Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2023 01:12

General

  • Target

    ClientCrack.exe

  • Size

    296KB

  • MD5

    bc5462da689944a5426fa4d933dc5fdf

  • SHA1

    8a6ab3b4ed020b4d3b60d4aa4251d2f51f5d6308

  • SHA256

    d8276830ad97867bf13dc04ae0190e2c3dbcb14c08b5fe30e609ef817b110ca3

  • SHA512

    35abd0160381c6c16a011ce77d8abc8d5545e1dc9ea2928e4074b9967f97404cbe134b4d3acd90dd8ff9ff2e7f86cf57678d800c975650b6f7176347e5952cf7

  • SSDEEP

    6144:NMH4eWseynVKsxUthS/nOS2J0zx9F4/Gksi+4CeeTf8X8FQ1M:NMH4sn81Par0019F4/GkudRTf8SQ1M

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

elensias.duckdns.org:0

Attributes
  • communication_password

    56c82ccd658e09e829f16bb99457bcbc

  • install_dir

    gnugnu

  • install_file

    chorme.exe

  • tor_process

    tori

Signatures

  • BitRAT

    BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • VMProtect packed file 41 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ClientCrack.exe
    "C:\Users\Admin\AppData\Local\Temp\ClientCrack.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1748
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionExtension 'exe'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:556
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\System32\explorer.exe" C:\Users\Admin\AppData\Local\Temp\crack0.exe
      2⤵
        PID:340
      • C:\Windows\SysWOW64\explorer.exe
        "C:\Windows\System32\explorer.exe" C:\Users\Admin\AppData\Local\Temp\crack1.exe
        2⤵
          PID:2008
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:1340
        • C:\Users\Admin\AppData\Local\Temp\crack0.exe
          "C:\Users\Admin\AppData\Local\Temp\crack0.exe"
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1936
          • C:\Users\Admin\AppData\Local\d592f05e\tor\tori.exe
            "C:\Users\Admin\AppData\Local\d592f05e\tor\tori.exe" -f torrc
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1484
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
        1⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1944
        • C:\Users\Admin\AppData\Local\Temp\crack1.exe
          "C:\Users\Admin\AppData\Local\Temp\crack1.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1768
          • C:\Windows\System32\conhost.exe
            "C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\crack1.exe"
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:552
            • C:\Windows\System32\cmd.exe
              "cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "bing" /tr "C:\Users\Admin\AppData\Roaming\Windows\bing.exe"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2032
              • C:\Windows\system32\schtasks.exe
                schtasks /create /f /sc onlogon /rl highest /tn "bing" /tr "C:\Users\Admin\AppData\Roaming\Windows\bing.exe"
                5⤵
                • Creates scheduled task(s)
                PID:1732
            • C:\Windows\System32\cmd.exe
              "cmd" cmd /c "C:\Users\Admin\AppData\Roaming\Windows\bing.exe"
              4⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1988
              • C:\Users\Admin\AppData\Roaming\Windows\bing.exe
                C:\Users\Admin\AppData\Roaming\Windows\bing.exe
                5⤵
                • Executes dropped EXE
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:1308
                • C:\Windows\System32\conhost.exe
                  "C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Roaming\Windows\bing.exe"
                  6⤵
                  • Loads dropped DLL
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1028
                  • C:\Users\Admin\AppData\Roaming\Windows\Telemetry\sihost64.exe
                    "C:\Users\Admin\AppData\Roaming\Windows\Telemetry\sihost64.exe"
                    7⤵
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:1912
                    • C:\Windows\System32\conhost.exe
                      "C:\Windows\System32\conhost.exe" "lnuosiphlfyb"
                      8⤵
                        PID:1616
                    • C:\Windows\System32\notepad.exe
                      C:\Windows\System32\notepad.exe lljehtglibindjy0 aL9rWj13blqq3tQ6pq9BT64AEBTmmOZm2QnBzGRIrKz4lH8cILU8ujdaoXpBms5pkMWER+EsTdhKTKqT8IEqTdy5Kemgk9NU/QdLsz65HcO+0zUEL/qHUiO8LrJXiqBRJ8D62RHLpVH/QJcfgroK8jHRHPvV0tHEkzAcBKCqEYVFgUZRAEKGt21cyAzobSI2kfeIY1RxqTQoAcbo2GvrIBa6BxgzceV5W53VR8rYo72guwpY3zJmbSRhZPH4j5Ph36z98pZayAo8raem1y71UJy9Vt6U7uiIc1PpV/Yw5T+VI23SG0mix/ww0sTVWs73+a9XuuRmVA4TV7esDGm4ow==
                      7⤵
                        PID:1832

