Analysis

  • max time kernel
    156s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    25-05-2022 01:09

General

  • Target

    de5d863d87d27d57f0451daa27013fe3d47897164edb01a1b87f7989d79579f8.exe

  • Size

    14.7MB

  • MD5

    e63a098562fac6ff7fe26598d858c735

  • SHA1

    1c3f06ad01d9c0620d30b79068493a2a2b28c286

  • SHA256

    de5d863d87d27d57f0451daa27013fe3d47897164edb01a1b87f7989d79579f8

  • SHA512

    b73ade1277dcc551a6365ac66a7c079e1b70eb7c167b8c92a086dbd55d7441ad05f91b0bf2cccc7d08cce5bc981ca3dceb0afebb0f616ea7f822b4edc5df79ee

Malware Config

Signatures

  • Echelon

    Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

  • Echelon log file 1 IoCs

    Detects a log file produced by Echelon.

  • Executes dropped EXE 14 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 12 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 17 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 2 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 30 IoCs
  • Suspicious use of SendNotifyMessage 30 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\de5d863d87d27d57f0451daa27013fe3d47897164edb01a1b87f7989d79579f8.exe
    "C:\Users\Admin\AppData\Local\Temp\de5d863d87d27d57f0451daa27013fe3d47897164edb01a1b87f7989d79579f8.exe"
    1⤵
    • Loads dropped DLL
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt
      C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1944
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1348
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"
        3⤵
        • Creates scheduled task(s)
        PID:1044
    • C:\Users\Admin\AppData\Local\Temp\File.exe
      C:\Users\Admin\AppData\Local\Temp\File.exe
      2⤵
      • Executes dropped EXE
      • Accesses Microsoft Outlook profiles
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:268
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 268 -s 1544
        3⤵
        • Program crash
        PID:1524
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c For /L %i In (0,0,0) Do (del "C:\Users\Admin\AppData\Local\Temp\DE5D86~1.EXE"&&timeout /t 0&&if not exist "C:\Users\Admin\AppData\Local\Temp\DE5D86~1.EXE" exit)
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1752
      • C:\Windows\SysWOW64\timeout.exe
        timeout /t 0
        3⤵
        • Delays execution with timeout.exe
        PID:1656
      • C:\Windows\SysWOW64\timeout.exe
        timeout /t 0
        3⤵
        • Delays execution with timeout.exe
        PID:476
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {94AC4BB2-0CA2-4DBF-8C84-042DC47D9760} S-1-5-21-790309383-526510583-3802439154-1000:TVHJCWMH\Admin:Interactive:[1]
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:568
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe -SystemCheck
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1188
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe -SystemCheck
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1568
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe" -SystemCheck8268
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • NTFS ADS
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1620
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
          7z e -p"DxSqsNKKOxqPrM4Y3xeK" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor.tmp" -o"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:892
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\tor.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\tor.exe" -f TorConfig
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:612
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe -SystemCheck
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1776
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe -SystemCheck
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:476
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe" -SystemCheck8268
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1472
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe -SystemCheck
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1568
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe" -SystemCheck8268
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1304
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe -SystemCheck
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:824
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe" -SystemCheck8268
        3⤵
        • Executes dropped EXE
        PID:1584

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\32.exe
    Filesize

    6.7MB

    MD5

    a5146c084d6ffee61217fc10a5442e0c

    SHA1

    2ce12deb6fd07224cd86b5ab6cffef2057c2f178

    SHA256

    fca8734d38eb732ee0ff76ce7d7c301d2ea81ac97f396b2bf7065f58fc770b0a

    SHA512

    e7ebc58ccccd694621fc8b9e90bf017c84ab788c6c967852def194309f45c5024f62278479fb9b46e7b11d436f81bd1228c313329e99cf48f55f93ae569e5356

  • C:\Users\Admin\AppData\Local\Temp\64.exe
    Filesize

    7.2MB

    MD5

    b92650394e342fec52a212ec6244007a

    SHA1

    0448811d4f611f84c139be0844923ce2c5ddf3bb

    SHA256

    569e79153fd006a61e5a16392c2ec8228a6dbfd68eceed21bb87efa4a17f4a6a

    SHA512

    87f59cfcd48c338804685eb8dc8b7be2777278da6deba0973ec7f1e4dc4ee70ef1e8c6ac927b285c2f16cc68471703fdd1aeeee066139a01429ea8d11f0f8c00

