Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
21s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/02/2025, 23:48
Static task
static1
Behavioral task
behavioral1
Sample
639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe
Resource
win7-20240903-en
General
-
Target
639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe
-
Size
1.9MB
-
MD5
3bb33439e5fd17b32587abac4461c2a9
-
SHA1
3eae5af86b5bb471d59e9e587bb527710a255f7e
-
SHA256
639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c
-
SHA512
ef3e27dbb480b9e5c1388eac01c72479397542a0431b3c27060b575f83d3eda19ff557b8520a1749e6ad82504d40234b0d45b0977dc118227119aabafb9c66b4
-
SSDEEP
24576:JzYcWpbiQMobokEyEsEesVAqLJiZvqyrC9FNNaxXGrlwIB87qhZUFd4XH4eRCyDm:J58uIokSsvT26BECKfSo3oBAXRTcZIe
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" Au_.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" Au_.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" Au_.exe -
Sality family
-
UAC bypass 3 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Au_.exe -
Windows security bypass 2 TTPs 12 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" Au_.exe -
Deletes itself 1 IoCs
pid Process 2660 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 2660 Au_.exe -
Loads dropped DLL 3 IoCs
pid Process 2228 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe 2660 Au_.exe 2660 Au_.exe -
Windows security modification 2 TTPs 14 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc Au_.exe -
Checks whether UAC is enabled 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Au_.exe -
Enumerates connected drives 3 TTPs 14 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: Au_.exe File opened (read-only) \??\J: Au_.exe File opened (read-only) \??\L: Au_.exe File opened (read-only) \??\O: Au_.exe File opened (read-only) \??\M: Au_.exe File opened (read-only) \??\P: Au_.exe File opened (read-only) \??\E: Au_.exe File opened (read-only) \??\I: Au_.exe File opened (read-only) \??\K: Au_.exe File opened (read-only) \??\N: Au_.exe File opened (read-only) \??\Q: Au_.exe File opened (read-only) \??\G: Au_.exe File opened (read-only) \??\R: Au_.exe File opened (read-only) \??\S: Au_.exe -
resource yara_rule behavioral1/memory/2228-6-0x0000000001F00000-0x0000000002F8E000-memory.dmp upx behavioral1/memory/2228-3-0x0000000001F00000-0x0000000002F8E000-memory.dmp upx behavioral1/memory/2228-15-0x0000000001F00000-0x0000000002F8E000-memory.dmp upx behavioral1/memory/2228-9-0x0000000001F00000-0x0000000002F8E000-memory.dmp upx behavioral1/memory/2228-10-0x0000000001F00000-0x0000000002F8E000-memory.dmp upx behavioral1/memory/2228-7-0x0000000001F00000-0x0000000002F8E000-memory.dmp upx behavioral1/memory/2228-5-0x0000000001F00000-0x0000000002F8E000-memory.dmp upx behavioral1/memory/2228-4-0x0000000001F00000-0x0000000002F8E000-memory.dmp upx behavioral1/memory/2228-8-0x0000000001F00000-0x0000000002F8E000-memory.dmp upx behavioral1/memory/2228-50-0x0000000001F00000-0x0000000002F8E000-memory.dmp upx behavioral1/memory/2660-56-0x00000000021D0000-0x000000000325E000-memory.dmp upx behavioral1/memory/2660-59-0x00000000021D0000-0x000000000325E000-memory.dmp upx behavioral1/memory/2660-58-0x00000000021D0000-0x000000000325E000-memory.dmp upx behavioral1/memory/2660-57-0x00000000021D0000-0x000000000325E000-memory.dmp upx behavioral1/memory/2660-60-0x00000000021D0000-0x000000000325E000-memory.dmp upx behavioral1/memory/2660-61-0x00000000021D0000-0x000000000325E000-memory.dmp upx behavioral1/memory/2660-55-0x00000000021D0000-0x000000000325E000-memory.dmp upx behavioral1/memory/2660-54-0x00000000021D0000-0x000000000325E000-memory.dmp upx behavioral1/memory/2660-53-0x00000000021D0000-0x000000000325E000-memory.dmp upx