220-en
General
-
Target
Setup.exe
-
Size
1024.0MB
-
MD5
5e379c09784c0b093d430f5438ea881d
-
SHA1
b73aecf39e5909bc972ca3eabc147c30dbde4caf
-
SHA256
bfe4a7fd2312bac3c06a31985a1884be39af15aa310c5396bbb4d51a23324499
-
SHA512
ac28d28e5ec9a5a5b0ff5621fa4213bf4c54ab3937d2efc0abf1ffd71f18ae7ef31b0e15e75168d3f7ba4e3f9aaae2bc868996b5c83e11efe42427a0a648be60
-
SSDEEP
98304:h77a3TZRRiRRRwRRRRRRR6RURRFRRRRdRRRRRRJRRRRRRRRRRRRRRER7RRRRRRRS:h77BmnfzuL21F5oQegx+U
Malware Config
Extracted
vidar
3.7
41259ba39e7d2a1b343e34c89786c56f
https://steamcommunity.com/profiles/76561199501059503
https://t.me/mastersbots
-
profile_id_v2
41259ba39e7d2a1b343e34c89786c56f
-
user_agent
Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/112.0
Extracted
laplas
http://185.209.161.89
-
api_key
6a2714906f1325d666e4cf9f6269c2352ccfb7e7f1a23c114287dc69ddf27cb0
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 7 IoCs
description pid Process procid_target PID 1984 created 1372 1984 53459263304861018675.exe 15 PID 1984 created 1372 1984 53459263304861018675.exe 15 PID 1984 created 1372 1984 53459263304861018675.exe 15 PID 1984 created 1372 1984 53459263304861018675.exe 15 PID 1984 created 1372 1984 53459263304861018675.exe 15 PID 904 created 1372 904 updater.exe 15 PID 904 created 1372 904 updater.exe 15 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ntlhost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Setup.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 91106996063573883471.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts 53459263304861018675.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 91106996063573883471.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 91106996063573883471.exe -
Executes dropped EXE 5 IoCs
pid Process 1296 91106996063573883471.exe 1984 53459263304861018675.exe 276 73713148706892911030.exe 796 ntlhost.exe 904 updater.exe -
Loads dropped DLL 8 IoCs
pid Process 1332 AddInProcess32.exe 1332 AddInProcess32.exe 1332 AddInProcess32.exe 1332 AddInProcess32.exe 1332 AddInProcess32.exe 1332 AddInProcess32.exe 1296 91106996063573883471.exe 792 taskeng.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/904-55-0x0000000001320000-0x00000000017DC000-memory.dmp themida behavioral1/memory/904-64-0x0000000001320000-0x00000000017DC000-memory.dmp themida -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" 91106996063573883471.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Setup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 91106996063573883471.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ntlhost.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 904 Setup.exe 1296 91106996063573883471.exe 796 ntlhost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 904 set thread context of 1332 904 Setup.exe 33 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\updater.exe 53459263304861018675.exe -
