Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-06-2023 01:12

General

  • Target

    ClientCrack.exe

  • Size

    296KB

  • MD5

    bc5462da689944a5426fa4d933dc5fdf

  • SHA1

    8a6ab3b4ed020b4d3b60d4aa4251d2f51f5d6308

  • SHA256

    d8276830ad97867bf13dc04ae0190e2c3dbcb14c08b5fe30e609ef817b110ca3

  • SHA512

    35abd0160381c6c16a011ce77d8abc8d5545e1dc9ea2928e4074b9967f97404cbe134b4d3acd90dd8ff9ff2e7f86cf57678d800c975650b6f7176347e5952cf7

  • SSDEEP

    6144:NMH4eWseynVKsxUthS/nOS2J0zx9F4/Gksi+4CeeTf8X8FQ1M:NMH4sn81Par0019F4/GkudRTf8SQ1M

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

elensias.duckdns.org:0

Attributes
  • communication_password

    56c82ccd658e09e829f16bb99457bcbc

  • install_dir

    gnugnu

  • install_file

    chorme.exe

  • tor_process

    tori

Signatures

  • BitRAT

    BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 2 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 8 IoCs
  • VMProtect packed file 47 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 36 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ClientCrack.exe
    "C:\Users\Admin\AppData\Local\Temp\ClientCrack.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1716
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -Command Add-MpPreference -ExclusionExtension 'exe'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1336
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\System32\explorer.exe" C:\Users\Admin\AppData\Local\Temp\crack0.exe
      2⤵
        PID:3464
      • C:\Windows\SysWOW64\explorer.exe
        "C:\Windows\System32\explorer.exe" C:\Users\Admin\AppData\Local\Temp\crack1.exe
        2⤵
          PID:4392
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:1424
        • C:\Users\Admin\AppData\Local\Temp\crack0.exe
          "C:\Users\Admin\AppData\Local\Temp\crack0.exe"
          2⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2124
          • C:\Users\Admin\AppData\Local\d592f05e\tor\tori.exe
            "C:\Users\Admin\AppData\Local\d592f05e\tor\tori.exe" -f torrc
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1236
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:948
        • C:\Users\Admin\AppData\Local\Temp\crack1.exe
          "C:\Users\Admin\AppData\Local\Temp\crack1.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2572
          • C:\Windows\System32\conhost.exe
            "C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\crack1.exe"
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1328
            • C:\Windows\System32\cmd.exe
              "cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "bing" /tr "C:\Users\Admin\AppData\Roaming\Windows\bing.exe"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2144
              • C:\Windows\system32\schtasks.exe
                schtasks /create /f /sc onlogon /rl highest /tn "bing" /tr "C:\Users\Admin\AppData\Roaming\Windows\bing.exe"
                5⤵
                • Creates scheduled task(s)
                PID:536
            • C:\Windows\System32\cmd.exe
              "cmd" cmd /c "C:\Users\Admin\AppData\Roaming\Windows\bing.exe"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:3888
              • C:\Users\Admin\AppData\Roaming\Windows\bing.exe
                C:\Users\Admin\AppData\Roaming\Windows\bing.exe
                5⤵
                • Executes dropped EXE
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:1368
                • C:\Windows\System32\conhost.exe
                  "C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Roaming\Windows\bing.exe"
                  6⤵
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1520
                  • C:\Users\Admin\AppData\Roaming\Windows\Telemetry\sihost64.exe
                    "C:\Users\Admin\AppData\Roaming\Windows\Telemetry\sihost64.exe"
                    7⤵
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:4344
                  • C:\Windows\System32\notepad.exe
                    C:\Windows\System32\notepad.exe lljehtglibindjy0 aL9rWj13blqq3tQ6pq9BT64AEBTmmOZm2QnBzGRIrKz4lH8cILU8ujdaoXpBms5pkMWER+EsTdhKTKqT8IEqTdy5Kemgk9NU/QdLsz65HcO+0zUEL/qHUiO8LrJXiqBRJ8D62RHLpVH/QJcfgroK8jHRHPvV0tHEkzAcBKCqEYVFgUZRAEKGt21cyAzobSI2kfeIY1RxqTQoAcbo2GvrIBa6BxgzceV5W53VR8rYo72guwpY3zJmbSRhZPH4j5Ph36z98pZayAo8raem1y71UJy9Vt6U7uiIc1PpV/Yw5T+VI23SG0mix/ww0sTVWs73+a9XuuRmVA4TV7esDGm4ow==
                    7⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4136
      • C:\Windows\System32\conhost.exe
        "C:\Windows\System32\conhost.exe" "lnuosiphlfyb"
        1⤵
          PID:2136

