Resubmissions

11/04/2024, 09:34

240411-ljrrgabh4y 10

11/04/2024, 09:34

240411-ljrfpsgf98 10

11/04/2024, 09:34

240411-ljqt6sgf97 10

11/04/2024, 09:34

240411-ljqjeagf96 10

11/04/2024, 09:33

240411-ljpxwagf95 10

09/04/2024, 02:59

240409-dgzqasce34 10

09/04/2024, 02:58

240409-dgnb9sce28 10

09/04/2024, 02:58

240409-df5vxsga5x 10

09/04/2024, 02:56

240409-de62lacd79 10

29/02/2024, 05:28

240229-f59xaafe58 10

Analysis

  • max time kernel
    300s
  • max time network
    293s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11/04/2024, 09:34

General

  • Target

    61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe

  • Size

    16.0MB

  • MD5

    b8e2ec7d64fe3156c5f684b3a2757301

  • SHA1

    565db0f626a875be0ba5234963727e45c01f3ca9

  • SHA256

    61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3

  • SHA512

    02894d45ddeb98471ce09a99e3b4fe6e23b03e17c77ffba31d6a5e58b2a3b17eba3f8c8b81988b82aacca385ecc6dc752aa1ed62681909ff3d67acaf56a697d6

  • SSDEEP

    393216:OccUL96juOB/a7LOupqeRbz9rmGuXrERtpyw7c+AiT:FZJkazpqeRbrdZyAc+Ai

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 4 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 19 IoCs
  • Loads dropped DLL 13 IoCs
  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • NTFS ADS 2 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 49 IoCs
  • Suspicious use of SendNotifyMessage 48 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe
    "C:\Users\Admin\AppData\Local\Temp\61b322051908949b1fe40f5ab5995cec4c2f1abb6628e5f798cab8a91f42d0e3.exe"
    1⤵
    • Loads dropped DLL
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt
      C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2456
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2712
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"
        3⤵
        • Creates scheduled task(s)
        PID:2580
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c For /L %i In (0,0,0) Do (del "C:\Users\Admin\AppData\Local\Temp\61B322~1.EXE"&&timeout /t 0&&if not exist "C:\Users\Admin\AppData\Local\Temp\61B322~1.EXE" exit)
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:2348
      • C:\Windows\SysWOW64\timeout.exe
        timeout /t 0
        3⤵
        • Delays execution with timeout.exe
        PID:3016
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {51FAFA64-1845-4851-87CF-4B2F2AD0973F} S-1-5-21-1658372521-4246568289-2509113762-1000:PIRBKNPS\Admin:Interactive:[1]
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe -SystemCheck
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:524
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe" -SystemCheck74309
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1428
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe -SystemCheck
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:472
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe" -SystemCheck74309
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • NTFS ADS
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:752
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe
          7z e -p"DxSqsNKKOxqPrM4Y3xeK" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor.tmp" -o"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:2716
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\tor.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\tor.exe" -f TorConfig
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1776
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe
          7z e -p"DxSqsNKKOxqPrM4Y3xeK" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SysBackup.tmp" -o"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1276
        • C:\Windows\System32\attrib.exe
          -o stratum+tcp://92.119.112.209:5555 -u -p x -t 4
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Views/modifies file attributes
          PID:1724
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe -SystemCheck
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1704
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe -SystemCheck
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1532
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe" -SystemCheck74309
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2152
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe -SystemCheck
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2844
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe" -SystemCheck74309
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:960
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe -SystemCheck
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3008
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe" -SystemCheck74309
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1892
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe -SystemCheck
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1420
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe" -SystemCheck74309
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1428
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe -SystemCheck
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:568
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Updts.exe" -SystemCheck74309
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2040

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\32.exe

          Filesize

          7.4MB

          MD5

          42da03d20542bf824f217214258fca1a

          SHA1

          5a4cf5f819d784973e3d9b4cc61f431cfc8e7564

          SHA256

          4e57e739833686c5951a78b783973e8f79445868ad3e3621a1ab9eaa559d78d7

          SHA512

          a9d15c0b4ba37fe0c9738311c9825b4aa6b0f0c105f6721affdfbe23065a924bfed300cdb990877fe5036e47279c671c262193de18e32528584cd2f7a71fb212

