Overview
overview
10Static
static
3mixazed_20...20.exe
windows7-x64
10mixazed_20...20.exe
windows10-2004-x64
10mixazed_20...23.exe
windows7-x64
10mixazed_20...23.exe
windows10-2004-x64
10mixazed_20...04.exe
windows7-x64
10mixazed_20...04.exe
windows10-2004-x64
10mixazed_20...25.exe
windows7-x64
10mixazed_20...25.exe
windows10-2004-x64
10mixazed_20...06.exe
windows7-x64
10mixazed_20...06.exe
windows10-2004-x64
10mixazed_20...07.exe
windows7-x64
10mixazed_20...07.exe
windows10-2004-x64
10mixazed_20...48.exe
windows7-x64
10mixazed_20...48.exe
windows10-2004-x64
10mixsix_202...11.exe
windows7-x64
10mixsix_202...11.exe
windows10-2004-x64
10usfive_202...29.exe
windows7-x64
10usfive_202...29.exe
windows10-2004-x64
10usfive_202...19.exe
windows7-x64
10usfive_202...19.exe
windows10-2004-x64
10usfive_202...38.exe
windows7-x64
10usfive_202...38.exe
windows10-2004-x64
10usfive_202...22.exe
windows7-x64
10usfive_202...22.exe
windows10-2004-x64
10usfive_202...45.exe
windows7-x64
10usfive_202...45.exe
windows10-2004-x64
10usfive_202...26.exe
windows7-x64
10usfive_202...26.exe
windows10-2004-x64
10usfive_202...26.exe
windows7-x64
10usfive_202...26.exe
windows10-2004-x64
10Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 21:38
Static task
static1
Behavioral task
behavioral1
Sample
mixazed_20210808-071120.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
mixazed_20210808-071120.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
mixazed_20210808-075823.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
mixazed_20210808-075823.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
mixazed_20210808-090104.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
mixazed_20210808-090104.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
mixazed_20210808-093225.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
mixazed_20210808-093225.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
mixazed_20210808-094806.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
mixazed_20210808-094806.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
mixazed_20210808-103507.exe
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
mixazed_20210808-103507.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
mixazed_20210808-113748.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
mixazed_20210808-113748.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
mixsix_20210808-081411.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
mixsix_20210808-081411.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
usfive_20210807-233729.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
usfive_20210807-233729.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
usfive_20210808-050619.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
usfive_20210808-050619.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
usfive_20210808-053738.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
usfive_20210808-053738.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
usfive_20210808-090122.exe
Resource
win7-20241023-en
Behavioral task
behavioral24
Sample
usfive_20210808-090122.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
usfive_20210808-101945.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
usfive_20210808-101945.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
usfive_20210808-112226.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
usfive_20210808-112226.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
usfive_20210808-120926.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
usfive_20210808-120926.exe
Resource
win10v2004-20241007-en
General
-
Target
mixazed_20210808-071120.exe
-
Size
542KB
-
MD5
bdff95108f1380b097200f1a1063775c
-
SHA1
ae61a14382009adde7b63fc0d2cac23cba715dfe
-
SHA256
874e9527126f7470fb2482a75d1e8016f988c7ed7b417ae7e0a991e49bc094a5
-
SHA512
8592f307efeb628e81167f693dc85d8ed54531f9540dc6cab1d35b76546b763448cab7e38380e35c8365678f798ba1a296e72044374a82f40fe7b3157b4f02e2
-
SSDEEP
12288:3NfcfEpahAGNjIlJbkGaDmZ0uNEQxUbzkMbbzScgC:efSal+kG4w0uNEQxUbIp
Malware Config
Extracted
remcos
3.1.5 Pro
winslogon
178.18.247.224:45265
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
winslogon.exe
-
copy_folder
sys
-
delete_file
true
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
sys
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
winslogon-QT8NX3
-