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\conhost.exe.log

          Filesize

          539B

          MD5

          8ee0f3b0e00f89f7523395bb72e9118b

          SHA1

          bec3fa36a1fb136551dc8157a4963ba5d2f957d4

          SHA256

          8c5f958972fce1812970a1f8da8ccef94a86663d42d13e296813673638a6b68b

          SHA512

          55f862beb42fa76ca118b2c76c92cb1e0a2586727c602645d0d4bd0e8f2120cfc2015f4333df67f3bd9f4eda8b9b399774461ab558f08312920a1489acf7a207

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wwiqn4jy.1ag.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Local\Temp\crack0.exe

          Filesize

          12.7MB

          MD5

          f8e1807b535ba0de2341531d3d1ddfa0

          SHA1

          86a68a4647ac27eaea4cea65b49f2b9aa6edf51f

          SHA256

          3cfb801aec4c94aa04f67808f6f66507b331c6bdaa526f82469ea5960987ab87

          SHA512

          f48154c84f6add19d42aa17e500700884e55d2e5093759a35789f27dd32ca0588010223d21327a210e3bbc016b659da54db4409accd8ec2c4257734e8a9dcd38

        • C:\Users\Admin\AppData\Local\Temp\crack0.exe

          Filesize

          12.7MB

          MD5

          f8e1807b535ba0de2341531d3d1ddfa0

          SHA1

          86a68a4647ac27eaea4cea65b49f2b9aa6edf51f

          SHA256

          3cfb801aec4c94aa04f67808f6f66507b331c6bdaa526f82469ea5960987ab87

          SHA512

          f48154c84f6add19d42aa17e500700884e55d2e5093759a35789f27dd32ca0588010223d21327a210e3bbc016b659da54db4409accd8ec2c4257734e8a9dcd38

        • C:\Users\Admin\AppData\Local\Temp\crack1.exe

          Filesize

          7.2MB

          MD5

          7f550bd8d4691653bf6409cea54ec42b

          SHA1

          2a5e545774952143f99b9f73e08d11d0bf591600

          SHA256

          84cbbe450bb73f5b4b3b9d553e9cbe088115cafa07cdbcd7f11623c8c71cbec4

          SHA512

          2fcc920f89ae821ffa52b2fac74d2419b386beaf8453b78a0581b0bb7864d9b691fa9f23ba8e186465b4a96155476b8e4be99025c85b7e68b4883225be2ea978

        • C:\Users\Admin\AppData\Local\Temp\crack1.exe

          Filesize

          7.2MB

          MD5

          7f550bd8d4691653bf6409cea54ec42b

          SHA1

          2a5e545774952143f99b9f73e08d11d0bf591600

          SHA256

          84cbbe450bb73f5b4b3b9d553e9cbe088115cafa07cdbcd7f11623c8c71cbec4

          SHA512

          2fcc920f89ae821ffa52b2fac74d2419b386beaf8453b78a0581b0bb7864d9b691fa9f23ba8e186465b4a96155476b8e4be99025c85b7e68b4883225be2ea978

        • C:\Users\Admin\AppData\Local\d592f05e\tor\data\cached-microdesc-consensus.tmp

          Filesize

          2.3MB

          MD5

          dc127fc92376209038ab045edad7d046

          SHA1

          353a10afa5ed148807f30f0b43f1b9265ba12c82

          SHA256

          3bd1ec8a7212e38c620fe151112efcf7ca70a5eddb4f967c152a89e7ba3ab776

          SHA512

          e5ece67145962221f393a4cb793c542c8ff4bd8bd10155283a5f5b714db30f014b81b3c522abc8d826f5745edf625c4ddff838b5ca5e7626183a266b414d33dd

        • C:\Users\Admin\AppData\Local\d592f05e\tor\data\cached-microdescs.new

          Filesize

          10.2MB

          MD5

          016ffabfc8afe78640cf83764384e770

          SHA1

          ba4ae60ec6891400dfcd945c62331cc388621772

          SHA256

          0e5cb93ff4f9d9e6db5f80485daf1b41181b9eb7abbc6f5669f6266abef5e0fc

          SHA512

          2c71e9b97bc222bf24120f08992e53b3321ac3af869dce0b9e325220fa01dc71e116da5b3f14d78dec3131e1b724546173b3e391a3c033194949630d75f13e5d