        • C:\Users\Admin\AppData\Local\Temp\64.exe

          Filesize

          8.4MB

          MD5

          1f8173ce565d749dec7e11f40110ddd8

          SHA1

          4d375fa658b16e9ce1217cc9dc4161e418126228

          SHA256

          f3983921f687f6de73a7640d50393ab8ca1e8faa8d1031e08276f5a3db747b4a

          SHA512

          036c172c82820553c4d8613cb8aca0acd2491cf2b4d23a2f816e273a6b22493e9fe9d45b02c0250247dd7d8d8331460b24f9fe224c9b36444c6c248b4e59eb92

        • C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt

          Filesize

          14.6MB

          MD5

          8d9b3986dfe0a08cd9c7e4dcce1936c7

          SHA1

          fe8f379c0014dda5783d4730947ab280e0856cfc

          SHA256

          2cff8e2b9d115e9a5dabe687f776cb548d9bb42f50881ad2ebcc964ef8ad2775

          SHA512

          d1baf085c2b7d5d2d84f4c7a0676282989594318cfdf8a3b05a2d16f4cd33b128bb6540993efcd56e03155157d5b2bd8d3e1091d657cbbce789069941b992455

        • C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml

          Filesize

          2KB

          MD5

          725bf5d38461e8fe65aacb46fd09458e

          SHA1

          9f20129f55de7ae251ae2d1277f96df4908b836a

          SHA256

          b25bf441a40738723589d7d301112fa630672766b1fff9368bbdb709f660d613

          SHA512

          3918e9dcd028619f4d82a027f43987aad96c56d587e71ad0d42ae64a4bd0adf4605032b2b89bb7de37e4cf073184d11f885eac40722747d1a2cc63976b158135

        • C:\Users\Admin\AppData\Local\Temp\asacpiex.dll

          Filesize

          14.6MB

          MD5

          33b9825bd5ca7a974a1dddf9ea3001ca

          SHA1

          c30a2ab78c10127e27f48ec69eb61038aec4f111

          SHA256

          cc9474e1d4129cf9b4c02a6c948ca8b6f52d806811c719ecfb108c977d4090e4

          SHA512

          bc33b87c331d215ea5abdfe62a2f3d38af49bfa4db443b4b8cdad89e72fd8baf8d6b491bde148899ad9401560f38ebb18b5668669f9380a168e386f562a36603

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SysBackup.tmp

          Filesize

          11KB

          MD5

          f3d801f434a1de86ef52402fe1a8fb4c

          SHA1

          93789c51bd561f6c216960ce99c605fff93e613b

          SHA256

          3321cf0e3288dcdfde7379e6c6f43a3079b95bb8c1e9480404804ebfc6c94562

          SHA512

          472014d4cd6189510d584b024f8a406f61a6b2342703af7ea989b37b26d8466e77d05ea0b3ad20446b4572cf584a13e90acb72017641036d4e3e385b8c846ab2

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SysBackup.tmp

          Filesize

          64KB

          MD5

          4ba229ec0856ae1fa70810e04bfcbb8f

          SHA1

          8851e59245857c2709163320dcd4637f98597380

          SHA256

          00eee6ddbe598c0ebd68e5376865c9d51bb857be87fe630d8a50f36d9bc8c8e7

          SHA512

          8d94b6a5e45e6b1dde524389fe1a258ad718ecf8b89dcb20871f2b4a31b7aea2ff1fb695481b4076b9b03bc406ee4e18cc983e8aa3d7b82b02f65c579ac7821f

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SysBackup.tmp

          Filesize

          2.5MB

          MD5

          1df6c9dc09d318a9372b9af690fe588c

          SHA1

          210efca3b7df334d978d47a5ff995e8cafb7e491

          SHA256

          312df91987797995dead8721129fed7784d13c6ab7c7dc7bb70f552a16945b05

          SHA512

          55db43386ab483a2589676f6720803e084483ecdd58a316a41a8b8110adc4ef5fba0ae46552a77d998321db7bd5ce89ea50c11c7ffa811bf21bde6dd99e9ccb6