behavioral1/memory/2660-151-0x00000000021D0000-0x000000000325E000-memory.dmp upx behavioral1/memory/2660-152-0x00000000021D0000-0x000000000325E000-memory.dmp upx behavioral1/memory/2660-195-0x00000000021D0000-0x000000000325E000-memory.dmp upx behavioral1/memory/2660-196-0x00000000021D0000-0x000000000325E000-memory.dmp upx behavioral1/memory/2660-197-0x00000000021D0000-0x000000000325E000-memory.dmp upx behavioral1/memory/2660-199-0x00000000021D0000-0x000000000325E000-memory.dmp upx behavioral1/memory/2660-200-0x00000000021D0000-0x000000000325E000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2228 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe 2660 Au_.exe 2660 Au_.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 2228 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Token: SeDebugPrivilege 2228 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Token: SeDebugPrivilege 2228 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Token: SeDebugPrivilege 2228 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Token: SeDebugPrivilege 2228 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Token: SeDebugPrivilege 2228 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Token: SeDebugPrivilege 2228 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Token: SeDebugPrivilege 2228 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Token: SeDebugPrivilege 2228 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Token: SeDebugPrivilege 2228 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Token: SeDebugPrivilege 2228 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Token: SeDebugPrivilege 2228 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Token: SeDebugPrivilege 2228 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Token: SeDebugPrivilege 2228 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Token: SeDebugPrivilege 2228 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Token: SeDebugPrivilege 2228 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Token: SeDebugPrivilege 2228 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Token: SeDebugPrivilege 2228 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Token: SeDebugPrivilege 2228 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Token: SeDebugPrivilege 2228 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Token: SeDebugPrivilege 2228 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Token: SeDebugPrivilege 2228 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Token: SeDebugPrivilege 2660 Au_.exe Token: SeDebugPrivilege 2660 Au_.exe Token: SeDebugPrivilege 2660 Au_.exe Token: SeDebugPrivilege 2660 Au_.exe Token: SeDebugPrivilege 2660 Au_.exe Token: SeDebugPrivilege 2660 Au_.exe Token: SeDebugPrivilege 2660 Au_.exe Token: SeDebugPrivilege 2660 Au_.exe Token: SeDebugPrivilege 2660 Au_.exe Token: SeDebugPrivilege 2660 Au_.exe Token: SeDebugPrivilege 2660 Au_.exe Token: SeDebugPrivilege 2660 Au_.exe Token: SeDebugPrivilege 2660 Au_.exe Token: SeDebugPrivilege 2660 Au_.exe Token: SeDebugPrivilege 2660 Au_.exe Token: SeDebugPrivilege 2660 Au_.exe Token: SeDebugPrivilege 2660 Au_.exe Token: SeDebugPrivilege 2660 Au_.exe Token: SeDebugPrivilege 2660 Au_.exe Token: SeDebugPrivilege 2660 Au_.exe Token: SeDebugPrivilege 2660 Au_.exe Token: SeDebugPrivilege 2660 Au_.exe Token: SeDebugPrivilege 2660 Au_.