Launches sc.exe 9 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2032 sc.exe 1008 sc.exe 1000 sc.exe 2008 sc.exe 1600 sc.exe 1976 sc.exe 1608 sc.exe 1676 sc.exe 2004 sc.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AddInProcess32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString AddInProcess32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 924 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1724 timeout.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 20 Go-http-client/1.1 -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 60d84e73657ed901 powershell.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 904 Setup.exe 904 Setup.exe 904 Setup.exe 904 Setup.exe 904 Setup.exe 904 Setup.exe 1332 AddInProcess32.exe 1984 53459263304861018675.exe 1984 53459263304861018675.exe 1460 powershell.exe 1984 53459263304861018675.exe 1984 53459263304861018675.exe 1984 53459263304861018675.exe 1984 53459263304861018675.exe 1984 53459263304861018675.exe 1984 53459263304861018675.exe 1828 powershell.exe 1984 53459263304861018675.exe 1984 53459263304861018675.exe 904 updater.exe 904 updater.exe 1636 powershell.exe 904 updater.exe 904 updater.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 904 Setup.exe Token: SeDebugPrivilege 1460 powershell.exe Token: SeShutdownPrivilege 1192 powercfg.exe Token: SeShutdownPrivilege 1964 powercfg.exe Token: SeShutdownPrivilege 1624 powercfg.exe Token: SeDebugPrivilege 1828 powershell.exe Token: SeShutdownPrivilege 2044 powercfg.exe Token: SeDebugPrivilege 1636 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 904 wrote to memory of 108 904 Setup.exe 27 PID 904 wrote to memory of 108 904 Setup.exe 27 PID 904 wrote to memory of 108 904 Setup.exe 27 PID 904 wrote to memory of 528 904 Setup.exe 28 PID 904 wrote to memory of 528 904 Setup.exe 28 PID 904 wrote to memory of 528 904 Setup.exe 28 PID 904 wrote to memory of 1880 904 Setup.exe 29 PID 904 wrote to memory of 1880 904 Setup.exe 29 PID 904 wrote to memory of 1880 904 Setup.exe 29 PID 904 wrote to memory of 268 904 Setup.exe 30 PID 904 wrote to memory of 268 904 Setup.exe 30 PID 904 wrote to memory of 268 904 Setup.exe 30 PID 904 wrote to memory of 660 904 Setup.exe 31 PID 904 wrote to memory of 660 904 Setup.exe 31 PID 904 wrote to memory of 660 904 Setup.exe 31 PID 904 wrote to memory of 764 904 Setup.exe 32 PID 904 wrote to memory of 764 904 Setup.exe 32 PID 904 wrote to memory of 764 904 Setup.exe 32 PID 904 wrote to memory of 1332 904 Setup.exe 33 PID 904 wrote to memory of 1332 904 Setup.exe 33 PID 904 wrote to memory of 1332 904 Setup.exe 33 PID 904 wrote to memory of 1332 904 Setup.exe 33 PID 904 wrote to memory of 1332 904 Setup.exe 33 PID 904 wrote to memory of 1332 904 Setup.exe 33 PID 904 wrote to memory of 1332 904 Setup.exe 33 PID 904 wrote to memory of 1332 904 Setup.exe 33 PID 904 wrote to memory of 1332 904 Setup.exe 33 PID 904 wrote to memory of 1332 904 Setup.exe 33 PID 904 wrote to memory of 1332 904 Setup.exe 33 PID 1332 wrote to memory of 1296 1332 AddInProcess32.exe 37 PID 1332 wrote to memory of 1296 1332 AddInProcess32.exe 37 PID 1332 wrote to memory of 1296 1332 AddInProcess32.exe 37 PID 1332 wrote to memory of 1296 1332 AddInProcess32.exe 37 PID 1332 wrote to memory of 1984 1332 AddInProcess32.exe 38 PID 1332 wrote to memory of 1984 1332 AddInProcess32.exe 38 PID 1332 wrote to memory of 1984 1332 AddInProcess32.exe 38 PID 1332 wrote to memory of 1984 1332 AddInProcess32.exe 38 PID 1332 wrote to memory of 276 1332 AddInProcess32.exe 39 PID 1332 wrote to memory of 276 1332 AddInProcess32.exe 39 PID 1332 wrote to memory