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\crack0.exe

            Filesize

            12.7MB

            MD5

            f8e1807b535ba0de2341531d3d1ddfa0

            SHA1

            86a68a4647ac27eaea4cea65b49f2b9aa6edf51f

            SHA256

            3cfb801aec4c94aa04f67808f6f66507b331c6bdaa526f82469ea5960987ab87

            SHA512

            f48154c84f6add19d42aa17e500700884e55d2e5093759a35789f27dd32ca0588010223d21327a210e3bbc016b659da54db4409accd8ec2c4257734e8a9dcd38

          • C:\Users\Admin\AppData\Local\Temp\crack0.exe

            Filesize

            12.7MB

            MD5

            f8e1807b535ba0de2341531d3d1ddfa0

            SHA1

            86a68a4647ac27eaea4cea65b49f2b9aa6edf51f

            SHA256

            3cfb801aec4c94aa04f67808f6f66507b331c6bdaa526f82469ea5960987ab87

            SHA512

            f48154c84f6add19d42aa17e500700884e55d2e5093759a35789f27dd32ca0588010223d21327a210e3bbc016b659da54db4409accd8ec2c4257734e8a9dcd38

          • C:\Users\Admin\AppData\Local\Temp\crack1.exe

            Filesize

            7.2MB

            MD5

            7f550bd8d4691653bf6409cea54ec42b

            SHA1

            2a5e545774952143f99b9f73e08d11d0bf591600

            SHA256

            84cbbe450bb73f5b4b3b9d553e9cbe088115cafa07cdbcd7f11623c8c71cbec4

            SHA512

            2fcc920f89ae821ffa52b2fac74d2419b386beaf8453b78a0581b0bb7864d9b691fa9f23ba8e186465b4a96155476b8e4be99025c85b7e68b4883225be2ea978

          • C:\Users\Admin\AppData\Local\Temp\crack1.exe

            Filesize

            7.2MB

            MD5

            7f550bd8d4691653bf6409cea54ec42b

            SHA1

            2a5e545774952143f99b9f73e08d11d0bf591600

            SHA256

            84cbbe450bb73f5b4b3b9d553e9cbe088115cafa07cdbcd7f11623c8c71cbec4

            SHA512

            2fcc920f89ae821ffa52b2fac74d2419b386beaf8453b78a0581b0bb7864d9b691fa9f23ba8e186465b4a96155476b8e4be99025c85b7e68b4883225be2ea978

          • C:\Users\Admin\AppData\Local\d592f05e\tor\data\cached-microdesc-consensus.tmp

            Filesize

            2.3MB

            MD5

            dc127fc92376209038ab045edad7d046

            SHA1

            353a10afa5ed148807f30f0b43f1b9265ba12c82

            SHA256

            3bd1ec8a7212e38c620fe151112efcf7ca70a5eddb4f967c152a89e7ba3ab776

            SHA512

            e5ece67145962221f393a4cb793c542c8ff4bd8bd10155283a5f5b714db30f014b81b3c522abc8d826f5745edf625c4ddff838b5ca5e7626183a266b414d33dd

          • C:\Users\Admin\AppData\Local\d592f05e\tor\data\cached-microdescs.new

            Filesize

            6.1MB

            MD5

            17bc7f95c652b53dcb269e86ab12e982

            SHA1

            3e3077ff94c92b70f31f22813d7fb1e080a6da84

            SHA256

            dcac6d7378810bab04fc0bb6aa49800af6250b898cb1a041993d796b2d72dec3

            SHA512

            22a264c5c1d1b1e2e08d56bb4ebb783059b91e6c334c1d279bbdaae8e35711f39b65c6d289e2ae3245116406d6bd609a34aaa8335ba16f81c436ea38f80dc1b2

          • C:\Users\Admin\AppData\Local\d592f05e\tor\libcrypto-1_1.dll

            Filesize

            3.1MB

            MD5

            afc4a9e05ffc9ec14c2ddeb1589fe6e2

            SHA1

            244c6fb7428fba7666d9c89eb8d6ae939a70f408

            SHA256

            6789ba515f6593f65104c6057d93f5c0b645aa860695d5bfbfc5d97beb301068

            SHA512

            9d167f5823701258d0f27617735a1b82c6be20e52f67cb1d83d592092d0e3455908c6fb916999c3377204eec8c92c40a6bd9826791976166665b6fae64d26f0c