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SysBackup.txt

          Filesize

          15.6MB

          MD5

          03e88bed005805106b26a8cbab4e712c

          SHA1

          e44ddd2669a076c23d11b5f246fd73986a6c1bc7

          SHA256

          709f14af463e20e1853f728e1816e284e1ade53e83d65560526f8b8b6a43ef32

          SHA512

          ed56686526c21372d70f9bb454289b103c8a44a4ba2db25ce0abfa12e3f25c8fbcc990cc2f1ec3cb9bd66f82345179d47940a03fbaebbf3a53797b1a7eea2c37

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor.tmp

          Filesize

          2.5MB

          MD5

          54183220aa6c777f8228474ff5b5df01

          SHA1

          ed438f17bffb37d42afd61d8dcef0c50d554c65c

          SHA256

          9a78c80e93bd1ed3d71eb090465e39a69470cd1812fc5e169d8b412e8c665963

          SHA512

          70b1e22449c5264bed46b62595206e3ad36e2a9c33fa9589acb792d499dcbbae5ebdbf3b35c140e72a7d594f807a6ce1ab925736b5e1a07c17a26445a2591987

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\TorDataSocksListenAddress 127.0.0.1\cached-certs

          Filesize

          20KB

          MD5

          a9e14f28474dff2e43abb5038b01a313

          SHA1

          e21c60fd461d5bc5dd780aa895864d6bc1216511

          SHA256

          0c4d4cebf1895753c5c48d8046e31a9a997d0db588acb950ffdc2a71c9608849

          SHA512

          11f480999aadeb7e18d11773d85ed0c5089fc038ea7459f594d31b30794bda959b9e9b909d9edc3cbff65113d44c1a71359131a1ad637a3851708ad5e18fa814

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\TorDataSocksListenAddress 127.0.0.1\cached-microdesc-consensus.tmp

          Filesize

          2.7MB

          MD5

          539c3bfb112c79cad6a33d5de39f347a

          SHA1

          69407249edc4115cc4458cbd3b7f053d24718840

          SHA256

          46e3f860f85578a1967917db99626df1eaf8cf8a99d8bfb2f66643f800f3d53e

          SHA512

          98892f3f26e0eba54d5bb1a2d77766c8a1fb1426d7e7591189ceecd6367285cb611289eba518c7d1caeedb2922ab5d273b969ff6c57dee27951a0f7f220be640

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\TorDataSocksListenAddress 127.0.0.1\cached-microdescs.new

          Filesize

          9.1MB

          MD5

          51ec3bc06838fdc25ba2cca121be45bb

          SHA1

          b3f11b40e350de2e0253480fb2cdf16d35f21ab2

          SHA256

          3418c9a47f6df43d1e68736ad71a6db43ca7c458f9f11523ac3032f52e5e5172

          SHA512

          24be6923e5dc701fea2ae73b7ac8627aa49711c0db4afe2943aa03035611bb97befdfdc2871d34462dd7a1775c50396d3e4a4d14bca6d31edb183ca77549a773

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\TorDataSocksListenAddress 127.0.0.1\cached-microdescs.new

          Filesize

          20.3MB

          MD5

          399e21779bd399fd1317082f2a8506b1

          SHA1

          f98625b9b406ee44f34b9106af6740274342b559

          SHA256

          7e958eefb7e99e26074ae7d9a214f67eca79ea685c7c329e781ce2edf09916d9

          SHA512

          a6f3b9986f1f4020458850caaad34316239d8c33bcc9af84065b9995d92ec50a04dda72a6c00d68fbd8e3bd7dd5ee194af828a3c9ef7c8390358d3e44cdfca9b

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\TorDataSocksListenAddress 127.0.0.1\state

          Filesize

          4KB

          MD5

          9e719bb0d33749fc8c133fdba888df09

          SHA1

          51730777d232f2de1327d4855e34d92705f50d8d

          SHA256

          ab746ec76257469481dc8f127fe6a954881cc1be28fb9a5f1a8ddd921d20231a

          SHA512

          e49ef10ca73d826897589b539cd998e0992ef2034727f0461abd3679ead09467488eda8cf8f90c4a92f5cc20b1502c0309cd4b572409f992c038a635f3202944