  • C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt
    Filesize

    722KB

    MD5

    43141e85e7c36e31b52b22ab94d5e574

    SHA1

    cfd7079a9b268d84b856dc668edbb9ab9ef35312

    SHA256

    ea308c76a2f927b160a143d94072b0dce232e04b751f0c6432a94e05164e716d

    SHA512

    9119ae7500aa5cccf26a0f18fd8454245347e3c01dabba56a93dbaaab86535e62b1357170758f3b3445b8359e7dd5d37737318a5d8a6047c499d32d5b64126fc

  • C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt
    Filesize

    12.8MB

    MD5

    55d3cae65335cf2a725cf9cf1dcc57f6

    SHA1

    752223dca20dcb5c489a837a8cc11052f1113a61

    SHA256

    73dd82370553d58732c1a6d36742e658afa8cf56720c5c978ce8bb43f4767030

    SHA512

    2745b8967be8e5c26bbd05ec16e842fbe928ffe5a46e4a7b28db116d6079d77e3841c08025834ad5def55a5646fefeebaeba9a140ddb6454ab3b6e7e5ecc17c3

  • C:\Users\Admin\AppData\Local\Temp\File.exe
    Filesize

    1.1MB

    MD5

    908310b5055f751cbe7fbdfeecede5b0

    SHA1

    a25e5f8d4201263f58b078ff0542457883f72af7

    SHA256

    0a1a2ad45d8b84cb6abe75bbbcfb12f7bd979a8a567a163265bef0e31e5256c3

    SHA512

    399619363e1721a77960d0654cd693e8ded81d4d8492f3d4b9d567dbb507738ab317cec8a9b2e4a398d809290d5fb1dbdbb65b139032360bdf62f7d46537e5b3

  • C:\Users\Admin\AppData\Local\Temp\File.exe
    Filesize

    1.1MB

    MD5

    908310b5055f751cbe7fbdfeecede5b0

    SHA1

    a25e5f8d4201263f58b078ff0542457883f72af7

    SHA256

    0a1a2ad45d8b84cb6abe75bbbcfb12f7bd979a8a567a163265bef0e31e5256c3

    SHA512

    399619363e1721a77960d0654cd693e8ded81d4d8492f3d4b9d567dbb507738ab317cec8a9b2e4a398d809290d5fb1dbdbb65b139032360bdf62f7d46537e5b3

  • C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml
    Filesize

    2KB

    MD5

    9160347bec74471e1a79edfd950629ae

    SHA1

    c149a7e5aab6e349a70b7b458d0eaaa9d301c790

    SHA256

    0fe356f3d04bb43f772604b049fd2b20f3038ca2ce84bf9778b8ccdd481d77ab

    SHA512

    b8061834f658567a1e742496c38688bdecd60191a92163d47470f64aa1fba23e92dd36fa1d2bb7efa36f14002c0606013973718b9f107e62d845a17be4b0d358

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
    Filesize

    7.2MB

    MD5

    b92650394e342fec52a212ec6244007a

    SHA1

    0448811d4f611f84c139be0844923ce2c5ddf3bb

    SHA256

    569e79153fd006a61e5a16392c2ec8228a6dbfd68eceed21bb87efa4a17f4a6a

    SHA512

    87f59cfcd48c338804685eb8dc8b7be2777278da6deba0973ec7f1e4dc4ee70ef1e8c6ac927b285c2f16cc68471703fdd1aeeee066139a01429ea8d11f0f8c00

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
    Filesize

    7.2MB

    MD5

    b92650394e342fec52a212ec6244007a

    SHA1

    0448811d4f611f84c139be0844923ce2c5ddf3bb

    SHA256

    569e79153fd006a61e5a16392c2ec8228a6dbfd68eceed21bb87efa4a17f4a6a

    SHA512

    87f59cfcd48c338804685eb8dc8b7be2777278da6deba0973ec7f1e4dc4ee70ef1e8c6ac927b285c2f16cc68471703fdd1aeeee066139a01429ea8d11f0f8c00

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
    Filesize

    7.2MB

    MD5

    b92650394e342fec52a212ec6244007a

    SHA1

    0448811d4f611f84c139be0844923ce2c5ddf3bb

    SHA256

    569e79153fd006a61e5a16392c2ec8228a6dbfd68eceed21bb87efa4a17f4a6a

    SHA512

    87f59cfcd48c338804685eb8dc8b7be2777278da6deba0973ec7f1e4dc4ee70ef1e8c6ac927b285c2f16cc68471703fdd1aeeee066139a01429ea8d11f0f8c00

