Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2024, 13:57 UTC

General

  • Target

    b88ab587582517006609d2554572f9f4_JaffaCakes118.exe

  • Size

    7.8MB

  • MD5

    b88ab587582517006609d2554572f9f4

  • SHA1

    a557e11bc586713c1b79594d3ea2a2a37cab6886

  • SHA256

    da9365d6a36e9aac5c61c0a9c0fd53f2c3d03954e0e3b215f43435a5b638acf6

  • SHA512

    c33c47ecae4be3087a4cc77dcaf4ca69b40d158038061857f8cf936ac47b59f3503177845c51d0201bb67f7220fd35a7d8ade481bd4c0f1cb5f4d9e67a728b1b

  • SSDEEP

    196608:yI1eP0fug8STYYxwhzav1yo31CPwDv3uFZjeg2EeJUO9WLQkDxtw3iFFrS6XOfT+:yI1JiexwZ6v1CPwDv3uFteg2EeJUO9W/

Malware Config

Extracted

Family

bitrat

Version

1.34

C2

cu3g4cu35b3pz2pfnxmgk25kdj74tsefmalaz2lhfpvq6ghnbpf2tmad.onion:80

Attributes
  • communication_password

    fd4035ba8f64b8e0500f15a70f6541d4

  • install_dir

    AppData

  • install_file

    prscrt.exe

  • tor_process

    winscprt

Signatures

  • BitRAT

    BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

  • Bitrat family
  • ACProtect 1.3x - 1.4x DLL software 7 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 41 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • UPX packed file 64 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: RenamesItself 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b88ab587582517006609d2554572f9f4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b88ab587582517006609d2554572f9f4_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1792
    • C:\Users\Admin\AppData\Local\89d22e83\tor\winscprt.exe
      "C:\Users\Admin\AppData\Local\89d22e83\tor\winscprt.exe" -f torrc
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:1100
    • C:\Users\Admin\AppData\Local\89d22e83\tor\winscprt.exe
      "C:\Users\Admin\AppData\Local\89d22e83\tor\winscprt.exe" -f torrc
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2424
    • C:\Users\Admin\AppData\Local\89d22e83\tor\winscprt.exe
      "C:\Users\Admin\AppData\Local\89d22e83\tor\winscprt.exe" -f torrc
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2296
    • C:\Users\Admin\AppData\Local\89d22e83\tor\winscprt.exe
      "C:\Users\Admin\AppData\Local\89d22e83\tor\winscprt.exe" -f torrc
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2500
    • C:\Users\Admin\AppData\Local\89d22e83\tor\winscprt.exe
      "C:\Users\Admin\AppData\Local\89d22e83\tor\winscprt.exe" -f torrc
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2268