        • C:\Users\Admin\AppData\Local\d592f05e\tor\libcrypto-1_1.dll

          Filesize

          3.1MB

          MD5

          afc4a9e05ffc9ec14c2ddeb1589fe6e2

          SHA1

          244c6fb7428fba7666d9c89eb8d6ae939a70f408

          SHA256

          6789ba515f6593f65104c6057d93f5c0b645aa860695d5bfbfc5d97beb301068

          SHA512

          9d167f5823701258d0f27617735a1b82c6be20e52f67cb1d83d592092d0e3455908c6fb916999c3377204eec8c92c40a6bd9826791976166665b6fae64d26f0c

        • C:\Users\Admin\AppData\Local\d592f05e\tor\libcrypto-1_1.dll

          Filesize

          3.1MB

          MD5

          afc4a9e05ffc9ec14c2ddeb1589fe6e2

          SHA1

          244c6fb7428fba7666d9c89eb8d6ae939a70f408

          SHA256

          6789ba515f6593f65104c6057d93f5c0b645aa860695d5bfbfc5d97beb301068

          SHA512

          9d167f5823701258d0f27617735a1b82c6be20e52f67cb1d83d592092d0e3455908c6fb916999c3377204eec8c92c40a6bd9826791976166665b6fae64d26f0c

        • C:\Users\Admin\AppData\Local\d592f05e\tor\libcrypto-1_1.dll

          Filesize

          3.1MB

          MD5

          afc4a9e05ffc9ec14c2ddeb1589fe6e2

          SHA1

          244c6fb7428fba7666d9c89eb8d6ae939a70f408

          SHA256

          6789ba515f6593f65104c6057d93f5c0b645aa860695d5bfbfc5d97beb301068

          SHA512

          9d167f5823701258d0f27617735a1b82c6be20e52f67cb1d83d592092d0e3455908c6fb916999c3377204eec8c92c40a6bd9826791976166665b6fae64d26f0c

        • C:\Users\Admin\AppData\Local\d592f05e\tor\libevent-2-1-6.dll

          Filesize

          853KB

          MD5

          f690912e8b86ecc237287bbfa9f073c3

          SHA1

          3df729a3c7135f9d1f46b83c18258f0131a1e788

          SHA256

          60b6ceac938a821c47a5160c599fd50bc7451d42d7108960077a20dabfcadb9d

          SHA512

          3dc3b000a173458e839c5cf0d614830435e602f60824e850640ae1a4cfe7dda1a331c06147bf9c2c1932da545c47e78625b89883439b2f2cd4eb31b80a593fa1

        • C:\Users\Admin\AppData\Local\d592f05e\tor\libevent-2-1-6.dll

          Filesize

          853KB

          MD5

          f690912e8b86ecc237287bbfa9f073c3

          SHA1

          3df729a3c7135f9d1f46b83c18258f0131a1e788

          SHA256

          60b6ceac938a821c47a5160c599fd50bc7451d42d7108960077a20dabfcadb9d

          SHA512

          3dc3b000a173458e839c5cf0d614830435e602f60824e850640ae1a4cfe7dda1a331c06147bf9c2c1932da545c47e78625b89883439b2f2cd4eb31b80a593fa1

        • C:\Users\Admin\AppData\Local\d592f05e\tor\libgcc_s_sjlj-1.dll

          Filesize

          1.1MB

          MD5

          c6a0c7eca293848a58046c85309b20fb

          SHA1

          71c8ffa0956ba04e5297dac50a44a2d7382c5346

          SHA256

          90b54eb822c63772aa72153dcb2d3ebca30604b6b495564983160264595a636b

          SHA512

          003aeb3a5fc417b291ad09a1440a953c8f277721224df96a8341806a4c65a91cb8232311a47f21a4d5263c83ccbfd046ac39877c5b4d165ad6a941b34b2c4fd2

        • C:\Users\Admin\AppData\Local\d592f05e\tor\libgcc_s_sjlj-1.dll

          Filesize

          1.1MB

          MD5

          c6a0c7eca293848a58046c85309b20fb

          SHA1

          71c8ffa0956ba04e5297dac50a44a2d7382c5346

          SHA256

          90b54eb822c63772aa72153dcb2d3ebca30604b6b495564983160264595a636b

          SHA512

          003aeb3a5fc417b291ad09a1440a953c8f277721224df96a8341806a4c65a91cb8232311a47f21a4d5263c83ccbfd046ac39877c5b4d165ad6a941b34b2c4fd2

        • C:\Users\Admin\AppData\Local\d592f05e\tor\libssl-1_1.dll

          Filesize

          926KB

          MD5

          8881bb3e500555ae7368656d197d246c

          SHA1

          34bdfc1b32473e50525832565e4ae83abdd174a8

          SHA256

          e626fed2df16fad9a1fbe7a71c15bb2280fbae139736f44534bbb7cc69ba1354

          SHA512

          e17217e55c93e0192a398631c068e268d63bea236217748958827b9b83995c0103521b35cad8204cd9a9b8f2f4868e333c99834aabab40b316563c8a28efada3