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
    Filesize

    7.2MB

    MD5

    b92650394e342fec52a212ec6244007a

    SHA1

    0448811d4f611f84c139be0844923ce2c5ddf3bb

    SHA256

    569e79153fd006a61e5a16392c2ec8228a6dbfd68eceed21bb87efa4a17f4a6a

    SHA512

    87f59cfcd48c338804685eb8dc8b7be2777278da6deba0973ec7f1e4dc4ee70ef1e8c6ac927b285c2f16cc68471703fdd1aeeee066139a01429ea8d11f0f8c00

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
    Filesize

    7.2MB

    MD5

    b92650394e342fec52a212ec6244007a

    SHA1

    0448811d4f611f84c139be0844923ce2c5ddf3bb

    SHA256

    569e79153fd006a61e5a16392c2ec8228a6dbfd68eceed21bb87efa4a17f4a6a

    SHA512

    87f59cfcd48c338804685eb8dc8b7be2777278da6deba0973ec7f1e4dc4ee70ef1e8c6ac927b285c2f16cc68471703fdd1aeeee066139a01429ea8d11f0f8c00

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
    Filesize

    7.2MB

    MD5

    b92650394e342fec52a212ec6244007a

    SHA1

    0448811d4f611f84c139be0844923ce2c5ddf3bb

    SHA256

    569e79153fd006a61e5a16392c2ec8228a6dbfd68eceed21bb87efa4a17f4a6a

    SHA512

    87f59cfcd48c338804685eb8dc8b7be2777278da6deba0973ec7f1e4dc4ee70ef1e8c6ac927b285c2f16cc68471703fdd1aeeee066139a01429ea8d11f0f8c00

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
    Filesize

    7.2MB

    MD5

    b92650394e342fec52a212ec6244007a

    SHA1

    0448811d4f611f84c139be0844923ce2c5ddf3bb

    SHA256

    569e79153fd006a61e5a16392c2ec8228a6dbfd68eceed21bb87efa4a17f4a6a

    SHA512

    87f59cfcd48c338804685eb8dc8b7be2777278da6deba0973ec7f1e4dc4ee70ef1e8c6ac927b285c2f16cc68471703fdd1aeeee066139a01429ea8d11f0f8c00

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
    Filesize

    7.2MB

    MD5

    b92650394e342fec52a212ec6244007a

    SHA1

    0448811d4f611f84c139be0844923ce2c5ddf3bb

    SHA256

    569e79153fd006a61e5a16392c2ec8228a6dbfd68eceed21bb87efa4a17f4a6a

    SHA512

    87f59cfcd48c338804685eb8dc8b7be2777278da6deba0973ec7f1e4dc4ee70ef1e8c6ac927b285c2f16cc68471703fdd1aeeee066139a01429ea8d11f0f8c00

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
    Filesize

    7.2MB

    MD5

    b92650394e342fec52a212ec6244007a

    SHA1

    0448811d4f611f84c139be0844923ce2c5ddf3bb

    SHA256

    569e79153fd006a61e5a16392c2ec8228a6dbfd68eceed21bb87efa4a17f4a6a

    SHA512

    87f59cfcd48c338804685eb8dc8b7be2777278da6deba0973ec7f1e4dc4ee70ef1e8c6ac927b285c2f16cc68471703fdd1aeeee066139a01429ea8d11f0f8c00

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
    Filesize

    7.2MB

    MD5

    b92650394e342fec52a212ec6244007a

    SHA1

    0448811d4f611f84c139be0844923ce2c5ddf3bb

    SHA256

    569e79153fd006a61e5a16392c2ec8228a6dbfd68eceed21bb87efa4a17f4a6a

    SHA512

    87f59cfcd48c338804685eb8dc8b7be2777278da6deba0973ec7f1e4dc4ee70ef1e8c6ac927b285c2f16cc68471703fdd1aeeee066139a01429ea8d11f0f8c00