          • C:\Users\Admin\AppData\Local\d592f05e\tor\libevent-2-1-6.dll

            Filesize

            853KB

            MD5

            f690912e8b86ecc237287bbfa9f073c3

            SHA1

            3df729a3c7135f9d1f46b83c18258f0131a1e788

            SHA256

            60b6ceac938a821c47a5160c599fd50bc7451d42d7108960077a20dabfcadb9d

            SHA512

            3dc3b000a173458e839c5cf0d614830435e602f60824e850640ae1a4cfe7dda1a331c06147bf9c2c1932da545c47e78625b89883439b2f2cd4eb31b80a593fa1

          • C:\Users\Admin\AppData\Local\d592f05e\tor\libgcc_s_sjlj-1.dll

            Filesize

            1.1MB

            MD5

            c6a0c7eca293848a58046c85309b20fb

            SHA1

            71c8ffa0956ba04e5297dac50a44a2d7382c5346

            SHA256

            90b54eb822c63772aa72153dcb2d3ebca30604b6b495564983160264595a636b

            SHA512

            003aeb3a5fc417b291ad09a1440a953c8f277721224df96a8341806a4c65a91cb8232311a47f21a4d5263c83ccbfd046ac39877c5b4d165ad6a941b34b2c4fd2

          • C:\Users\Admin\AppData\Local\d592f05e\tor\libssl-1_1.dll

            Filesize

            926KB

            MD5

            8881bb3e500555ae7368656d197d246c

            SHA1

            34bdfc1b32473e50525832565e4ae83abdd174a8

            SHA256

            e626fed2df16fad9a1fbe7a71c15bb2280fbae139736f44534bbb7cc69ba1354

            SHA512

            e17217e55c93e0192a398631c068e268d63bea236217748958827b9b83995c0103521b35cad8204cd9a9b8f2f4868e333c99834aabab40b316563c8a28efada3

          • C:\Users\Admin\AppData\Local\d592f05e\tor\libssp-0.dll

            Filesize

            262KB

            MD5

            b1a9a0def34f550003c88212af8059a3

            SHA1

            4a278fbea710e2bd74124ee6be0cb0556d8d72b8

            SHA256

            96ae486b556532c5132e82c23fde334c044e84791e362b21bc0fb31c6b02bf08

            SHA512

            8742a553189711e06d28c2f9eac9aae8d931e67551391dfe58647457f8d868d52136e842ac9a7780ebd91489d2ce0695bbca0ab71829fc7f7d26d85b1f50aeec

          • C:\Users\Admin\AppData\Local\d592f05e\tor\libwinpthread-1.dll

            Filesize

            522KB

            MD5

            99e20eea1d13e718eb0fe9d61659c87f

            SHA1

            4ee7eb374a027b06190bfe8d7d444d25a955a5a2

            SHA256

            c99eb9c243c18fe9363ed232fed3ef4f171a90be2a6b957f9a480f5eaf66b4ca

            SHA512

            5eeae53cc852e4134cfdfca2454b7b8489a0a5d5a4100fc68aa97302197ac8e6558a5ecefd3decade2d3e5a051d6bcf50c4cd0713dfd614c11fea9cd542af33c

          • C:\Users\Admin\AppData\Local\d592f05e\tor\tori.exe

            Filesize

            3.9MB

            MD5

            3fc87569e8650e052ad1a7dc78401612

            SHA1

            23f1be83903bac86251767eae6fbdc1057a7d4f7

            SHA256

            497f1f2860452b6e07d083a78e47844fb1a633ac00e1a14aa0ef1c72583f1f6a

            SHA512

            cc1870257003c5fdafadf005da94733327329ad9ec6bdd4ddd00ae80f1b2606bbb3861c2b58056ac2569c1508565b7d7e0ce14c054b8f43811427d04b5e244a8

          • C:\Users\Admin\AppData\Local\d592f05e\tor\tori.exe

            Filesize

            3.9MB

            MD5

            3fc87569e8650e052ad1a7dc78401612

            SHA1

            23f1be83903bac86251767eae6fbdc1057a7d4f7

            SHA256

            497f1f2860452b6e07d083a78e47844fb1a633ac00e1a14aa0ef1c72583f1f6a

            SHA512

            cc1870257003c5fdafadf005da94733327329ad9ec6bdd4ddd00ae80f1b2606bbb3861c2b58056ac2569c1508565b7d7e0ce14c054b8f43811427d04b5e244a8

          • C:\Users\Admin\AppData\Local\d592f05e\tor\torrc

            Filesize

            157B

            MD5

            bc51210e309cb373d77187933d0489a2

            SHA1

            883a463043d84c06e0bd74a643d44e242a15c2fb

            SHA256

            1fd03b78fcb73b54e3dd92dad89462805cc776a98536123020a95a01327dd0c7

            SHA512

            07819904adf60954b67405467314aa71382edc97656a740be262a263eb88bf995d242d579cf2bd34e917967189139d494864d971072b464dfca3f9db55ae4a52

