File name:

VictorKill.exe

Full analysis: https://app.any.run/tasks/45076da3-1850-4d62-a2bc-19f670be6a44
Verdict: Malicious activity
Analysis date: April 21, 2025, 02:50:03
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
sfx
dropper
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, RAR self-extracting archive, 4 sections
MD5:

F70B7BE648112F6427156F72972DB9EC

SHA1:

6B37519A32115F1C78344A1BE36FDF6D9C11E0D6

SHA256:

F080DF95B2F046184FE6BCD96DE8B9CCE820ECD35E30F4F831551157E76FEA2A

SSDEEP:

786432:hgATYBuLDHIF9j3gXYPfYLjrw36F3mJ52gh+RmW:hVTYBuLEF953Yfrw36UJ52d8W

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • SFX dropper has been detected

      • VictorKill.exe (PID: 904)
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • VictorKill.exe (PID: 904)
    • Application launched itself

      • VictorKill.exe (PID: 904)
    • Reads Internet Explorer settings

      • VictorKill.exe (PID: 904)
    • Reads security settings of Internet Explorer

      • VictorKill.exe (PID: 904)
      • VictorKill.exe (PID: 780)
    • Executable content was dropped or overwritten

      • VictorKill.exe (PID: 780)
    • Process drops legitimate windows executable

      • VictorKill.exe (PID: 780)
  • INFO

    • Reads the computer name

      • VictorKill.exe (PID: 904)
      • VictorKill.exe (PID: 780)
      • Victor.exe (PID: 1072)
    • Checks supported languages

      • VictorKill.exe (PID: 904)
      • VictorKill.exe (PID: 780)
      • Victor.exe (PID: 1072)
    • Process checks computer location settings

      • VictorKill.exe (PID: 904)
      • VictorKill.exe (PID: 780)
    • Checks proxy server information

      • VictorKill.exe (PID: 904)
      • slui.exe (PID: 6324)
    • The sample compiled with english language support

      • VictorKill.exe (PID: 780)
    • The sample compiled with german language support

      • VictorKill.exe (PID: 780)
    • Create files in a temporary directory

      • Victor.exe (PID: 1072)
    • Reads the software policy settings

      • slui.exe (PID: 6324)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2016:01:20 18:59:36+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 9
CodeSize: 169984
InitializedDataSize: 50176
UninitializedDataSize: -
EntryPoint: 0x1e64b
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
129
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #DROPPER victorkill.exe no specs victorkill.exe victor.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
780"C:\Users\admin\AppData\Local\Temp\VictorKill.exe" -el -s2 "-dC:\" "-p" "-sp"C:\Users\admin\AppData\Local\Temp\VictorKill.exe
VictorKill.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\victorkill.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\version.dll
904"C:\Users\admin\AppData\Local\Temp\VictorKill.exe" C:\Users\admin\AppData\Local\Temp\VictorKill.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\victorkill.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\version.dll
1072"C:\victor\Victor.exe" C:\victor\Victor.exeVictorKill.exe
User:
admin
Company:
BellCraft Technologies
Integrity Level:
HIGH
Exit code:
0
Version:
7.05
Modules
Images
c:\victor\victor.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvbvm60.dll
6324C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
1 606
Read events
1 600
Write events
4
Delete events
2

Modification events

(PID) Process:(904) VictorKill.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(904) VictorKill.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(904) VictorKill.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(904) VictorKill.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR SFX
Operation:writeName:C%%
Value:
C:\
(PID) Process:(904) VictorKill.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\LowRegistry
Operation:delete valueName:AddToFavoritesInitialSelection
Value:
(PID) Process:(904) VictorKill.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\LowRegistry
Operation:delete valueName:AddToFeedsInitialSelection
Value:
Executable files
13
Suspicious files
5
Text files
8
Unknown types
0

Dropped files

PID
Process
Filename
Type
780VictorKill.exeC:\victor\party.wav
MD5:
SHA256:
780VictorKill.exeC:\victor\QQPlayer.exe
MD5:
SHA256:
780VictorKill.exeC:\victor\Dogpc.exeexecutable
MD5:32D084F636F3E6D8472A447965B7FF3D
SHA256:B8BC2A692C0188AB8C973D6752820A4A26BE5BFFC9C86EB2C84F238CE80856DF
780VictorKill.exeC:\victor\optimize.exeexecutable
MD5:5FFEADAD118403D9496653DCE94300CC
SHA256:9BEE3EB4C6544D6E69543440BEC4F1F246FAD1E17067BB6E8BFD6DAAC7CE475F
780VictorKill.exeC:\victor\end.battext
MD5:0A4E293729D9A24EE49576AA491E6507
SHA256:E14B6360B50182629DF70EDE4A933A691405D9BA5416F10F56F0622466673551
780VictorKill.exeC:\victor\Flash.exeexecutable
MD5:15A6605156E29F68FDFD637E73A889D4
SHA256:19EAF4F294B78AA98D056028318FBEC0CB1D6FDBCF14FFA1662ED8BEE6C15C71
780VictorKill.exeC:\victor\LimePro.exeexecutable
MD5:A6BA111C7EA638EDAC79CE34BB7A3DE3
SHA256:6C87657CFE2D7576333C2887D90F543C8FD4241E50F653B2C3A95EFFF2C4A268
780VictorKill.exeC:\victor\paint.mp3binary
MD5:1C111738EE0D15359FD01970E0BEC752
SHA256:6843957CCDAF90E02CC7883ACC848DD7D2BC65A87ECD300BC00BD267B026833C
780VictorKill.exeC:\victor\paint.battext
MD5:0BF8457A7BF267218C8CA2928A602648
SHA256:3DAC4564BB45BC592D146545DE3B44890261DA175E91CDB683B37BE3C57E4E58
780VictorKill.exeC:\victor\ReadMe SpongeBob.txttext
MD5:1B21017D69341C37A95C8525A459ECC6
SHA256:02F4CCF321CE16F2D554D9816C65287B9B5063CFB092C6EABF63C6B8DFC74BD1
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
22
DNS requests
15
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.216.77.6:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
23.63.118.230:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5400
SIHClient.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5400
SIHClient.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.216.77.6:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2.23.181.156:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.32.76:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
23.63.118.230:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
5400
SIHClient.exe
4.175.87.197:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 23.216.77.6
  • 23.216.77.28
whitelisted
google.com
  • 142.250.181.238
whitelisted
www.microsoft.com
  • 2.23.181.156
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 40.126.32.76
  • 20.190.160.128
  • 20.190.160.67
  • 20.190.160.66
  • 40.126.32.136
  • 20.190.160.5
  • 40.126.32.74
  • 20.190.160.130
whitelisted
ocsp.digicert.com
  • 23.63.118.230
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted

Threats

No threats detected
No debug info