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
    Filesize

    7.2MB

    MD5

    b92650394e342fec52a212ec6244007a

    SHA1

    0448811d4f611f84c139be0844923ce2c5ddf3bb

    SHA256

    569e79153fd006a61e5a16392c2ec8228a6dbfd68eceed21bb87efa4a17f4a6a

    SHA512

    87f59cfcd48c338804685eb8dc8b7be2777278da6deba0973ec7f1e4dc4ee70ef1e8c6ac927b285c2f16cc68471703fdd1aeeee066139a01429ea8d11f0f8c00

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
    Filesize

    7.2MB

    MD5

    b92650394e342fec52a212ec6244007a

    SHA1

    0448811d4f611f84c139be0844923ce2c5ddf3bb

    SHA256

    569e79153fd006a61e5a16392c2ec8228a6dbfd68eceed21bb87efa4a17f4a6a

    SHA512

    87f59cfcd48c338804685eb8dc8b7be2777278da6deba0973ec7f1e4dc4ee70ef1e8c6ac927b285c2f16cc68471703fdd1aeeee066139a01429ea8d11f0f8c00

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor.tmp
    Filesize

    2.1MB

    MD5

    4cd3f07fef4d2d847f9cbba628e8edb8

    SHA1

    bb901200c646be4bd215f713f9df9a965517dd13

    SHA256

    3925bef7666a8c8d8d3ab3a15733f7b64d4297741006348d25a703c338389e04

    SHA512

    cf0b29a45f499ed67ec639df591cd9b8ff592e91934d7e6957caaf6ed3c24b751a9885f854616bf3813898b73b253cb054f66540575ba3c19fa18c303de99e83

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\LIBEAY32.dll
    Filesize

    2.5MB

    MD5

    b57e3160f18f33dc9f69ec4ac83f8b0d

    SHA1

    651d39de229ce63ff85fba1d4ba3408bd93d8537

    SHA256

    c09d060e4f78e25bf6e27a6ac790871ac2eb87d8f18eb9f2dff8c7ac9c8d6330

    SHA512

    4e00f998151d81c05325b3537c9a4ff87279d96a7205f267cd5c1cbe78f460aad82ce98c868d4a63c6dae3812810614f4ea340051dd646aecb5f67a5b12deff4

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\SSLEAY32.dll
    Filesize

    769KB

    MD5

    6536e58d90b2e9ded05097163d81642c

    SHA1

    ce1b8e8db12a8bc5de1eba1f25a02e4e2e9ac22a

    SHA256

    e6093fe75346ec927fe3f0eb79ea0d331a3b0493267d488018c8693c9cef9252

    SHA512

    8a766313525cd4268a27843daf588adbbb5ea7476fe0c2c33321ec2e5d9219d6fa335c8f8dcfbb073578631d032416d8ccf7bfa4a7fd89031314bbc981feefea

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\TorData\TorConfig
    Filesize

    201B

    MD5

    b9d2fe9cfa840518fa39039c928d4938

    SHA1

    0561516b7cfa784cf400349983817c8b18817256

    SHA256

    69d57bfb46ef8097c1cfca65885790421d0e0965b7778f165cd7df9368807776

    SHA512

    894510d39a044a37325d73b8348860960b3a78c54e7cdf81357f4b50e8dcf5d47ab98c768e6439949ba835802b2a5e98314441127d9655b027caf246e09e013d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libevent-2-1-6.dll
    Filesize

    840KB

    MD5

    52dc140cbb14e2154e9087ecbc8cdc28

    SHA1

    68a2c92e99a283a67b898fd3208c19160cd36617

    SHA256

    b946b94a6abec862e0685327f76f5f55ed690268c4cd3ceb4018acd6e0e12d6e

    SHA512

    4dc2bd64cfcf4fce6f2030b2077df212da260d89505f16e71e1f06eae7d45437831c34e4de6c1d24ae0b02ca142e261eb363b495595cfd6e404d2304c403ebb0

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libgcc_s_sjlj-1.dll
    Filesize

    967KB

    MD5

    286cdf5fdb6414f3e0508c446af62c30

    SHA1

    394d333371cad5735f09ed8bed128448b1b965ea

    SHA256

    481c13cf972fafa748486fbbd0366a44babaeabd19ba56e691bb3a064c653153

    SHA512

    9ffe9f6d881df0b6a35e9cc7636b64097196102115d9451dd4db71d22fb37ccedfe32879952cd979f85247bb8168f9df95af18dc0eba478deafb2301a6b24c1c