          • C:\Users\Admin\AppData\Local\d592f05e\tor\zlib1.dll

            Filesize

            99KB

            MD5

            34dc3c1c076b690520ab198863fa0c86

            SHA1

            f092142507e9bb1679e22dec9dfe83a31c44c0c8

            SHA256

            d7445b008f464f48d0a6df5cca5552de790a113b77913221b08a41b5eebd0ba7

            SHA512

            1d7c499d00b3c81a8a990a83e00940882dd7794e6be38e713d00ced0a8687e0eb7fddaba690b3aed926f346818381e91c4f714d511502bc51739c4532457a460

          • C:\Users\Admin\AppData\Roaming\Windows\Telemetry\sihost64.exe

            Filesize

            30KB

            MD5

            8a67b24952c68ff2a4c7a59f1228640e

            SHA1

            508fb383a6285cfcbcd815a309d1cc3ce7b8a243

            SHA256

            6105a52b0f2f127137e97af929d5a1292c173f5239dcbe5a8bf7d5082d066ef6

            SHA512

            dc5af212a27691d1ae9553a10ca5ebaeec67764375d98e4a97f430bc364be132d34cd130443567e081055c86f071d254aee4720b332709b98ff6461e7a3b8d8e

          • C:\Users\Admin\AppData\Roaming\Windows\Telemetry\sihost64.exe

            Filesize

            30KB

            MD5

            8a67b24952c68ff2a4c7a59f1228640e

            SHA1

            508fb383a6285cfcbcd815a309d1cc3ce7b8a243

            SHA256

            6105a52b0f2f127137e97af929d5a1292c173f5239dcbe5a8bf7d5082d066ef6

            SHA512

            dc5af212a27691d1ae9553a10ca5ebaeec67764375d98e4a97f430bc364be132d34cd130443567e081055c86f071d254aee4720b332709b98ff6461e7a3b8d8e

          • C:\Users\Admin\AppData\Roaming\Windows\bing.exe

            Filesize

            7.2MB

            MD5

            7f550bd8d4691653bf6409cea54ec42b

            SHA1

            2a5e545774952143f99b9f73e08d11d0bf591600

            SHA256

            84cbbe450bb73f5b4b3b9d553e9cbe088115cafa07cdbcd7f11623c8c71cbec4

            SHA512

            2fcc920f89ae821ffa52b2fac74d2419b386beaf8453b78a0581b0bb7864d9b691fa9f23ba8e186465b4a96155476b8e4be99025c85b7e68b4883225be2ea978

          • C:\Users\Admin\AppData\Roaming\Windows\bing.exe

            Filesize

            7.2MB

            MD5

            7f550bd8d4691653bf6409cea54ec42b

            SHA1

            2a5e545774952143f99b9f73e08d11d0bf591600

            SHA256

            84cbbe450bb73f5b4b3b9d553e9cbe088115cafa07cdbcd7f11623c8c71cbec4

            SHA512

            2fcc920f89ae821ffa52b2fac74d2419b386beaf8453b78a0581b0bb7864d9b691fa9f23ba8e186465b4a96155476b8e4be99025c85b7e68b4883225be2ea978

          • \Users\Admin\AppData\Local\Temp\crack1.exe

            Filesize

            7.2MB

            MD5

            7f550bd8d4691653bf6409cea54ec42b

            SHA1

            2a5e545774952143f99b9f73e08d11d0bf591600

            SHA256

            84cbbe450bb73f5b4b3b9d553e9cbe088115cafa07cdbcd7f11623c8c71cbec4

            SHA512

            2fcc920f89ae821ffa52b2fac74d2419b386beaf8453b78a0581b0bb7864d9b691fa9f23ba8e186465b4a96155476b8e4be99025c85b7e68b4883225be2ea978

          • \Users\Admin\AppData\Local\Temp\crack1.exe

            Filesize

            7.2MB

            MD5

            7f550bd8d4691653bf6409cea54ec42b

            SHA1

            2a5e545774952143f99b9f73e08d11d0bf591600

            SHA256

            84cbbe450bb73f5b4b3b9d553e9cbe088115cafa07cdbcd7f11623c8c71cbec4

            SHA512

            2fcc920f89ae821ffa52b2fac74d2419b386beaf8453b78a0581b0bb7864d9b691fa9f23ba8e186465b4a96155476b8e4be99025c85b7e68b4883225be2ea978