        • C:\Users\Admin\AppData\Local\d592f05e\tor\libssl-1_1.dll

          Filesize

          926KB

          MD5

          8881bb3e500555ae7368656d197d246c

          SHA1

          34bdfc1b32473e50525832565e4ae83abdd174a8

          SHA256

          e626fed2df16fad9a1fbe7a71c15bb2280fbae139736f44534bbb7cc69ba1354

          SHA512

          e17217e55c93e0192a398631c068e268d63bea236217748958827b9b83995c0103521b35cad8204cd9a9b8f2f4868e333c99834aabab40b316563c8a28efada3

        • C:\Users\Admin\AppData\Local\d592f05e\tor\libssp-0.dll

          Filesize

          262KB

          MD5

          b1a9a0def34f550003c88212af8059a3

          SHA1

          4a278fbea710e2bd74124ee6be0cb0556d8d72b8

          SHA256

          96ae486b556532c5132e82c23fde334c044e84791e362b21bc0fb31c6b02bf08

          SHA512

          8742a553189711e06d28c2f9eac9aae8d931e67551391dfe58647457f8d868d52136e842ac9a7780ebd91489d2ce0695bbca0ab71829fc7f7d26d85b1f50aeec

        • C:\Users\Admin\AppData\Local\d592f05e\tor\libssp-0.dll

          Filesize

          262KB

          MD5

          b1a9a0def34f550003c88212af8059a3

          SHA1

          4a278fbea710e2bd74124ee6be0cb0556d8d72b8

          SHA256

          96ae486b556532c5132e82c23fde334c044e84791e362b21bc0fb31c6b02bf08

          SHA512

          8742a553189711e06d28c2f9eac9aae8d931e67551391dfe58647457f8d868d52136e842ac9a7780ebd91489d2ce0695bbca0ab71829fc7f7d26d85b1f50aeec

        • C:\Users\Admin\AppData\Local\d592f05e\tor\libwinpthread-1.dll

          Filesize

          522KB

          MD5

          99e20eea1d13e718eb0fe9d61659c87f

          SHA1

          4ee7eb374a027b06190bfe8d7d444d25a955a5a2

          SHA256

          c99eb9c243c18fe9363ed232fed3ef4f171a90be2a6b957f9a480f5eaf66b4ca

          SHA512

          5eeae53cc852e4134cfdfca2454b7b8489a0a5d5a4100fc68aa97302197ac8e6558a5ecefd3decade2d3e5a051d6bcf50c4cd0713dfd614c11fea9cd542af33c

        • C:\Users\Admin\AppData\Local\d592f05e\tor\libwinpthread-1.dll

          Filesize

          522KB

          MD5

          99e20eea1d13e718eb0fe9d61659c87f

          SHA1

          4ee7eb374a027b06190bfe8d7d444d25a955a5a2

          SHA256

          c99eb9c243c18fe9363ed232fed3ef4f171a90be2a6b957f9a480f5eaf66b4ca

          SHA512

          5eeae53cc852e4134cfdfca2454b7b8489a0a5d5a4100fc68aa97302197ac8e6558a5ecefd3decade2d3e5a051d6bcf50c4cd0713dfd614c11fea9cd542af33c

        • C:\Users\Admin\AppData\Local\d592f05e\tor\tori.exe

          Filesize

          3.9MB

          MD5

          3fc87569e8650e052ad1a7dc78401612

          SHA1

          23f1be83903bac86251767eae6fbdc1057a7d4f7

          SHA256

          497f1f2860452b6e07d083a78e47844fb1a633ac00e1a14aa0ef1c72583f1f6a

          SHA512

          cc1870257003c5fdafadf005da94733327329ad9ec6bdd4ddd00ae80f1b2606bbb3861c2b58056ac2569c1508565b7d7e0ce14c054b8f43811427d04b5e244a8

        • C:\Users\Admin\AppData\Local\d592f05e\tor\tori.exe

          Filesize

          3.9MB

          MD5

          3fc87569e8650e052ad1a7dc78401612

          SHA1

          23f1be83903bac86251767eae6fbdc1057a7d4f7

          SHA256

          497f1f2860452b6e07d083a78e47844fb1a633ac00e1a14aa0ef1c72583f1f6a

          SHA512

          cc1870257003c5fdafadf005da94733327329ad9ec6bdd4ddd00ae80f1b2606bbb3861c2b58056ac2569c1508565b7d7e0ce14c054b8f43811427d04b5e244a8