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2228 wrote to memory of 1112 2228 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe 19 PID 2228 wrote to memory of 1168 2228 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe 20 PID 2228 wrote to memory of 1196 2228 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe 21 PID 2228 wrote to memory of 1304 2228 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe 23 PID 2228 wrote to memory of 2660 2228 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe 30 PID 2228 wrote to memory of 2660 2228 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe 30 PID 2228 wrote to memory of 2660 2228 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe 30 PID 2228 wrote to memory of 2660 2228 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe 30 PID 2228 wrote to memory of 2660 2228 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe 30 PID 2228 wrote to memory of 2660 2228 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe 30 PID 2228 wrote to memory of 2660 2228 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe 30 PID 2660 wrote to memory of 1112 2660 Au_.exe 19 PID 2660 wrote to memory of 1168 2660 Au_.exe 20 PID 2660 wrote to memory of 1196 2660 Au_.exe 21 PID 2660 wrote to memory of 1304 2660 Au_.exe 23 PID 2660 wrote to memory of 1112 2660 Au_.exe 19 PID 2660 wrote to memory of 1168 2660 Au_.exe 20 PID 2660 wrote to memory of 1196 2660 Au_.exe 21 PID 2660 wrote to memory of 1304 2660 Au_.exe 23 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Au_.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe"C:\Users\Admin\AppData\Local\Temp\639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\3⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2660
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1304
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\0F76FE9A_Rar\639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c.exe
Filesize1.8MB
MD56e1b0d60c0fec9a30712232ac80f588f
SHA1a8d4e798a69554fb799131d921b8d66bb7a157d4
SHA256990b09016ea75138a1ab9c52f346ae60f97bed659aafded41c4e7c866f7a482c
SHA512e8c38e2b0e3a2617e3204e9287f82d1910ad553044156db738d33f69d5d559a9a986a6c1cdee90e10909816f3962b3c475b5340c7d8350b43ebcdcfa1d9ca54b
-
Filesize
721B
MD5512fbfea0e6d192dc846d9b49d3716cc
SHA15c29844ae6da67904e21460fe027a78aa5a411e3
SHA25624395fa7e2c02ae3d32b2f3575a1433aed05a87674b586f34ada84b538f234fb
SHA51210c6737897110dd48e42c94e2c7ce6ad6988ba8d5e9830917f5375068765886bf85014ef3b7b36c7ae0a48b78e42601d69756ade1de1e1852b08c3a41263d580
-
Filesize
257B
MD5701f134f6c76842cfac10aea6e27ac90
SHA18404728d9a559c25a07a2979438b466d7c6aa69e
SHA256bd447f60bae27880fcdc9f4ce504a6af392cabf662194bafb394d665b6cf8f65
SHA512edb37e818f560b3cdc36d60366309aa9bd2738091ce918fefc95c4fc61840704cf5b3c63fb23260acc11dae25a9f3094a0ae1ed84c3be3876487ee126e817a92
-
Filesize
100KB
MD5e1f5f6e4b270a6a81cad6a95fd2518cc
SHA1318ee320a4f638aebac5cf2dfe1b2574a1101818
SHA2562076d11ccfae3a6fff776887d1f3409d03320bdaca0c7473875f6cb1ee1978f3
SHA512fbde7161f1fb739c78535a88e412c49728b77f6ac0fca86c45cb454e55eb3de67cb6457969d284b0557285945a1f560ca7baac80c6f12638185c4a75a971a965
-
Filesize
11KB
MD5959ea64598b9a3e494c00e8fa793be7e
SHA140f284a3b92c2f04b1038def79579d4b3d066ee0
SHA25603cd57ab00236c753e7ddeee8ee1c10839ace7c426769982365531042e1f6f8b
SHA5125e765e090f712beffce40c5264674f430b08719940d66e3a4d4a516fd4ade859f7853f614d9d6bbb602780de54e11110d66dbb0f9ca20ef6096ede531f9f6d64
-
Filesize
812KB
MD51a9ae6a7e975fa3c77304cd8abbfb10c
SHA11f56bb9fff55822e271aad3880f43b87a5c8dee4
SHA256254e830f1fd1fa00a93cd7fa089df419f3580cfc171e0399820f4a2ec7671807
SHA512b78672fd63e26bdb2b16d6e99b506a180b980ff354890180f49a0ad4e2ddf7f58c696a7e268f5a58ae6f5d8f592a233cb68c0e59184f82b848acd7d663f404e1
-
Filesize
1.9MB
MD53bb33439e5fd17b32587abac4461c2a9
SHA13eae5af86b5bb471d59e9e587bb527710a255f7e
SHA256639c5053b060176ae34d35d3d81a0d51d93d5ec06dce6c6a743e0e39ebe5303c
SHA512ef3e27dbb480b9e5c1388eac01c72479397542a0431b3c27060b575f83d3eda19ff557b8520a1749e6ad82504d40234b0d45b0977dc118227119aabafb9c66b4