          • \Users\Admin\AppData\Local\d592f05e\tor\libcrypto-1_1.dll

            Filesize

            3.1MB

            MD5

            afc4a9e05ffc9ec14c2ddeb1589fe6e2

            SHA1

            244c6fb7428fba7666d9c89eb8d6ae939a70f408

            SHA256

            6789ba515f6593f65104c6057d93f5c0b645aa860695d5bfbfc5d97beb301068

            SHA512

            9d167f5823701258d0f27617735a1b82c6be20e52f67cb1d83d592092d0e3455908c6fb916999c3377204eec8c92c40a6bd9826791976166665b6fae64d26f0c

          • \Users\Admin\AppData\Local\d592f05e\tor\libevent-2-1-6.dll

            Filesize

            853KB

            MD5

            f690912e8b86ecc237287bbfa9f073c3

            SHA1

            3df729a3c7135f9d1f46b83c18258f0131a1e788

            SHA256

            60b6ceac938a821c47a5160c599fd50bc7451d42d7108960077a20dabfcadb9d

            SHA512

            3dc3b000a173458e839c5cf0d614830435e602f60824e850640ae1a4cfe7dda1a331c06147bf9c2c1932da545c47e78625b89883439b2f2cd4eb31b80a593fa1

          • \Users\Admin\AppData\Local\d592f05e\tor\libgcc_s_sjlj-1.dll

            Filesize

            1.1MB

            MD5

            c6a0c7eca293848a58046c85309b20fb

            SHA1

            71c8ffa0956ba04e5297dac50a44a2d7382c5346

            SHA256

            90b54eb822c63772aa72153dcb2d3ebca30604b6b495564983160264595a636b

            SHA512

            003aeb3a5fc417b291ad09a1440a953c8f277721224df96a8341806a4c65a91cb8232311a47f21a4d5263c83ccbfd046ac39877c5b4d165ad6a941b34b2c4fd2

          • \Users\Admin\AppData\Local\d592f05e\tor\libssl-1_1.dll

            Filesize

            926KB

            MD5

            8881bb3e500555ae7368656d197d246c

            SHA1

            34bdfc1b32473e50525832565e4ae83abdd174a8

            SHA256

            e626fed2df16fad9a1fbe7a71c15bb2280fbae139736f44534bbb7cc69ba1354

            SHA512

            e17217e55c93e0192a398631c068e268d63bea236217748958827b9b83995c0103521b35cad8204cd9a9b8f2f4868e333c99834aabab40b316563c8a28efada3

          • \Users\Admin\AppData\Local\d592f05e\tor\libssp-0.dll

            Filesize

            262KB

            MD5

            b1a9a0def34f550003c88212af8059a3

            SHA1

            4a278fbea710e2bd74124ee6be0cb0556d8d72b8

            SHA256

            96ae486b556532c5132e82c23fde334c044e84791e362b21bc0fb31c6b02bf08

            SHA512

            8742a553189711e06d28c2f9eac9aae8d931e67551391dfe58647457f8d868d52136e842ac9a7780ebd91489d2ce0695bbca0ab71829fc7f7d26d85b1f50aeec

          • \Users\Admin\AppData\Local\d592f05e\tor\libwinpthread-1.dll

            Filesize

            522KB

            MD5

            99e20eea1d13e718eb0fe9d61659c87f

            SHA1

            4ee7eb374a027b06190bfe8d7d444d25a955a5a2

            SHA256

            c99eb9c243c18fe9363ed232fed3ef4f171a90be2a6b957f9a480f5eaf66b4ca

            SHA512

            5eeae53cc852e4134cfdfca2454b7b8489a0a5d5a4100fc68aa97302197ac8e6558a5ecefd3decade2d3e5a051d6bcf50c4cd0713dfd614c11fea9cd542af33c

          • \Users\Admin\AppData\Local\d592f05e\tor\tori.exe

            Filesize

            3.9MB

            MD5

            3fc87569e8650e052ad1a7dc78401612

            SHA1

            23f1be83903bac86251767eae6fbdc1057a7d4f7

            SHA256

            497f1f2860452b6e07d083a78e47844fb1a633ac00e1a14aa0ef1c72583f1f6a

            SHA512

            cc1870257003c5fdafadf005da94733327329ad9ec6bdd4ddd00ae80f1b2606bbb3861c2b58056ac2569c1508565b7d7e0ce14c054b8f43811427d04b5e244a8

          • \Users\Admin\AppData\Local\d592f05e\tor\tori.exe

            Filesize

            3.9MB

            MD5

            3fc87569e8650e052ad1a7dc78401612

            SHA1

            23f1be83903bac86251767eae6fbdc1057a7d4f7

            SHA256

            497f1f2860452b6e07d083a78e47844fb1a633ac00e1a14aa0ef1c72583f1f6a

            SHA512

            cc1870257003c5fdafadf005da94733327329ad9ec6bdd4ddd00ae80f1b2606bbb3861c2b58056ac2569c1508565b7d7e0ce14c054b8f43811427d04b5e244a8