        • C:\Users\Admin\AppData\Local\d592f05e\tor\tori.exe

          Filesize

          3.9MB

          MD5

          3fc87569e8650e052ad1a7dc78401612

          SHA1

          23f1be83903bac86251767eae6fbdc1057a7d4f7

          SHA256

          497f1f2860452b6e07d083a78e47844fb1a633ac00e1a14aa0ef1c72583f1f6a

          SHA512

          cc1870257003c5fdafadf005da94733327329ad9ec6bdd4ddd00ae80f1b2606bbb3861c2b58056ac2569c1508565b7d7e0ce14c054b8f43811427d04b5e244a8

        • C:\Users\Admin\AppData\Local\d592f05e\tor\torrc

          Filesize

          157B

          MD5

          bc51210e309cb373d77187933d0489a2

          SHA1

          883a463043d84c06e0bd74a643d44e242a15c2fb

          SHA256

          1fd03b78fcb73b54e3dd92dad89462805cc776a98536123020a95a01327dd0c7

          SHA512

          07819904adf60954b67405467314aa71382edc97656a740be262a263eb88bf995d242d579cf2bd34e917967189139d494864d971072b464dfca3f9db55ae4a52

        • C:\Users\Admin\AppData\Local\d592f05e\tor\zlib1.dll

          Filesize

          99KB

          MD5

          34dc3c1c076b690520ab198863fa0c86

          SHA1

          f092142507e9bb1679e22dec9dfe83a31c44c0c8

          SHA256

          d7445b008f464f48d0a6df5cca5552de790a113b77913221b08a41b5eebd0ba7

          SHA512

          1d7c499d00b3c81a8a990a83e00940882dd7794e6be38e713d00ced0a8687e0eb7fddaba690b3aed926f346818381e91c4f714d511502bc51739c4532457a460

        • C:\Users\Admin\AppData\Local\d592f05e\tor\zlib1.dll

          Filesize

          99KB

          MD5

          34dc3c1c076b690520ab198863fa0c86

          SHA1

          f092142507e9bb1679e22dec9dfe83a31c44c0c8

          SHA256

          d7445b008f464f48d0a6df5cca5552de790a113b77913221b08a41b5eebd0ba7

          SHA512

          1d7c499d00b3c81a8a990a83e00940882dd7794e6be38e713d00ced0a8687e0eb7fddaba690b3aed926f346818381e91c4f714d511502bc51739c4532457a460

        • C:\Users\Admin\AppData\Roaming\Windows\Telemetry\sihost64.exe

          Filesize

          30KB

          MD5

          8a67b24952c68ff2a4c7a59f1228640e

          SHA1

          508fb383a6285cfcbcd815a309d1cc3ce7b8a243

          SHA256

          6105a52b0f2f127137e97af929d5a1292c173f5239dcbe5a8bf7d5082d066ef6

          SHA512

          dc5af212a27691d1ae9553a10ca5ebaeec67764375d98e4a97f430bc364be132d34cd130443567e081055c86f071d254aee4720b332709b98ff6461e7a3b8d8e

        • C:\Users\Admin\AppData\Roaming\Windows\Telemetry\sihost64.exe

          Filesize

          30KB

          MD5

          8a67b24952c68ff2a4c7a59f1228640e

          SHA1

          508fb383a6285cfcbcd815a309d1cc3ce7b8a243

          SHA256

          6105a52b0f2f127137e97af929d5a1292c173f5239dcbe5a8bf7d5082d066ef6

          SHA512

          dc5af212a27691d1ae9553a10ca5ebaeec67764375d98e4a97f430bc364be132d34cd130443567e081055c86f071d254aee4720b332709b98ff6461e7a3b8d8e

        • C:\Users\Admin\AppData\Roaming\Windows\Telemetry\sihost64.exe

          Filesize

          30KB

          MD5

          8a67b24952c68ff2a4c7a59f1228640e

          SHA1

          508fb383a6285cfcbcd815a309d1cc3ce7b8a243

          SHA256

          6105a52b0f2f127137e97af929d5a1292c173f5239dcbe5a8bf7d5082d066ef6

          SHA512

          dc5af212a27691d1ae9553a10ca5ebaeec67764375d98e4a97f430bc364be132d34cd130443567e081055c86f071d254aee4720b332709b98ff6461e7a3b8d8e