of 276 1332 AddInProcess32.exe 39 PID 1332 wrote to memory of 276 1332 AddInProcess32.exe 39 PID 1332 wrote to memory of 1996 1332 AddInProcess32.exe 41 PID 1332 wrote to memory of 1996 1332 AddInProcess32.exe 41 PID 1332 wrote to memory of 1996 1332 AddInProcess32.exe 41 PID 1332 wrote to memory of 1996 1332 AddInProcess32.exe 41 PID 276 wrote to memory of 1592 276 73713148706892911030.exe 40 PID 276 wrote to memory of 1592 276 73713148706892911030.exe 40 PID 276 wrote to memory of 1592 276 73713148706892911030.exe 40 PID 1592 wrote to memory of 1100 1592 cmd.exe 44 PID 1592 wrote to memory of 1100 1592 cmd.exe 44 PID 1592 wrote to memory of 1100 1592 cmd.exe 44 PID 1996 wrote to memory of 1724 1996 cmd.exe 45 PID 1996 wrote to memory of 1724 1996 cmd.exe 45 PID 1996 wrote to memory of 1724 1996 cmd.exe 45 PID 1996 wrote to memory of 1724 1996 cmd.exe 45 PID 1296 wrote to memory of 796 1296 91106996063573883471.exe 48 PID 1296 wrote to memory of 796 1296 91106996063573883471.exe 48 PID 1296 wrote to memory of 796 1296 91106996063573883471.exe 48 PID 1120 wrote to memory of 2032 1120 cmd.exe 51 PID 1120 wrote to memory of 2032 1120 cmd.exe 51 PID 1120 wrote to memory of 2032 1120 cmd.exe 51 PID 1120 wrote to memory of 2008 1120 cmd.exe 52 PID 1120 wrote to memory of 2008 1120 cmd.exe 52 PID 1120 wrote to memory of 2008 1120 cmd.exe 52 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"3⤵PID:108
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"3⤵PID:528
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"3⤵PID:1880
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"3⤵PID:268
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"3⤵PID:660
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"3⤵PID:764
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"3⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\ProgramData\91106996063573883471.exe"C:\ProgramData\91106996063573883471.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:796
-
-
-
C:\ProgramData\53459263304861018675.exe"C:\ProgramData\53459263304861018675.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1984
-
-
C:\ProgramData\73713148706892911030.exe"C:\ProgramData\73713148706892911030.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\ProgramData\73713148706892911030.exe5⤵
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 06⤵PID:1100
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe" & exit4⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\timeout.exetimeout /t 65⤵
- Delays execution with timeout.exe
PID:1724
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1460
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:2032
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:2008
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:1600
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:1976
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1608
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ipspm#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1828 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"3⤵
- Creates scheduled task(s)
PID:924
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:384
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1192