          • \Users\Admin\AppData\Local\d592f05e\tor\zlib1.dll

            Filesize

            99KB

            MD5

            34dc3c1c076b690520ab198863fa0c86

            SHA1

            f092142507e9bb1679e22dec9dfe83a31c44c0c8

            SHA256

            d7445b008f464f48d0a6df5cca5552de790a113b77913221b08a41b5eebd0ba7

            SHA512

            1d7c499d00b3c81a8a990a83e00940882dd7794e6be38e713d00ced0a8687e0eb7fddaba690b3aed926f346818381e91c4f714d511502bc51739c4532457a460

          • \Users\Admin\AppData\Roaming\Windows\Telemetry\sihost64.exe

            Filesize

            30KB

            MD5

            8a67b24952c68ff2a4c7a59f1228640e

            SHA1

            508fb383a6285cfcbcd815a309d1cc3ce7b8a243

            SHA256

            6105a52b0f2f127137e97af929d5a1292c173f5239dcbe5a8bf7d5082d066ef6

            SHA512

            dc5af212a27691d1ae9553a10ca5ebaeec67764375d98e4a97f430bc364be132d34cd130443567e081055c86f071d254aee4720b332709b98ff6461e7a3b8d8e

          • \Users\Admin\AppData\Roaming\Windows\Telemetry\sihost64.exe

            Filesize

            30KB

            MD5

            8a67b24952c68ff2a4c7a59f1228640e

            SHA1

            508fb383a6285cfcbcd815a309d1cc3ce7b8a243

            SHA256

            6105a52b0f2f127137e97af929d5a1292c173f5239dcbe5a8bf7d5082d066ef6

            SHA512

            dc5af212a27691d1ae9553a10ca5ebaeec67764375d98e4a97f430bc364be132d34cd130443567e081055c86f071d254aee4720b332709b98ff6461e7a3b8d8e

          • \Users\Admin\AppData\Roaming\Windows\bing.exe

            Filesize

            7.2MB

            MD5

            7f550bd8d4691653bf6409cea54ec42b

            SHA1

            2a5e545774952143f99b9f73e08d11d0bf591600

            SHA256

            84cbbe450bb73f5b4b3b9d553e9cbe088115cafa07cdbcd7f11623c8c71cbec4

            SHA512

            2fcc920f89ae821ffa52b2fac74d2419b386beaf8453b78a0581b0bb7864d9b691fa9f23ba8e186465b4a96155476b8e4be99025c85b7e68b4883225be2ea978

          • \Users\Admin\AppData\Roaming\Windows\bing.exe

            Filesize

            7.2MB

            MD5

            7f550bd8d4691653bf6409cea54ec42b

            SHA1

            2a5e545774952143f99b9f73e08d11d0bf591600

            SHA256

            84cbbe450bb73f5b4b3b9d553e9cbe088115cafa07cdbcd7f11623c8c71cbec4

            SHA512

            2fcc920f89ae821ffa52b2fac74d2419b386beaf8453b78a0581b0bb7864d9b691fa9f23ba8e186465b4a96155476b8e4be99025c85b7e68b4883225be2ea978