        • C:\Users\Admin\AppData\Roaming\Windows\bing.exe

          Filesize

          7.2MB

          MD5

          7f550bd8d4691653bf6409cea54ec42b

          SHA1

          2a5e545774952143f99b9f73e08d11d0bf591600

          SHA256

          84cbbe450bb73f5b4b3b9d553e9cbe088115cafa07cdbcd7f11623c8c71cbec4

          SHA512

          2fcc920f89ae821ffa52b2fac74d2419b386beaf8453b78a0581b0bb7864d9b691fa9f23ba8e186465b4a96155476b8e4be99025c85b7e68b4883225be2ea978

        • C:\Users\Admin\AppData\Roaming\Windows\bing.exe

          Filesize

          7.2MB

          MD5

          7f550bd8d4691653bf6409cea54ec42b

          SHA1

          2a5e545774952143f99b9f73e08d11d0bf591600

          SHA256

          84cbbe450bb73f5b4b3b9d553e9cbe088115cafa07cdbcd7f11623c8c71cbec4

          SHA512

          2fcc920f89ae821ffa52b2fac74d2419b386beaf8453b78a0581b0bb7864d9b691fa9f23ba8e186465b4a96155476b8e4be99025c85b7e68b4883225be2ea978

        • memory/1236-300-0x0000000000DE0000-0x00000000011C7000-memory.dmp

          Filesize

          3.9MB

        • memory/1236-298-0x000000006F330000-0x000000006F350000-memory.dmp

          Filesize

          128KB

        • memory/1236-299-0x000000006F200000-0x000000006F2BF000-memory.dmp

          Filesize

          764KB

        • memory/1328-240-0x000001D35F210000-0x000001D35F220000-memory.dmp

          Filesize

          64KB

        • memory/1328-241-0x000001D35F210000-0x000001D35F220000-memory.dmp

          Filesize

          64KB

        • memory/1328-237-0x000001D344E00000-0x000001D344E12000-memory.dmp

          Filesize

          72KB

        • memory/1328-235-0x000001D344880000-0x000001D344AE2000-memory.dmp

          Filesize

          2.4MB

        • memory/1328-239-0x000001D35F210000-0x000001D35F220000-memory.dmp

          Filesize

          64KB

        • memory/1336-174-0x0000000007960000-0x000000000797A000-memory.dmp

          Filesize

          104KB

        • memory/1336-153-0x0000000006050000-0x00000000060B6000-memory.dmp

          Filesize

          408KB

        • memory/1336-172-0x000000007F360000-0x000000007F370000-memory.dmp

          Filesize

          64KB

        • memory/1336-171-0x00000000051F0000-0x0000000005200000-memory.dmp

          Filesize

          64KB

        • memory/1336-170-0x0000000006BE0000-0x0000000006BFE000-memory.dmp

          Filesize

          120KB

        • memory/1336-160-0x000000006F480000-0x000000006F4CC000-memory.dmp

          Filesize

          304KB

        • memory/1336-159-0x0000000007620000-0x0000000007652000-memory.dmp

          Filesize

          200KB

        • memory/1336-175-0x00000000079D0000-0x00000000079DA000-memory.dmp

          Filesize

          40KB

        • memory/1336-158-0x0000000006650000-0x000000000666E000-memory.dmp

          Filesize

          120KB

        • memory/1336-173-0x0000000007FA0000-0x000000000861A000-memory.dmp

          Filesize

          6.5MB

        • memory/1336-152-0x0000000005F70000-0x0000000005FD6000-memory.dmp

          Filesize

          408KB

        • memory/1336-176-0x0000000007BE0000-0x0000000007C76000-memory.dmp

          Filesize

          600KB

        • memory/1336-146-0x0000000005ED0000-0x0000000005EF2000-memory.dmp

          Filesize

          136KB

        • memory/1336-145-0x0000000005830000-0x0000000005E58000-memory.dmp

          Filesize

          6.2MB

        • memory/1336-177-0x0000000007B90000-0x0000000007B9E000-memory.dmp

          Filesize

          56KB

        • memory/1336-144-0x00000000051F0000-0x0000000005200000-memory.dmp

          Filesize

          64KB

        • memory/1336-142-0x00000000050B0000-0x00000000050E6000-memory.dmp

          Filesize

          216KB

        • memory/1336-178-0x0000000007CA0000-0x0000000007CBA000-memory.dmp

          Filesize

          104KB

        • memory/1336-179-0x0000000007C80000-0x0000000007C88000-memory.dmp

          Filesize

          32KB

        • memory/1368-264-0x0000000000400000-0x00000000010B4000-memory.dmp

          Filesize

          12.7MB

        • memory/1520-312-0x000002A456030000-0x000002A456040000-memory.dmp

          Filesize

          64KB

        • memory/1520-279-0x000002A456030000-0x000002A456040000-memory.dmp

          Filesize

          64KB