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\TorData\Tor.pid

          Filesize

          6B

          MD5

          bc69c2579cb6ac46127c07a8f271bff4

          SHA1

          c3e752c28507d52eef64c134e01e5601454dfb51

          SHA256

          fa0e12933e2d7d75f654bde8457f7fa680f2309a53827fc815f4b7aa7e4d9d3d

          SHA512

          7de1f3a41f30ab42faa12ee55bc0cc9f97cdb638022af6f7e5554f35a400ed600cd5a2eff02f3c39afb7d881588802d0cf3a1931a89d2b5525d315e238861662

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\TorData\TorConfig

          Filesize

          201B

          MD5

          b9d2fe9cfa840518fa39039c928d4938

          SHA1

          0561516b7cfa784cf400349983817c8b18817256

          SHA256

          69d57bfb46ef8097c1cfca65885790421d0e0965b7778f165cd7df9368807776

          SHA512

          894510d39a044a37325d73b8348860960b3a78c54e7cdf81357f4b50e8dcf5d47ab98c768e6439949ba835802b2a5e98314441127d9655b027caf246e09e013d

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libcrypto-1_1-x64.dll

          Filesize

          3.4MB

          MD5

          791a48e7cf84ec1532d20127556f6300

          SHA1

          774f71e595cfc7e24dc941839566bc9edd9156c5

          SHA256

          af682ad107cf0e9d9f11adeaf88f817610988b56577c4020897debc0f98e26ff

          SHA512

          ecbb4a07bb68fec5258be0adc91b89d179b5668bbab3be3bd72d5339f8bf3b32a1860b38693a304029fe989bd92adb020cf755f673b1e59966dfc75e4f958cfa

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libevent_core-2-1-7.dll

          Filesize

          646KB

          MD5

          c1507e234ff7f11a259d87a57af740be

          SHA1

          7478ba561c9f478ede650561867ebd2db58da42f

          SHA256

          d6a7d46f6fc803b50460d03c0bc14f2f128ee2becabcf1713715bcebf13ee75b

          SHA512

          64d0657050028d846097429ad1268844038059279e1256329716b937338de5fc1b5f50f420b8aa781c5e2a19f15158f564569db639981fef10fa5e57dfd4717b

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libevent_extra-2-1-7.dll

          Filesize

          657KB

          MD5

          7cb2f0f4bba8d16c3200e9ac2a25b7c0

          SHA1

          63cf39682bf6876f563e1567df3c55fd5939e6ea

          SHA256

          ec52e90c68dd0e7603df3f9fe6c909d019a7e94dc3ce0efd8baf67864a43b74b

          SHA512

          7a660d87739914c68cadb56a4acbf27d68fd145b3bb65b957b4c767dfabe0762c40d58faa3a2df3b3453083ea658411c79d53be5166dda844782a9cd2617a264

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libgcc_s_seh-1.dll

          Filesize

          1.1MB

          MD5

          ead6d4a87041e13b9041f78be1cb84d1

          SHA1

          896a336e08a1904537ee5a4a86eb0e885a18e17a

          SHA256

          b94b8981f8110944c5b03c9cba4066e9d0daa13687dead387bcbc772132c6d24

          SHA512

          34054ec79691145a8d511f9425f9ad44e07f8bfb38bd0b3251a5db3358c0055344615990fb770d4bdcbf04c9461847dfd4f6d2bac1e43ec815426a94d065c580

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libwinpthread-1.dll

          Filesize

          608KB

          MD5

          624304f2ba253b33c265ff2738a10eb9

          SHA1

          5a337e49dd07f0b6f7fc6341755dc9a298e8b220

          SHA256

          27b857131977106c4a71ce626225d52a3d6e2932cb6243cb83e47b8d592d0d4f

          SHA512

          163820961a64b3fda33969cbb320aa743edc7a6bacebe033054c942e7a1d063f096290a59fad1569c607666429e2f3133fcfe31ef37649f9da71b453ef775e5a