          • memory/552-142-0x000000001B2A0000-0x000000001B502000-memory.dmp

            Filesize

            2.4MB

          • memory/552-143-0x0000000002220000-0x00000000022A0000-memory.dmp

            Filesize

            512KB

          • memory/552-146-0x0000000002220000-0x00000000022A0000-memory.dmp

            Filesize

            512KB

          • memory/552-151-0x0000000002220000-0x00000000022A0000-memory.dmp

            Filesize

            512KB

          • memory/552-176-0x0000000002220000-0x00000000022A0000-memory.dmp

            Filesize

            512KB

          • memory/552-173-0x0000000002220000-0x00000000022A0000-memory.dmp

            Filesize

            512KB

          • memory/552-136-0x00000000000A0000-0x0000000000302000-memory.dmp

            Filesize

            2.4MB

          • memory/556-63-0x00000000022B0000-0x00000000022F0000-memory.dmp

            Filesize

            256KB

          • memory/556-64-0x00000000022B0000-0x00000000022F0000-memory.dmp

            Filesize

            256KB

          • memory/1028-228-0x000000001B150000-0x000000001B1D0000-memory.dmp

            Filesize

            512KB

          • memory/1028-229-0x000000001B150000-0x000000001B1D0000-memory.dmp

            Filesize

            512KB

          • memory/1028-227-0x000000001B150000-0x000000001B1D0000-memory.dmp

            Filesize

            512KB

          • memory/1616-251-0x000000001AE40000-0x000000001AEC0000-memory.dmp

            Filesize

            512KB

          • memory/1616-315-0x000000001AE40000-0x000000001AEC0000-memory.dmp

            Filesize

            512KB

          • memory/1616-245-0x00000000001D0000-0x00000000001D6000-memory.dmp

            Filesize

            24KB

          • memory/1616-316-0x000000001AE40000-0x000000001AEC0000-memory.dmp

            Filesize

            512KB

          • memory/1616-256-0x000000001AE40000-0x000000001AEC0000-memory.dmp

            Filesize

            512KB

          • memory/1616-255-0x000000001AE40000-0x000000001AEC0000-memory.dmp

            Filesize

            512KB

          • memory/1616-317-0x000000001AE40000-0x000000001AEC0000-memory.dmp

            Filesize

            512KB

          • memory/1616-249-0x0000000000060000-0x0000000000066000-memory.dmp

            Filesize

            24KB

          • memory/1616-318-0x000000001AE40000-0x000000001AEC0000-memory.dmp

            Filesize

            512KB

          • memory/1616-250-0x000000001AE40000-0x000000001AEC0000-memory.dmp

            Filesize

            512KB

          • memory/1748-56-0x00000000095B0000-0x00000000095F0000-memory.dmp

            Filesize

            256KB

          • memory/1748-66-0x00000000095B0000-0x00000000095F0000-memory.dmp

            Filesize

            256KB

          • memory/1748-57-0x00000000095B0000-0x00000000095F0000-memory.dmp

            Filesize

            256KB

          • memory/1748-55-0x0000000000200000-0x0000000000201000-memory.dmp

            Filesize

            4KB

          • memory/1748-58-0x0000000000200000-0x0000000000201000-memory.dmp

            Filesize

            4KB

          • memory/1748-59-0x0000000000210000-0x0000000000216000-memory.dmp

            Filesize

            24KB

          • memory/1748-54-0x0000000000C10000-0x0000000000C92000-memory.dmp

            Filesize

            520KB

          • memory/1748-60-0x00000000095B0000-0x00000000095F0000-memory.dmp

            Filesize

            256KB

          • memory/1748-67-0x00000000095B0000-0x00000000095F0000-memory.dmp

            Filesize

            256KB

          • memory/1748-65-0x0000000000200000-0x0000000000201000-memory.dmp

            Filesize

            4KB

          • memory/1768-129-0x0000000077AA0000-0x0000000077AA2000-memory.dmp

            Filesize

            8KB

          • memory/1768-133-0x0000000000400000-0x00000000010B4000-memory.dmp

            Filesize

            12.7MB

          • memory/1768-132-0x0000000077AB0000-0x0000000077AB2000-memory.dmp

            Filesize

            8KB

          • memory/1768-131-0x0000000077AB0000-0x0000000077AB2000-memory.dmp

            Filesize

            8KB

          • memory/1768-130-0x0000000077AB0000-0x0000000077AB2000-memory.dmp

            Filesize

            8KB

          • memory/1768-127-0x0000000077AA0000-0x0000000077AA2000-memory.dmp

            Filesize

            8KB

          • memory/1768-128-0x0000000077AA0000-0x0000000077AA2000-memory.dmp

            Filesize

            8KB

          • memory/1832-288-0x0000000140000000-0x0000000140829000-memory.dmp

            Filesize

            8.2MB

          • memory/1832-319-0x0000000140000000-0x0000000140829000-memory.dmp

            Filesize

            8.2MB

          • memory/1936-103-0x0000000000400000-0x000000000224E000-memory.dmp

            Filesize

            30.3MB

          • memory/1936-100-0x0000000000400000-0x000000000224E000-memory.dmp

            Filesize

            30.3MB

          • memory/1936-139-0x0000000000400000-0x000000000224E000-memory.dmp

            Filesize

            30.3MB

          • memory/1936-126-0x0000000000400000-0x000000000224E000-memory.dmp