        • memory/1520-278-0x000002A456030000-0x000002A456040000-memory.dmp

          Filesize

          64KB

        • memory/1716-185-0x0000000005080000-0x000000000509A000-memory.dmp

          Filesize

          104KB

        • memory/1716-186-0x00000000050A0000-0x00000000050B0000-memory.dmp

          Filesize

          64KB

        • memory/1716-134-0x0000000009A00000-0x0000000009FA4000-memory.dmp

          Filesize

          5.6MB

        • memory/1716-135-0x00000000094F0000-0x0000000009582000-memory.dmp

          Filesize

          584KB

        • memory/1716-137-0x00000000050A0000-0x00000000050B0000-memory.dmp

          Filesize

          64KB

        • memory/1716-136-0x0000000000FA0000-0x0000000000FB0000-memory.dmp

          Filesize

          64KB

        • memory/1716-138-0x0000000005080000-0x0000000005081000-memory.dmp

          Filesize

          4KB

        • memory/1716-139-0x0000000005080000-0x0000000005081000-memory.dmp

          Filesize

          4KB

        • memory/1716-140-0x0000000005080000-0x000000000509A000-memory.dmp

          Filesize

          104KB

        • memory/1716-141-0x000000000A270000-0x000000000A27A000-memory.dmp

          Filesize

          40KB

        • memory/1716-143-0x00000000050A0000-0x00000000050B0000-memory.dmp

          Filesize

          64KB

        • memory/1716-182-0x0000000000FA0000-0x0000000000FB0000-memory.dmp

          Filesize

          64KB

        • memory/1716-183-0x00000000050A0000-0x00000000050B0000-memory.dmp

          Filesize

          64KB

        • memory/1716-184-0x0000000005080000-0x0000000005081000-memory.dmp

          Filesize

          4KB

        • memory/1716-133-0x0000000000570000-0x00000000005F2000-memory.dmp

          Filesize

          520KB

        • memory/2124-213-0x0000000000400000-0x000000000224E000-memory.dmp

          Filesize

          30.3MB

        • memory/2124-194-0x00000000023F0000-0x00000000023F1000-memory.dmp

          Filesize

          4KB

        • memory/2124-215-0x0000000000400000-0x000000000224E000-memory.dmp

          Filesize

          30.3MB

        • memory/2124-214-0x0000000000400000-0x000000000224E000-memory.dmp

          Filesize

          30.3MB

        • memory/2124-221-0x0000000000400000-0x000000000224E000-memory.dmp

          Filesize

          30.3MB

        • memory/2124-238-0x0000000000400000-0x000000000224E000-memory.dmp

          Filesize

          30.3MB

        • memory/2124-242-0x0000000000400000-0x000000000224E000-memory.dmp

          Filesize

          30.3MB

        • memory/2124-243-0x0000000000400000-0x000000000224E000-memory.dmp

          Filesize

          30.3MB

        • memory/2124-245-0x0000000000400000-0x000000000224E000-memory.dmp

          Filesize

          30.3MB

        • memory/2124-246-0x0000000000400000-0x000000000224E000-memory.dmp

          Filesize

          30.3MB

        • memory/2124-247-0x0000000000400000-0x000000000224E000-memory.dmp

          Filesize

          30.3MB

        • memory/2124-250-0x0000000000400000-0x000000000224E000-memory.dmp

          Filesize

          30.3MB

        • memory/2124-212-0x0000000000400000-0x000000000224E000-memory.dmp

          Filesize

          30.3MB

        • memory/2124-211-0x0000000000400000-0x000000000224E000-memory.dmp

          Filesize

          30.3MB

        • memory/2124-254-0x0000000000400000-0x000000000224E000-memory.dmp

          Filesize

          30.3MB

        • memory/2124-255-0x0000000000400000-0x000000000224E000-memory.dmp

          Filesize

          30.3MB

        • memory/2124-210-0x0000000000400000-0x000000000224E000-memory.dmp

          Filesize

          30.3MB

        • memory/2124-268-0x0000000000400000-0x000000000224E000-memory.dmp

          Filesize

          30.3MB

        • memory/2124-270-0x0000000000400000-0x000000000224E000-memory.dmp

          Filesize

          30.3MB

        • memory/2124-208-0x0000000000400000-0x000000000224E000-memory.dmp

          Filesize

          30.3MB

        • memory/2124-207-0x0000000000400000-0x000000000224E000-memory.dmp

          Filesize

          30.3MB

        • memory/2124-206-0x0000000000400000-0x000000000224E000-memory.dmp

          Filesize

          30.3MB

        • memory/2124-205-0x0000000000400000-0x000000000224E000-memory.dmp