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\tor.exe

          Filesize

          4.3MB

          MD5

          9f2d86da7d58a70b0003307d9cfc2438

          SHA1

          bd69ad6ea837e309232d7c4fd0e87e22c3266ac5

          SHA256

          7052619814a614a1b157c5c94a92dbec22b425a0977ac8b21958b8db81e2dd65

          SHA512

          ce345ff77d8043f416a04b782be8e7b0d5fdea933f3ac79abb88648a9fca23d7a69f537a825d0b636ba64f80afe70f758114ddbf412bd9398800ba4b6e359a99

        • \Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt

          Filesize

          722KB

          MD5

          43141e85e7c36e31b52b22ab94d5e574

          SHA1

          cfd7079a9b268d84b856dc668edbb9ab9ef35312

          SHA256

          ea308c76a2f927b160a143d94072b0dce232e04b751f0c6432a94e05164e716d

          SHA512

          9119ae7500aa5cccf26a0f18fd8454245347e3c01dabba56a93dbaaab86535e62b1357170758f3b3445b8359e7dd5d37737318a5d8a6047c499d32d5b64126fc

        • \Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libevent-2-1-7.dll

          Filesize

          974KB

          MD5

          be51ba4bea2d731dacf974c43941e457

          SHA1

          51fc479fd8ee9a2b72e6aa020ce5bb1c7a28f621

          SHA256

          98d06628e3d9c8097d239722e83ad78eb0b41b1e2f54d50a500da6d9292ff747

          SHA512

          6184accd206aa466278c2f4b514fd5c85820d47cf3a148904e93927621ac386890e657f09547b694c32ef23c355ae738b7c7d039fcd6c791529198c7b0b6bd1e

        • \Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libssl-1_1-x64.dll

          Filesize

          965KB

          MD5

          7847c7b13b3414e8e7652880b4609205

          SHA1

          930670acc16157f56aaf69423e5d7705441764ba

          SHA256

          38200438cf0c9c20d17e5b9030d2ad2e4a1b6b9dc41c287bc603dd50d22e67bb

          SHA512

          c3c81dc3eb546c40b3606338deadbd63331659645dd24b5fd0d4fb3170b053fef528ee3fe005c9446176a5c049e9412ea8193ad2f8b9a7301ff67b088f1bbb6e

        • \Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libssp-0.dll

          Filesize

          313KB

          MD5

          97d89dec5f6a236b6832a5f3f43ab625

          SHA1

          18f2696a3bf4d19cac3b677d58ff5e51bf54b9e8

          SHA256

          c6dca12e0e896df5f9b2db7a502a50d80d4fb014d7ec2f2ceb897b1a81f46ead

          SHA512

          7e82d1e37dc822a67e08bd1d624d5492f5813a33ec64f13d22caef9db35ebb9bb9913582289ebdecad00e6b6148d750ae0b4437364ef056d732734255498be54

        • \Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\zlib1.dll

          Filesize

          107KB

          MD5

          d490b6c224e332a706dd3cd210f32aa8

          SHA1

          1f0769e1fffddac3d14eb79f16508cb6cc272347

          SHA256

          da9185e45fdcbee17fcd9292979b20f32aa4c82bc2cb356b4c7278029e247557

          SHA512

          43ce8d4ee07d437aaca3f345af129ff5401f1f08b1292d1e320096ba41e2529f41ce9105e3901cb4ecb1e8fde12c9298819961b0e6896c69b62f5983df9b0da3