            Filesize

            30.3MB

          • memory/1936-125-0x0000000000400000-0x000000000224E000-memory.dmp

            Filesize

            30.3MB

          • memory/1936-124-0x0000000000400000-0x000000000224E000-memory.dmp

            Filesize

            30.3MB

          • memory/1936-123-0x0000000000400000-0x000000000224E000-memory.dmp

            Filesize

            30.3MB

          • memory/1936-121-0x0000000000400000-0x000000000224E000-memory.dmp

            Filesize

            30.3MB

          • memory/1936-117-0x0000000000400000-0x000000000224E000-memory.dmp

            Filesize

            30.3MB

          • memory/1936-116-0x0000000000400000-0x000000000224E000-memory.dmp

            Filesize

            30.3MB

          • memory/1936-115-0x0000000000400000-0x000000000224E000-memory.dmp

            Filesize

            30.3MB

          • memory/1936-113-0x0000000000400000-0x000000000224E000-memory.dmp

            Filesize

            30.3MB

          • memory/1936-112-0x0000000000400000-0x000000000224E000-memory.dmp

            Filesize

            30.3MB

          • memory/1936-111-0x0000000000400000-0x000000000224E000-memory.dmp

            Filesize

            30.3MB

          • memory/1936-110-0x0000000000400000-0x000000000224E000-memory.dmp

            Filesize

            30.3MB

          • memory/1936-109-0x0000000000400000-0x000000000224E000-memory.dmp

            Filesize

            30.3MB

          • memory/1936-108-0x0000000000400000-0x000000000224E000-memory.dmp

            Filesize

            30.3MB

          • memory/1936-107-0x0000000000400000-0x000000000224E000-memory.dmp

            Filesize

            30.3MB

          • memory/1936-106-0x0000000000400000-0x000000000224E000-memory.dmp

            Filesize

            30.3MB

          • memory/1936-105-0x0000000000400000-0x000000000224E000-memory.dmp

            Filesize

            30.3MB

          • memory/1936-137-0x0000000000400000-0x000000000224E000-memory.dmp

            Filesize

            30.3MB

          • memory/1936-102-0x0000000000400000-0x000000000224E000-memory.dmp

            Filesize

            30.3MB

          • memory/1936-101-0x0000000000400000-0x000000000224E000-memory.dmp

            Filesize

            30.3MB

          • memory/1936-138-0x0000000000400000-0x000000000224E000-memory.dmp

            Filesize

            30.3MB

          • memory/1936-99-0x0000000000400000-0x000000000224E000-memory.dmp

            Filesize

            30.3MB

          • memory/1936-98-0x0000000000400000-0x000000000224E000-memory.dmp

            Filesize

            30.3MB

          • memory/1936-95-0x0000000000400000-0x000000000224E000-memory.dmp

            Filesize

            30.3MB

          • memory/1936-94-0x0000000002270000-0x0000000002271000-memory.dmp

            Filesize

            4KB

          • memory/1936-93-0x0000000002270000-0x0000000002271000-memory.dmp

            Filesize

            4KB

          • memory/1936-92-0x0000000002270000-0x0000000002271000-memory.dmp

            Filesize

            4KB

          • memory/1936-91-0x0000000002260000-0x0000000002261000-memory.dmp

            Filesize

            4KB

          • memory/1936-90-0x0000000002260000-0x0000000002261000-memory.dmp

            Filesize

            4KB

          • memory/1936-89-0x0000000002260000-0x0000000002261000-memory.dmp

            Filesize

            4KB

          • memory/1936-88-0x0000000002250000-0x0000000002251000-memory.dmp

            Filesize

            4KB

          • memory/1936-87-0x0000000002250000-0x0000000002251000-memory.dmp

            Filesize

            4KB

          • memory/1936-85-0x00000000003F0000-0x00000000003F1000-memory.dmp

            Filesize

            4KB

          • memory/1936-84-0x00000000003F0000-0x00000000003F1000-memory.dmp

            Filesize

            4KB

          • memory/1936-82-0x0000000000250000-0x0000000000251000-memory.dmp

            Filesize

            4KB

          • memory/1936-81-0x0000000000250000-0x0000000000251000-memory.dmp

            Filesize

            4KB

          • memory/1936-79-0x0000000000240000-0x0000000000241000-memory.dmp

            Filesize

            4KB

          • memory/1936-78-0x0000000000240000-0x0000000000241000-memory.dmp

            Filesize

            4KB

          • memory/1936-76-0x0000000000230000-0x0000000000231000-memory.dmp

            Filesize

            4KB

          • memory/1936-75-0x0000000000230000-0x0000000000231000-memory.dmp

            Filesize

            4KB

          • memory/1936-74-0x0000000000230000-0x0000000000231000-memory.dmp

            Filesize

            4KB

          • memory/1936-73-0x0000000000220000-0x0000000000221000-memory.dmp

            Filesize

            4KB

          • memory/1936-72-0x0000000000220000-0x0000000000221000-memory.dmp

            Filesize

            4KB

          • memory/1936-71-0x0000000000220000-0x0000000000221000-memory.dmp

            Filesize

            4KB

          • memory/1936-135-0x0000000000400000-0x000000000224E000-memory.dmp

            Filesize

            30.3MB