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libssp-0.dll
    Filesize

    272KB

    MD5

    606110186930c205e48942975a851ca4

    SHA1

    d2b7a21bd55a035e2a7813eccc9e33f5f7815823

    SHA256

    33115d4f22517c23939d8f8ab65bbb35cccb5d463ba81b44623e3cb57c8867f7

    SHA512

    3b00c7fecdbaec3fced8f8ecb2b0351d406a3d0a461011140f60d9e1e52afcef3b92baa8c1079ce01716ba266a975c0f54e16f282bf4cf97fafa2e0164c0245c

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libwinpthread-1.dll
    Filesize

    499KB

    MD5

    40a7215c1bd90c1da72b1d4e139f1821

    SHA1

    9106d6140ceec25059c6fd8bbead9005346c88a9

    SHA256

    c115d1a52cd1e848969928a07dbc5312c53c10380bf44a7cdd82a31d5f37404e

    SHA512

    11d1b8a704d02b413822a2bdf8f0c9ea4e5a72509484e1ce96033b226ffb6ef3bdfed0bb05ea3c2396bc7543d9fa0d1f04169277deeeb341186e2ae9de500019

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\tor.exe
    Filesize

    3.6MB

    MD5

    6b179fa8138ae6135d194f19c93e38af

    SHA1

    0a18edd6b76ff09b6132be574caa4502d8ef4d03

    SHA256

    c3d44f93c33999447dc2c1a7197e14ad5278116a5c42b770e974c172162ce963

    SHA512

    f84235149adbbd0b6bcd364b6692f772411e23db80559ceb193252e3e0b4d64de289bff82c23364e998c12168373fa1a5b625d5e85eb3e954f6d1f7db14f95b2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\tor.exe
    Filesize

    3.6MB

    MD5

    6b179fa8138ae6135d194f19c93e38af

    SHA1

    0a18edd6b76ff09b6132be574caa4502d8ef4d03

    SHA256

    c3d44f93c33999447dc2c1a7197e14ad5278116a5c42b770e974c172162ce963

    SHA512

    f84235149adbbd0b6bcd364b6692f772411e23db80559ceb193252e3e0b4d64de289bff82c23364e998c12168373fa1a5b625d5e85eb3e954f6d1f7db14f95b2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\zlib1.dll
    Filesize

    105KB

    MD5

    7b7f33f2d84c9cfbfdd0f755140d2bbf

    SHA1

    98b084b1f3f2637fad742ce497659c052ce1e310

    SHA256

    6d2c002ba600b97e0d514166bcf33667553f41fcbd73e2cd87baef74d4c6f060

    SHA512

    66e8540a4da9c248980096d20a368458a221facb47a353907da636e39bbad9dd3fb70679b8d7cf6b1d6b3d0ffad3ac8b29148c9998fbdbdbb217c1597c839708

  • \Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt
    Filesize

    722KB

    MD5

    43141e85e7c36e31b52b22ab94d5e574

    SHA1

    cfd7079a9b268d84b856dc668edbb9ab9ef35312

    SHA256

    ea308c76a2f927b160a143d94072b0dce232e04b751f0c6432a94e05164e716d

    SHA512

    9119ae7500aa5cccf26a0f18fd8454245347e3c01dabba56a93dbaaab86535e62b1357170758f3b3445b8359e7dd5d37737318a5d8a6047c499d32d5b64126fc

  • \Users\Admin\AppData\Local\Temp\File.exe
    Filesize

    1.1MB

    MD5

    908310b5055f751cbe7fbdfeecede5b0

    SHA1

    a25e5f8d4201263f58b078ff0542457883f72af7

    SHA256

    0a1a2ad45d8b84cb6abe75bbbcfb12f7bd979a8a567a163265bef0e31e5256c3

    SHA512

    399619363e1721a77960d0654cd693e8ded81d4d8492f3d4b9d567dbb507738ab317cec8a9b2e4a398d809290d5fb1dbdbb65b139032360bdf62f7d46537e5b3

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
    Filesize

    7.2MB

    MD5

    b92650394e342fec52a212ec6244007a

    SHA1

    0448811d4f611f84c139be0844923ce2c5ddf3bb

    SHA256

    569e79153fd006a61e5a16392c2ec8228a6dbfd68eceed21bb87efa4a17f4a6a

    SHA512

    87f59cfcd48c338804685eb8dc8b7be2777278da6deba0973ec7f1e4dc4ee70ef1e8c6ac927b285c2f16cc68471703fdd1aeeee066139a01429ea8d11f0f8c00