          Filesize

          30.3MB

        • memory/2124-204-0x0000000000400000-0x000000000224E000-memory.dmp

          Filesize

          30.3MB

        • memory/2124-203-0x0000000000400000-0x000000000224E000-memory.dmp

          Filesize

          30.3MB

        • memory/2124-202-0x0000000000400000-0x000000000224E000-memory.dmp

          Filesize

          30.3MB

        • memory/2124-201-0x0000000000400000-0x000000000224E000-memory.dmp

          Filesize

          30.3MB

        • memory/2124-198-0x0000000000400000-0x000000000224E000-memory.dmp

          Filesize

          30.3MB

        • memory/2124-197-0x0000000002420000-0x0000000002421000-memory.dmp

          Filesize

          4KB

        • memory/2124-196-0x0000000002410000-0x0000000002411000-memory.dmp

          Filesize

          4KB

        • memory/2124-195-0x0000000002400000-0x0000000002401000-memory.dmp

          Filesize

          4KB

        • memory/2124-217-0x0000000000400000-0x000000000224E000-memory.dmp

          Filesize

          30.3MB

        • memory/2124-193-0x0000000002300000-0x0000000002301000-memory.dmp

          Filesize

          4KB

        • memory/2124-192-0x00000000022F0000-0x00000000022F1000-memory.dmp

          Filesize

          4KB

        • memory/2124-191-0x00000000022D0000-0x00000000022D1000-memory.dmp

          Filesize

          4KB

        • memory/2124-190-0x00000000022C0000-0x00000000022C1000-memory.dmp

          Filesize

          4KB

        • memory/2124-236-0x0000000000400000-0x000000000224E000-memory.dmp

          Filesize

          30.3MB

        • memory/2124-219-0x0000000000400000-0x000000000224E000-memory.dmp

          Filesize

          30.3MB

        • memory/2124-234-0x0000000000400000-0x000000000224E000-memory.dmp

          Filesize

          30.3MB

        • memory/2124-229-0x0000000000400000-0x000000000224E000-memory.dmp

          Filesize

          30.3MB

        • memory/2124-414-0x000000006EE70000-0x000000006EEA9000-memory.dmp

          Filesize

          228KB

        • memory/2124-222-0x0000000000400000-0x000000000224E000-memory.dmp

          Filesize

          30.3MB

        • memory/2124-362-0x000000006EE70000-0x000000006EEA9000-memory.dmp

          Filesize

          228KB

        • memory/2124-223-0x0000000000400000-0x000000000224E000-memory.dmp

          Filesize

          30.3MB

        • memory/2124-228-0x000000006F360000-0x000000006F399000-memory.dmp

          Filesize

          228KB

        • memory/2124-227-0x0000000000400000-0x000000000224E000-memory.dmp

          Filesize

          30.3MB

        • memory/2124-226-0x0000000000400000-0x000000000224E000-memory.dmp

          Filesize

          30.3MB

        • memory/2124-220-0x0000000000400000-0x000000000224E000-memory.dmp

          Filesize

          30.3MB

        • memory/2124-224-0x0000000000400000-0x000000000224E000-memory.dmp

          Filesize

          30.3MB

        • memory/2136-316-0x0000022752D90000-0x0000022752DA0000-memory.dmp

          Filesize

          64KB

        • memory/2136-317-0x0000022752D90000-0x0000022752DA0000-memory.dmp

          Filesize

          64KB

        • memory/2136-330-0x0000022752D90000-0x0000022752DA0000-memory.dmp

          Filesize

          64KB

        • memory/2136-311-0x0000022752A00000-0x0000022752A06000-memory.dmp

          Filesize

          24KB

        • memory/2136-394-0x0000022752D90000-0x0000022752DA0000-memory.dmp

          Filesize

          64KB

        • memory/2136-395-0x0000022752D90000-0x0000022752DA0000-memory.dmp

          Filesize

          64KB

        • memory/2136-405-0x0000022752D90000-0x0000022752DA0000-memory.dmp

          Filesize

          64KB

        • memory/2572-230-0x00007FFADAB70000-0x00007FFADAB72000-memory.dmp

          Filesize

          8KB

        • memory/2572-231-0x00007FFADAB80000-0x00007FFADAB82000-memory.dmp

          Filesize

          8KB

        • memory/2572-232-0x0000000000400000-0x00000000010B4000-memory.dmp

          Filesize

          12.7MB

        • memory/4136-328-0x0000000140000000-0x0000000140829000-memory.dmp

          Filesize

          8.2MB

        • memory/4136-396-0x0000000140000000-0x0000000140829000-memory.dmp

          Filesize

          8.2MB