Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2025, 13:35
Behavioral task
behavioral1
Sample
JaffaCakes118_408f04809f3d0e09723cc9fdddf12e74.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_408f04809f3d0e09723cc9fdddf12e74.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_408f04809f3d0e09723cc9fdddf12e74.exe
-
Size
317KB
-
MD5
408f04809f3d0e09723cc9fdddf12e74
-
SHA1
64bb2cd6c32fb3370e40ba082690eb4a410f46fa
-
SHA256
1c00e6a434730bf5f5f9dd8a04ed21e86f6c5f535b7d4e2c0937115e565f18be
-
SHA512
2c0210de11b0b83ccae2f42facfd75752953b83f6569a493aed29a7169f7be1fb36bf112f77dc9933e968a9fadc6253003195ff6ed44ff844d77fd4ccd057407
-
SSDEEP
6144:RBHXeCz+zA75F5fMUhONc7D/IbiosVai6F2xZGoHTevoGxoSj:Hvz+wreUhONcfAbioo6noHTbGxoSj
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 12 IoCs
resource yara_rule behavioral2/memory/844-34-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/844-30-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/844-45-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/844-46-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/844-48-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/844-53-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/844-55-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/844-58-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/844-60-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/844-67-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/844-69-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/844-74-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\MicrosoftOS.exe = "C:\\Users\\Admin\\AppData\\Roaming\\MicrosoftOS.exe:*:Enabled:Windows Messanger" reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\svchost.exe = "C:\\Windows\\svchost.exe:*:Enabled:Windows Messanger" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe -
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Control Panel\International\Geo\Nation JaffaCakes118_408f04809f3d0e09723cc9fdddf12e74.exe -
Executes dropped EXE 3 IoCs
pid Process 4672 svchost.exe 844 svchost.exe 4888 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Protection = "C:\\Windows\\svchost.exe" reg.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4672 set thread context of 844 4672 svchost.exe 98 PID 4672 set thread context of 4888 4672 svchost.exe 111 -
resource yara_rule behavioral2/memory/4828-0-0x0000000000400000-0x00000000008A4000-memory.dmp upx behavioral2/files/0x000600000001e52e-15.dat upx behavioral2/memory/4828-23-0x0000000000400000-0x00000000008A4000-memory.dmp upx behavioral2/memory/844-26-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/844-34-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/844-30-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/844-29-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/4672-40-0x0000000000400000-0x00000000008A4000-memory.dmp upx behavioral2/memory/844-45-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/844-46-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/844-48-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/844-53-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/844-55-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/844-58-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/844-60-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/844-67-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/844-69-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/844-74-0x0000000000400000-0x0000000000473000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\svchost.exe JaffaCakes118_408f04809f3d0e09723cc9fdddf12e74.exe File opened for modification C:\Windows\svchost.exe svchost.exe File opened for modification C:\Windows\svchost.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_408f04809f3d0e09723cc9fdddf12e74.