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1964
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2044
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:844
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1636
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:1896
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:1676
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:2004
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:1008
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:1000
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {0E99ADFC-C68C-47B8-9A48-0E500B1841A3} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Loads dropped DLL
PID:792 -
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:904
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Impair Defenses
1Modify Registry
1Scripting
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.9MB
MD5e73194a403fd143a40a887531094257f
SHA17b733ecd885071e391be8be0ca0ddb821e2cce13
SHA256a885b6fa15bdd671b472e5f08c3965af4e47050c2b4cc0f9068c1485d0eb2f78
SHA512341a117c39b4dd9e943a4fd9a87cef5f7b02338f0c1dd2b0574371d6e0ee61e4cae8086a156e95ea87a28d3494347d4317be1aedaba417005c8a01bfdb20579f
-
Filesize
9.9MB
MD5e73194a403fd143a40a887531094257f
SHA17b733ecd885071e391be8be0ca0ddb821e2cce13
SHA256a885b6fa15bdd671b472e5f08c3965af4e47050c2b4cc0f9068c1485d0eb2f78
SHA512341a117c39b4dd9e943a4fd9a87cef5f7b02338f0c1dd2b0574371d6e0ee61e4cae8086a156e95ea87a28d3494347d4317be1aedaba417005c8a01bfdb20579f
-
Filesize
9.9MB
MD5e73194a403fd143a40a887531094257f
SHA17b733ecd885071e391be8be0ca0ddb821e2cce13
SHA256a885b6fa15bdd671b472e5f08c3965af4e47050c2b4cc0f9068c1485d0eb2f78
SHA512341a117c39b4dd9e943a4fd9a87cef5f7b02338f0c1dd2b0574371d6e0ee61e4cae8086a156e95ea87a28d3494347d4317be1aedaba417005c8a01bfdb20579f
-
Filesize
9.9MB
MD5e73194a403fd143a40a887531094257f
SHA17b733ecd885071e391be8be0ca0ddb821e2cce13
SHA256a885b6fa15bdd671b472e5f08c3965af4e47050c2b4cc0f9068c1485d0eb2f78
SHA512341a117c39b4dd9e943a4fd9a87cef5f7b02338f0c1dd2b0574371d6e0ee61e4cae8086a156e95ea87a28d3494347d4317be1aedaba417005c8a01bfdb20579f
-
Filesize
13.9MB
MD5d8431b3a178832916271c342bf601ab9
SHA167faf52bf4313adb175ffa874f475aa7b9abf2be
SHA256e56eb964c60472d2a09b07c91764d7ba7e01cd20079eb575fea9cbe1d0c22315
SHA512ffeb11d3287a9954f54cc073f1c5e88ce7bfcc5921f7febe8be96cadb6a286e7900d504cb7014163033cd3cf8d7cd29dd3329b146cbdfb85bdeeaae19d64c471
-
Filesize
13.9MB
MD5d8431b3a178832916271c342bf601ab9
SHA167faf52bf4313adb175ffa874f475aa7b9abf2be
SHA256e56eb964c60472d2a09b07c91764d7ba7e01cd20079eb575fea9cbe1d0c22315
SHA512ffeb11d3287a9954f54cc073f1c5e88ce7bfcc5921f7febe8be96cadb6a286e7900d504cb7014163033cd3cf8d7cd29dd3329b146cbdfb85bdeeaae19d64c471
-
Filesize
4.3MB
MD5ddac8c4023deb11c8640fca3c9313113
SHA1396f984beea94dd6f1e59218cacfff3836ee8521
SHA256fd1b90ab20f012a6132f7f059f73032b279739f29217e331b947c984a4172b05
SHA5122fb5f51ce4ac4494d4811207c6ba29fd1a1d8b1a2e52771f5567fbb37bc71d8e5b2b8f349bfccd87e91f4d28b9cff10f6b3e134dc98de62faab92b1eab2f1280
-
Filesize
4.3MB
MD5ddac8c4023deb11c8640fca3c9313113
SHA1396f984beea94dd6f1e59218cacfff3836ee8521
SHA256fd1b90ab20f012a6132f7f059f73032b279739f29217e331b947c984a4172b05
SHA5122fb5f51ce4ac4494d4811207c6ba29fd1a1d8b1a2e52771f5567fbb37bc71d8e5b2b8f349bfccd87e91f4d28b9cff10f6b3e134dc98de62faab92b1eab2f1280