        • memory/1276-2990-0x000007FFFFFD4000-0x000007FFFFFD5000-memory.dmp

          Filesize

          4KB

        • memory/1276-3001-0x0000000000520000-0x0000000000643000-memory.dmp

          Filesize

          1.1MB

        • memory/1276-2997-0x0000000000520000-0x0000000000643000-memory.dmp

          Filesize

          1.1MB

        • memory/1276-2996-0x0000000000520000-0x0000000000643000-memory.dmp

          Filesize

          1.1MB

        • memory/1276-2992-0x0000000000520000-0x0000000000643000-memory.dmp

          Filesize

          1.1MB

        • memory/1668-28-0x0000000001B70000-0x0000000001B71000-memory.dmp

          Filesize

          4KB

        • memory/1668-27-0x0000000001B60000-0x0000000001B61000-memory.dmp

          Filesize

          4KB

        • memory/1668-25-0x0000000001220000-0x0000000001221000-memory.dmp

          Filesize

          4KB

        • memory/1668-26-0x00000000016F0000-0x00000000016F1000-memory.dmp

          Filesize

          4KB

        • memory/1724-3033-0x0000000000DF0000-0x0000000000E10000-memory.dmp

          Filesize

          128KB

        • memory/1724-3038-0x0000000000160000-0x0000000000180000-memory.dmp

          Filesize

          128KB

        • memory/1724-3030-0x0000000000160000-0x0000000000180000-memory.dmp

          Filesize

          128KB

        • memory/1724-3031-0x0000000000D40000-0x0000000000D60000-memory.dmp

          Filesize

          128KB

        • memory/1724-3032-0x0000000000DD0000-0x0000000000DF0000-memory.dmp

          Filesize

          128KB

        • memory/1724-3037-0x0000000000210000-0x0000000000D00000-memory.dmp

          Filesize

          10.9MB

        • memory/1724-3028-0x0000000000210000-0x0000000000D00000-memory.dmp

          Filesize

          10.9MB

        • memory/1724-3029-0x00000000000F0000-0x0000000000110000-memory.dmp

          Filesize

          128KB

        • memory/1724-3027-0x0000000000210000-0x0000000000D00000-memory.dmp

          Filesize

          10.9MB

        • memory/1724-3022-0x000007FFFFFD3000-0x000007FFFFFD4000-memory.dmp

          Filesize

          4KB

        • memory/1724-3024-0x0000000000210000-0x0000000000D00000-memory.dmp

          Filesize

          10.9MB

        • memory/1724-3021-0x0000000000210000-0x0000000000D00000-memory.dmp

          Filesize

          10.9MB

        • memory/1724-3039-0x0000000000D40000-0x0000000000D60000-memory.dmp

          Filesize

          128KB

        • memory/1724-3040-0x0000000000DD0000-0x0000000000DF0000-memory.dmp

          Filesize

          128KB

        • memory/1724-3041-0x0000000000DF0000-0x0000000000E10000-memory.dmp

          Filesize

          128KB

        • memory/1776-2797-0x0000000000B70000-0x0000000000FD1000-memory.dmp

          Filesize

          4.4MB

        • memory/1776-648-0x0000000000B70000-0x0000000000FD1000-memory.dmp

          Filesize

          4.4MB

        • memory/1776-111-0x00000000753B0000-0x0000000075493000-memory.dmp

          Filesize

          908KB

        • memory/1776-112-0x0000000075350000-0x00000000753A4000-memory.dmp

          Filesize

          336KB

        • memory/1776-113-0x00000000752B0000-0x0000000075348000-memory.dmp

          Filesize

          608KB

        • memory/1776-3002-0x0000000000B70000-0x0000000000FD1000-memory.dmp

          Filesize

          4.4MB

        • memory/1776-114-0x0000000074A30000-0x0000000074D1D000-memory.dmp

          Filesize

          2.9MB

        • memory/1776-115-0x00000000751D0000-0x00000000752A3000-memory.dmp

          Filesize

          844KB

        • memory/1776-110-0x0000000000B70000-0x0000000000FD1000-memory.dmp

          Filesize

          4.4MB

        • memory/1776-116-0x00000000751A0000-0x00000000751C3000-memory.dmp

          Filesize

          140KB

        • memory/1776-126-0x0000000000B70000-0x0000000000FD1000-memory.dmp

          Filesize

          4.4MB

        • memory/2716-46-0x0000000000060000-0x0000000000183000-memory.dmp

          Filesize

          1.1MB

        • memory/2716-73-0x0000000000060000-0x0000000000183000-memory.dmp

          Filesize

          1.1MB

        • memory/2716-50-0x0000000000060000-0x0000000000183000-memory.dmp

          Filesize

          1.1MB

        • memory/2716-52-0x0000000000060000-0x0000000000183000-memory.dmp

          Filesize

          1.1MB

        • memory/2716-43-0x0000000000060000-0x0000000000183000-memory.dmp

          Filesize

          1.1MB

        • memory/2716-45-0x000007FFFFFDB000-0x000007FFFFFDC000-memory.dmp

          Filesize

          4KB