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 392 reg.exe 3200 reg.exe 4604 reg.exe 2824 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 844 svchost.exe Token: SeCreateTokenPrivilege 844 svchost.exe Token: SeAssignPrimaryTokenPrivilege 844 svchost.exe Token: SeLockMemoryPrivilege 844 svchost.exe Token: SeIncreaseQuotaPrivilege 844 svchost.exe Token: SeMachineAccountPrivilege 844 svchost.exe Token: SeTcbPrivilege 844 svchost.exe Token: SeSecurityPrivilege 844 svchost.exe Token: SeTakeOwnershipPrivilege 844 svchost.exe Token: SeLoadDriverPrivilege 844 svchost.exe Token: SeSystemProfilePrivilege 844 svchost.exe Token: SeSystemtimePrivilege 844 svchost.exe Token: SeProfSingleProcessPrivilege 844 svchost.exe Token: SeIncBasePriorityPrivilege 844 svchost.exe Token: SeCreatePagefilePrivilege 844 svchost.exe Token: SeCreatePermanentPrivilege 844 svchost.exe Token: SeBackupPrivilege 844 svchost.exe Token: SeRestorePrivilege 844 svchost.exe Token: SeShutdownPrivilege 844 svchost.exe Token: SeDebugPrivilege 844 svchost.exe Token: SeAuditPrivilege 844 svchost.exe Token: SeSystemEnvironmentPrivilege 844 svchost.exe Token: SeChangeNotifyPrivilege 844 svchost.exe Token: SeRemoteShutdownPrivilege 844 svchost.exe Token: SeUndockPrivilege 844 svchost.exe Token: SeSyncAgentPrivilege 844 svchost.exe Token: SeEnableDelegationPrivilege 844 svchost.exe Token: SeManageVolumePrivilege 844 svchost.exe Token: SeImpersonatePrivilege 844 svchost.exe Token: SeCreateGlobalPrivilege 844 svchost.exe Token: 31 844 svchost.exe Token: 32 844 svchost.exe Token: 33 844 svchost.exe Token: 34 844 svchost.exe Token: 35 844 svchost.exe Token: SeDebugPrivilege 4888 svchost.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4828 JaffaCakes118_408f04809f3d0e09723cc9fdddf12e74.exe 4672 svchost.exe 4672 svchost.exe 844 svchost.exe 844 svchost.exe 844 svchost.exe 4888 svchost.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 4828 wrote to memory of 1620 4828 JaffaCakes118_408f04809f3d0e09723cc9fdddf12e74.exe 89 PID 4828 wrote to memory of 1620 4828 JaffaCakes118_408f04809f3d0e09723cc9fdddf12e74.exe 89 PID 4828 wrote to memory of 1620 4828 JaffaCakes118_408f04809f3d0e09723cc9fdddf12e74.exe 89 PID 1620 wrote to memory of 1336 1620 cmd.exe 92 PID 1620 wrote to memory of 1336 1620 cmd.exe 92 PID 1620 wrote to memory of 1336 1620 cmd.exe 92 PID 1620 wrote to memory of 2804 1620 cmd.exe 93 PID 1620 wrote to memory of 2804 1620 cmd.exe 93 PID 1620 wrote to memory of 2804 1620 cmd.exe 93 PID 4828 wrote to memory of 1616 4828 JaffaCakes118_408f04809f3d0e09723cc9fdddf12e74.exe 94 PID 4828 wrote to memory of 1616 4828 JaffaCakes118_408f04809f3d0e09723cc9fdddf12e74.exe 94 PID 4828 wrote to memory of 1616 4828 JaffaCakes118_408f04809f3d0e09723cc9fdddf12e74.exe 94 PID 1616 wrote to memory of 3892 1616 cmd.exe 96 PID 1616 wrote to memory of 3892 1616 cmd.exe 96 PID 1616 wrote to memory of 3892 1616 cmd.exe 96 PID 4828 wrote to memory of 4672 4828 JaffaCakes118_408f04809f3d0e09723cc9fdddf12e74.exe 97 PID 4828 wrote to memory of 4672 4828 JaffaCakes118_408f04809f3d0e09723cc9fdddf12e74.exe 97 PID 4828 wrote to memory of 4672 4828 JaffaCakes118_408f04809f3d0e09723cc9fdddf12e74.exe 97 PID 4672 wrote to memory of 844 4672 svchost.exe 98 PID 4672 wrote to memory of 844 4672 svchost.exe 98 PID 4672 wrote to memory of 844 4672 svchost.exe 98 PID 4672 wrote to memory of 844 4672 svchost.exe 98 PID 4672 wrote to memory of 844 4672 svchost.exe 98 PID 4672 wrote to memory of 844 4672 svchost.exe 98 PID 4672 wrote to memory of 844 4672 svchost.exe 98 PID 4672 wrote to memory of 844 4672 svchost.exe 98 PID 844 wrote to memory of 3484 844 svchost.exe 99 PID 844 wrote to memory of 3484 844 svchost.exe 99 PID 844 wrote to memory of 3484 844 svchost.exe 99 PID 844 