-
Filesize
4.3MB
MD5ddac8c4023deb11c8640fca3c9313113
SHA1396f984beea94dd6f1e59218cacfff3836ee8521
SHA256fd1b90ab20f012a6132f7f059f73032b279739f29217e331b947c984a4172b05
SHA5122fb5f51ce4ac4494d4811207c6ba29fd1a1d8b1a2e52771f5567fbb37bc71d8e5b2b8f349bfccd87e91f4d28b9cff10f6b3e134dc98de62faab92b1eab2f1280
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD503a9e9aff4aebdc1f2c680ef50792cc2
SHA1179fd4ef2362f5a98b526aed71218f8bdee60ae0
SHA25636c51dfa1ab5fa020b23149a2fafb65da1b47765cc54af9d2a362c246dcbe9c4
SHA512d726e28460938f20d4d34c04bfd49a1dd15f74f66a14758311d3cb33d7abd928c515d426ba6c551b39cdbce4fc506dd19de85bc635381d67d7dfaff68cf52022
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\LROFSF9LGDMKHJFSQHPD.temp
Filesize7KB
MD503a9e9aff4aebdc1f2c680ef50792cc2
SHA1179fd4ef2362f5a98b526aed71218f8bdee60ae0
SHA25636c51dfa1ab5fa020b23149a2fafb65da1b47765cc54af9d2a362c246dcbe9c4
SHA512d726e28460938f20d4d34c04bfd49a1dd15f74f66a14758311d3cb33d7abd928c515d426ba6c551b39cdbce4fc506dd19de85bc635381d67d7dfaff68cf52022
-
Filesize
616.2MB
MD5917c9da9c3cb616e433ac742090c2d7e
SHA10a94f39f8639252c89fa8256691d539d5ac65059
SHA256b7cb4c26222a5ac8dad9fd4ba319ed3ca551d8ccd200132b2be9bf3ebf24ccb3
SHA512e1cbdec3ee876792eb6909a105ddbcd5c1f36b44f16bd658c715da66f5269649f94469b50e0259a59d2bdb7c4930318bbd776ab3a0ee74a3bb6b08f512400735
-
Filesize
9.9MB
MD5e73194a403fd143a40a887531094257f
SHA17b733ecd885071e391be8be0ca0ddb821e2cce13
SHA256a885b6fa15bdd671b472e5f08c3965af4e47050c2b4cc0f9068c1485d0eb2f78
SHA512341a117c39b4dd9e943a4fd9a87cef5f7b02338f0c1dd2b0574371d6e0ee61e4cae8086a156e95ea87a28d3494347d4317be1aedaba417005c8a01bfdb20579f
-
Filesize
9.9MB
MD5e73194a403fd143a40a887531094257f
SHA17b733ecd885071e391be8be0ca0ddb821e2cce13
SHA256a885b6fa15bdd671b472e5f08c3965af4e47050c2b4cc0f9068c1485d0eb2f78
SHA512341a117c39b4dd9e943a4fd9a87cef5f7b02338f0c1dd2b0574371d6e0ee61e4cae8086a156e95ea87a28d3494347d4317be1aedaba417005c8a01bfdb20579f
-
Filesize
13.9MB
MD5d8431b3a178832916271c342bf601ab9
SHA167faf52bf4313adb175ffa874f475aa7b9abf2be
SHA256e56eb964c60472d2a09b07c91764d7ba7e01cd20079eb575fea9cbe1d0c22315
SHA512ffeb11d3287a9954f54cc073f1c5e88ce7bfcc5921f7febe8be96cadb6a286e7900d504cb7014163033cd3cf8d7cd29dd3329b146cbdfb85bdeeaae19d64c471
-
Filesize
13.9MB
MD5d8431b3a178832916271c342bf601ab9
SHA167faf52bf4313adb175ffa874f475aa7b9abf2be
SHA256e56eb964c60472d2a09b07c91764d7ba7e01cd20079eb575fea9cbe1d0c22315
SHA512ffeb11d3287a9954f54cc073f1c5e88ce7bfcc5921f7febe8be96cadb6a286e7900d504cb7014163033cd3cf8d7cd29dd3329b146cbdfb85bdeeaae19d64c471
-
Filesize
4.3MB
MD5ddac8c4023deb11c8640fca3c9313113
SHA1396f984beea94dd6f1e59218cacfff3836ee8521
SHA256fd1b90ab20f012a6132f7f059f73032b279739f29217e331b947c984a4172b05
SHA5122fb5f51ce4ac4494d4811207c6ba29fd1a1d8b1a2e52771f5567fbb37bc71d8e5b2b8f349bfccd87e91f4d28b9cff10f6b3e134dc98de62faab92b1eab2f1280
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
632.6MB
MD53a811eb9a1531a606fb9c0a876d7884b
SHA1c198c6685b2cc0e535354ca6f93641adbbcb2783
SHA256b5e15dbce673e26034d1faf16696bf859fca24d1d15057405d70dea52aaf4fc7
SHA5125eab80e8b4e911a43627b56ef53ecf680408d6562b4713485fe37164254b4ca6432277369b17d07e4be7ca1b14939c4757fb6002a3cc4da3b77e9eb857283780