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
    Filesize

    7.2MB

    MD5

    b92650394e342fec52a212ec6244007a

    SHA1

    0448811d4f611f84c139be0844923ce2c5ddf3bb

    SHA256

    569e79153fd006a61e5a16392c2ec8228a6dbfd68eceed21bb87efa4a17f4a6a

    SHA512

    87f59cfcd48c338804685eb8dc8b7be2777278da6deba0973ec7f1e4dc4ee70ef1e8c6ac927b285c2f16cc68471703fdd1aeeee066139a01429ea8d11f0f8c00

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
    Filesize

    7.2MB

    MD5

    b92650394e342fec52a212ec6244007a

    SHA1

    0448811d4f611f84c139be0844923ce2c5ddf3bb

    SHA256

    569e79153fd006a61e5a16392c2ec8228a6dbfd68eceed21bb87efa4a17f4a6a

    SHA512

    87f59cfcd48c338804685eb8dc8b7be2777278da6deba0973ec7f1e4dc4ee70ef1e8c6ac927b285c2f16cc68471703fdd1aeeee066139a01429ea8d11f0f8c00

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libeay32.dll
    Filesize

    2.5MB

    MD5

    b57e3160f18f33dc9f69ec4ac83f8b0d

    SHA1

    651d39de229ce63ff85fba1d4ba3408bd93d8537

    SHA256

    c09d060e4f78e25bf6e27a6ac790871ac2eb87d8f18eb9f2dff8c7ac9c8d6330

    SHA512

    4e00f998151d81c05325b3537c9a4ff87279d96a7205f267cd5c1cbe78f460aad82ce98c868d4a63c6dae3812810614f4ea340051dd646aecb5f67a5b12deff4

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libevent-2-1-6.dll
    Filesize

    840KB

    MD5

    52dc140cbb14e2154e9087ecbc8cdc28

    SHA1

    68a2c92e99a283a67b898fd3208c19160cd36617

    SHA256

    b946b94a6abec862e0685327f76f5f55ed690268c4cd3ceb4018acd6e0e12d6e

    SHA512

    4dc2bd64cfcf4fce6f2030b2077df212da260d89505f16e71e1f06eae7d45437831c34e4de6c1d24ae0b02ca142e261eb363b495595cfd6e404d2304c403ebb0

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libgcc_s_sjlj-1.dll
    Filesize

    967KB

    MD5

    286cdf5fdb6414f3e0508c446af62c30

    SHA1

    394d333371cad5735f09ed8bed128448b1b965ea

    SHA256

    481c13cf972fafa748486fbbd0366a44babaeabd19ba56e691bb3a064c653153

    SHA512

    9ffe9f6d881df0b6a35e9cc7636b64097196102115d9451dd4db71d22fb37ccedfe32879952cd979f85247bb8168f9df95af18dc0eba478deafb2301a6b24c1c

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libssp-0.dll
    Filesize

    272KB

    MD5

    606110186930c205e48942975a851ca4

    SHA1

    d2b7a21bd55a035e2a7813eccc9e33f5f7815823

    SHA256

    33115d4f22517c23939d8f8ab65bbb35cccb5d463ba81b44623e3cb57c8867f7

    SHA512

    3b00c7fecdbaec3fced8f8ecb2b0351d406a3d0a461011140f60d9e1e52afcef3b92baa8c1079ce01716ba266a975c0f54e16f282bf4cf97fafa2e0164c0245c

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libwinpthread-1.dll
    Filesize

    499KB

    MD5

    40a7215c1bd90c1da72b1d4e139f1821

    SHA1

    9106d6140ceec25059c6fd8bbead9005346c88a9

    SHA256

    c115d1a52cd1e848969928a07dbc5312c53c10380bf44a7cdd82a31d5f37404e

    SHA512

    11d1b8a704d02b413822a2bdf8f0c9ea4e5a72509484e1ce96033b226ffb6ef3bdfed0bb05ea3c2396bc7543d9fa0d1f04169277deeeb341186e2ae9de500019