screenshot_crypt
true
-
screenshot_flag
true
-
screenshot_folder
systemp
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
winslogon
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Signatures
-
Remcos family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run mixazed_20210808-071120.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\winslogon = "\"C:\\Users\\Admin\\AppData\\Roaming\\sys\\winslogon.exe\"" mixazed_20210808-071120.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run winslogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\winslogon = "\"C:\\Users\\Admin\\AppData\\Roaming\\sys\\winslogon.exe\"" winslogon.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation mixazed_20210808-071120.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe -
Deletes itself 1 IoCs
pid Process 560 WScript.exe -
Executes dropped EXE 1 IoCs
pid Process 2968 winslogon.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\winslogon = "\"C:\\Users\\Admin\\AppData\\Roaming\\sys\\winslogon.exe\"" mixazed_20210808-071120.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winslogon = "\"C:\\Users\\Admin\\AppData\\Roaming\\sys\\winslogon.exe\"" winslogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\winslogon = "\"C:\\Users\\Admin\\AppData\\Roaming\\sys\\winslogon.exe\"" winslogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winslogon = "\"C:\\Users\\Admin\\AppData\\Roaming\\sys\\winslogon.exe\"" mixazed_20210808-071120.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 20 IoCs
pid pid_target Process procid_target 4516 3464 WerFault.exe 84 1328 3464 WerFault.exe 84 5104 3464 WerFault.exe 84 3964 3464 WerFault.exe 84 4212 3464 WerFault.exe 84 1316 3464 WerFault.exe 84 4564 3464 WerFault.exe 84 828 3464 WerFault.exe 84 2240 2968 WerFault.exe 113 3772 2968 WerFault.exe 113 4936 2968 WerFault.exe 113 1648 2968 WerFault.exe 113 1500 2968 WerFault.exe 113 720 2968 WerFault.exe 113 3960 2968 WerFault.exe 113 1720 2968 WerFault.exe 113 2388 2968 WerFault.exe 113 4188 2968 WerFault.exe 113 3524 2968 WerFault.exe 113 2216 2968 WerFault.exe 113 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winslogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mixazed_20210808-071120.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings mixazed_20210808-071120.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 4396 reg.exe 4056 reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2968 winslogon.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3464 wrote to memory of 4624 3464 mixazed_20210808-071120.exe 88 PID 3464 wrote to memory of 4624 3464 mixazed_20210808-071120.exe 88 PID 3464 wrote to memory of 4624 3464 mixazed_20210808-071120.exe 88 PID 4624 wrote to memory of 4396 4624 cmd.exe 90 PID 4624 wrote to memory of 4396 4624 cmd.exe 90 PID 4624 wrote to memory of 4396 4624 cmd.exe 90 PID 3464 wrote to memory of 560 3464 mixazed_20210808-071120.exe 106 PID 3464 wrote to memory of 560 3464 mixazed_20210808-071120.exe 106 PID 3464 wrote to memory of 560 3464 mixazed_20210808-071120.exe 106 PID 560 wrote to memory of 4480 560 WScript.exe 111 PID 560 wrote to memory of 4480 560 WScript.exe 111 PID 560 wrote to memory of 4480 560 WScript.exe 111 PID 4480 wrote to memory of 2968 4480 cmd.exe 113 PID 4480 wrote to memory of 2968 4480 cmd.exe 113 PID 4480 wrote to memory of 2968 4480 cmd.exe 113 PID 2968 wrote to memory of 800 2968 winslogon.exe 117 PID 2968 wrote to memory of 800 2968 winslogon.exe 117 PID 2968 wrote to memory of 800 2968 winslogon.exe 117 PID 800 wrote to memory of 4056 800 cmd.exe 120 PID 800 wrote to memory of 4056 800 cmd.exe 120 PID 800 wrote to memory of 4056 800 cmd.exe 120 PID 2968 wrote to memory of 2864 2968 winslogon.exe 130 PID 2968 wrote to memory of 2864 2968 winslogon.exe 130 PID 2968 wrote to memory of 2864 2968 winslogon.exe 130
Processes
-
C:\Users\Admin\AppData\Local\Temp\mixazed_20210808-071120.exe"C:\Users\Admin\AppData\Local\Temp\mixazed_20210808-071120.exe"1⤵
- Adds policy Run key to start application
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4396
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 6842⤵
- Program crash
PID:4516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 9562⤵
- Program crash
PID:1328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 10082⤵
- Program crash