wrote to memory of 3860 844 svchost.exe 100 PID 844 wrote to memory of 3860 844 svchost.exe 100 PID 844 wrote to memory of 3860 844 svchost.exe 100 PID 844 wrote to memory of 1204 844 svchost.exe 101 PID 844 wrote to memory of 1204 844 svchost.exe 101 PID 844 wrote to memory of 1204 844 svchost.exe 101 PID 844 wrote to memory of 3420 844 svchost.exe 102 PID 844 wrote to memory of 3420 844 svchost.exe 102 PID 844 wrote to memory of 3420 844 svchost.exe 102 PID 3484 wrote to memory of 3200 3484 cmd.exe 107 PID 3484 wrote to memory of 3200 3484 cmd.exe 107 PID 3484 wrote to memory of 3200 3484 cmd.exe 107 PID 3420 wrote to memory of 2824 3420 cmd.exe 108 PID 3420 wrote to memory of 2824 3420 cmd.exe 108 PID 3420 wrote to memory of 2824 3420 cmd.exe 108 PID 3860 wrote to memory of 4604 3860 cmd.exe 109 PID 3860 wrote to memory of 4604 3860 cmd.exe 109 PID 3860 wrote to memory of 4604 3860 cmd.exe 109 PID 1204 wrote to memory of 392 1204 cmd.exe 110 PID 1204 wrote to memory of 392 1204 cmd.exe 110 PID 1204 wrote to memory of 392 1204 cmd.exe 110 PID 4672 wrote to memory of 4888 4672 svchost.exe 111 PID 4672 wrote to memory of 4888 4672 svchost.exe 111 PID 4672 wrote to memory of 4888 4672 svchost.exe 111 PID 4672 wrote to memory of 4888 4672 svchost.exe 111 PID 4672 wrote to memory of 4888 4672 svchost.exe 111 PID 4672 wrote to memory of 4888 4672 svchost.exe 111 PID 4672 wrote to memory of 4888 4672 svchost.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_408f04809f3d0e09723cc9fdddf12e74.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_408f04809f3d0e09723cc9fdddf12e74.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZUTALA.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\reg.exeREG ADD3⤵
- System Location Discovery: System Language Discovery
PID:1336
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
PID:2804
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\kdsuy.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Protection" /t REG_SZ /d "C:\Windows\svchost.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3892
-
-
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3200
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\svchost.exe" /t REG_SZ /d "C:\Windows\svchost.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\svchost.exe" /t REG_SZ /d "C:\Windows\svchost.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4604
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:392
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\MicrosoftOS.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\MicrosoftOS.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\MicrosoftOS.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\MicrosoftOS.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2824
-
-
-
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4888
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148B
MD5742480e2dd4101d455075e597bb952b2
SHA1d22a306942ae6e6754a88492e5d60527589cd1e7
SHA2566628da6b7a4abb02ba8986b4857f0b3bf23a81244d00c30e1288522700dc4873
SHA5125e83d4253fb448712b7631aba304bbee9c6e37bb098aeffef93330532940a40b422b9b8f61667c92daf8e283507ed2755586b9fdfa31f355dd2a938a6e2cd5d8
-
Filesize
117B
MD545e7c508c09ab298be38f6dd6d0092e6
SHA19d0cc4bddd244cc7d54d35efe9b6794e21624a35
SHA2568d8907152fbb1d9cd5e6c34ef7c70beccb4ff96f00b71da7df3e9cfc8a1ccc65
SHA51294b6682eab9c94d328922cab52d9017765d1fee2cceba8138c0cb20e80e13d756d92213fa2f44fa0134fabed0e5dbfcc39ea3320e10bf57903e45713f4e00119
-
Filesize
317KB
MD5408f04809f3d0e09723cc9fdddf12e74
SHA164bb2cd6c32fb3370e40ba082690eb4a410f46fa
SHA2561c00e6a434730bf5f5f9dd8a04ed21e86f6c5f535b7d4e2c0937115e565f18be
SHA5122c0210de11b0b83ccae2f42facfd75752953b83f6569a493aed29a7169f7be1fb36bf112f77dc9933e968a9fadc6253003195ff6ed44ff844d77fd4ccd057407