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\ssleay32.dll
    Filesize

    769KB

    MD5

    6536e58d90b2e9ded05097163d81642c

    SHA1

    ce1b8e8db12a8bc5de1eba1f25a02e4e2e9ac22a

    SHA256

    e6093fe75346ec927fe3f0eb79ea0d331a3b0493267d488018c8693c9cef9252

    SHA512

    8a766313525cd4268a27843daf588adbbb5ea7476fe0c2c33321ec2e5d9219d6fa335c8f8dcfbb073578631d032416d8ccf7bfa4a7fd89031314bbc981feefea

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\zlib1.dll
    Filesize

    105KB

    MD5

    7b7f33f2d84c9cfbfdd0f755140d2bbf

    SHA1

    98b084b1f3f2637fad742ce497659c052ce1e310

    SHA256

    6d2c002ba600b97e0d514166bcf33667553f41fcbd73e2cd87baef74d4c6f060

    SHA512

    66e8540a4da9c248980096d20a368458a221facb47a353907da636e39bbad9dd3fb70679b8d7cf6b1d6b3d0ffad3ac8b29148c9998fbdbdbb217c1597c839708

  • memory/268-65-0x0000000000000000-mapping.dmp
  • memory/268-70-0x0000000000990000-0x0000000000AB8000-memory.dmp
    Filesize

    1.2MB

  • memory/476-96-0x0000000000000000-mapping.dmp
  • memory/476-71-0x0000000000000000-mapping.dmp
  • memory/612-131-0x0000000000E40000-0x00000000011E8000-memory.dmp
    Filesize

    3.7MB

  • memory/612-124-0x0000000074780000-0x000000007498B000-memory.dmp
    Filesize

    2.0MB

  • memory/612-128-0x0000000074C50000-0x0000000074D0D000-memory.dmp
    Filesize

    756KB

  • memory/612-129-0x0000000074780000-0x000000007498B000-memory.dmp
    Filesize

    2.0MB

  • memory/612-130-0x0000000074A80000-0x0000000074B27000-memory.dmp
    Filesize

    668KB

  • memory/612-127-0x0000000074D60000-0x0000000074D81000-memory.dmp
    Filesize

    132KB

  • memory/612-126-0x0000000000E40000-0x00000000011E8000-memory.dmp
    Filesize

    3.7MB

  • memory/612-122-0x0000000074D60000-0x0000000074D81000-memory.dmp
    Filesize

    132KB

  • memory/612-123-0x0000000074C50000-0x0000000074D0D000-memory.dmp
    Filesize

    756KB

  • memory/612-105-0x0000000000000000-mapping.dmp
  • memory/612-125-0x0000000074A80000-0x0000000074B27000-memory.dmp
    Filesize

    668KB

  • memory/824-134-0x0000000000000000-mapping.dmp
  • memory/892-92-0x0000000000060000-0x0000000000183000-memory.dmp
    Filesize

    1.1MB

  • memory/892-85-0x0000000000060000-0x0000000000183000-memory.dmp
    Filesize

    1.1MB

  • memory/892-87-0x0000000000060000-0x0000000000183000-memory.dmp
    Filesize

    1.1MB

  • memory/892-88-0x000000000012D730-mapping.dmp
  • memory/892-94-0x0000000000060000-0x0000000000183000-memory.dmp
    Filesize

    1.1MB

  • memory/1044-61-0x0000000000000000-mapping.dmp
  • memory/1188-75-0x0000000000000000-mapping.dmp
  • memory/1304-139-0x0000000000000000-mapping.dmp
  • memory/1348-60-0x0000000000000000-mapping.dmp
  • memory/1472-102-0x0000000000000000-mapping.dmp
  • memory/1524-81-0x0000000000000000-mapping.dmp
  • memory/1568-78-0x000007FEFBC91000-0x000007FEFBC93000-memory.dmp
    Filesize

    8KB

  • memory/1568-74-0x0000000000000000-mapping.dmp
  • memory/1568-133-0x0000000000000000-mapping.dmp
  • memory/1584-142-0x0000000000000000-mapping.dmp
  • memory/1620-82-0x0000000000000000-mapping.dmp
  • memory/1656-69-0x0000000000000000-mapping.dmp
  • memory/1752-66-0x0000000000000000-mapping.dmp
  • memory/1776-97-0x0000000000000000-mapping.dmp
  • memory/1944-56-0x0000000000000000-mapping.dmp
  • memory/1964-54-0x00000000756E1000-0x00000000756E3000-memory.dmp
    Filesize

    8KB