PID:5104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 11402⤵
- Program crash
PID:3964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 9722⤵
- Program crash
PID:4212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 11282⤵
- Program crash
PID:1316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 11882⤵
- Program crash
PID:4564
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"2⤵
- Checks computer location settings
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\sys\winslogon.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Roaming\sys\winslogon.exeC:\Users\Admin\AppData\Roaming\sys\winslogon.exe4⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f6⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4056
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 6325⤵
- Program crash
PID:2240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 6325⤵
- Program crash
PID:3772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 6925⤵
- Program crash
PID:4936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 7725⤵
- Program crash
PID:1648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 7725⤵
- Program crash
PID:1500
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe5⤵PID:2864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 8325⤵
- Program crash
PID:720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 8965⤵
- Program crash
PID:3960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 9405⤵
- Program crash
PID:1720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 9565⤵
- Program crash
PID:2388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 10125⤵
- Program crash
PID:4188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 9245⤵
- Program crash
PID:3524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 10885⤵
- Program crash
PID:2216
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 12242⤵
- Program crash
PID:828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3464 -ip 34641⤵PID:1820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3464 -ip 34641⤵PID:4416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3464 -ip 34641⤵PID:2296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3464 -ip 34641⤵PID:4276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3464 -ip 34641⤵PID:3600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3464 -ip 34641⤵PID:2252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3464 -ip 34641⤵PID:1884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3464 -ip 34641⤵PID:1188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2968 -ip 29681⤵PID:1964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2968 -ip 29681⤵PID:3496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2968 -ip 29681⤵PID:388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2968 -ip 29681⤵PID:4024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2968 -ip 29681⤵PID:836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2968 -ip 29681⤵PID:3780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2968 -ip 29681⤵PID:1640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2968 -ip 29681⤵PID:4452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2968 -ip 29681⤵PID:2880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2968 -ip 29681⤵PID:4540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2968 -ip 29681⤵PID:2828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2968 -ip 29681⤵PID:4364
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
576B
MD57c01e4ef9d70bfb4dd8940a38601a1aa
SHA1f6464b830b2720844a8867d31a0cef1913334d4e
SHA256950afb6215d6e9192f80a349f0acf3caf9b4787cb07cc96f1c47808e67e26c3a
SHA5129614e9112453f511766b369d33a34e3af48060c2e203a35720dadd2856c323ef1debbb3978f21e9d4aac542b7fc1c0f1156d6e5125142d316a78dbd248480e9c
-
Filesize
542KB
MD5bdff95108f1380b097200f1a1063775c
SHA1ae61a14382009adde7b63fc0d2cac23cba715dfe
SHA256874e9527126f7470fb2482a75d1e8016f988c7ed7b417ae7e0a991e49bc094a5
SHA5128592f307efeb628e81167f693dc85d8ed54531f9540dc6cab1d35b76546b763448cab7e38380e35c8365678f798ba1a296e72044374a82f40fe7b3157b4f02e2
-
Filesize
431KB
MD5fc7aeb74857b2a596967ffbde1a7a626
SHA188ca3b51f1f2824364f2273f90186c0407583562
SHA256daf6badcde4c2abcebffb41e87e43fbecb5f95fda67c74a53421074b8011a4e1
SHA5125d3b1a4d2049d638e801ed66253b876a8c6fe4f88dc2ff190f10ba9ec765737fd13530b7d040bc354ef72be968b62b558ede4e2f4706a1dcab65e778ae569250