Network

  • flag-us
    DNS
    myexternalip.com
    b88ab587582517006609d2554572f9f4_JaffaCakes118.exe
    Remote address:
    8.8.8.8:53
    Request
    myexternalip.com
    IN A
    Response
    myexternalip.com
    IN A
    34.160.111.145
  • flag-us
    GET
    https://myexternalip.com/raw
    b88ab587582517006609d2554572f9f4_JaffaCakes118.exe
    Remote address:
    34.160.111.145:443
    Request
    GET /raw HTTP/1.1
    User-Agent: kx9jjQI6lHn0IGdGStVltAHpf9TvT47V
    Host: myexternalip.com
    Cache-Control: no-cache
    Response
    HTTP/1.1 200 OK
    date: Mon, 02 Dec 2024 13:59:02 GMT
    content-type: text/plain; charset=utf-8
    Content-Length: 14
    access-control-allow-origin: *
    via: 1.1 google
    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
  • flag-us
    DNS
    r10.o.lencr.org
    b88ab587582517006609d2554572f9f4_JaffaCakes118.exe
    Remote address:
    8.8.8.8:53
    Request
    r10.o.lencr.org
    IN A
    Response
    r10.o.lencr.org
    IN CNAME
    o.lencr.edgesuite.net
    o.lencr.edgesuite.net
    IN CNAME
    a1887.dscq.akamai.net
    a1887.dscq.akamai.net
    IN A
    95.101.74.210
    a1887.dscq.akamai.net
    IN A
    95.101.74.198
    a1887.dscq.akamai.net
    IN A
    95.101.74.223
    a1887.dscq.akamai.net
    IN A
    95.101.74.218
    a1887.dscq.akamai.net
    IN A
    95.101.74.219
    a1887.dscq.akamai.net
    IN A
    95.101.74.199
    a1887.dscq.akamai.net
    IN A
    95.101.74.201
    a1887.dscq.akamai.net
    IN A
    95.101.74.217
    a1887.dscq.akamai.net
    IN A
    95.101.74.196
  • flag-nl
    GET
    http://r10.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRpD%2BQVZ%2B1vf7U0RGQGBm8JZwdxcgQUdKR2KRcYVIUxN75n5gZYwLzFBXICEgTngi%2FdvXWpmmH77a4ke5pYRA%3D%3D
    b88ab587582517006609d2554572f9f4_JaffaCakes118.exe
    Remote address:
    95.101.74.210:80
    Request
    GET /MFMwUTBPME0wSzAJBgUrDgMCGgUABBRpD%2BQVZ%2B1vf7U0RGQGBm8JZwdxcgQUdKR2KRcYVIUxN75n5gZYwLzFBXICEgTngi%2FdvXWpmmH77a4ke5pYRA%3D%3D HTTP/1.1
    Connection: Keep-Alive
    Accept: */*
    User-Agent: Microsoft-CryptoAPI/6.1
    Host: r10.o.lencr.org
    Response
    HTTP/1.1 200 OK
    Server: nginx
    Content-Type: application/ocsp-response
    Content-Length: 504
    ETag: "0FC8F3476F3A9791726FEB7F9C8418DA62C1589FF46E5DC28CBC21CD19EAC3B1"
    Last-Modified: Sun, 01 Dec 2024 08:48:00 UTC
    Cache-Control: public, no-transform, must-revalidate, max-age=6674
    Expires: Mon, 02 Dec 2024 15:50:16 GMT
    Date: Mon, 02 Dec 2024 13:59:02 GMT
    Connection: keep-alive
  • flag-us
    GET
    https://myexternalip.com/raw
    b88ab587582517006609d2554572f9f4_JaffaCakes118.exe
    Remote address:
    34.160.111.145:443
    Request
    GET /raw HTTP/1.1
    User-Agent: KeqOUOHiUzkJooSPWYIJqiHtOUjI8We9
    Host: myexternalip.com
    Cache-Control: no-cache
    Response
    HTTP/1.1 200 OK
    date: Mon, 02 Dec 2024 13:59:31 GMT
    content-type: text/plain; charset=utf-8
    Content-Length: 14
    access-control-allow-origin: *
    via: 1.1 google
    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
  • flag-us
    DNS
    crl.microsoft.com
    Remote address:
    8.8.8.8:53
    Request
    crl.microsoft.com
    IN A
    Response
    crl.microsoft.com
    IN CNAME
    crl.www.ms.akadns.net
    crl.www.ms.akadns.net
    IN CNAME
    a1363.dscg.akamai.net
    a1363.dscg.akamai.net
    IN A
    104.124.11.17
    a1363.dscg.akamai.net
    IN A
    104.124.11.58
  • flag-de
    GET
    http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
    Remote address:
    104.124.11.17:80
    Request
    GET /pki/crl/products/MicRooCerAut2011_2011_03_22.crl HTTP/1.1
    Connection: Keep-Alive
    Accept: */*
    If-Modified-Since: Thu, 11 Jul 2024 01:45:51 GMT
    User-Agent: Microsoft-CryptoAPI/6.1
    Host: crl.microsoft.com
    Response
    HTTP/1.1 200 OK
    Content-Length: 1036
    Content-Type: application/octet-stream
    Content-MD5: 8M9bF5Tsp81z+cAg2quO8g==
    Last-Modified: Thu, 26 Sep 2024 02:21:11 GMT
    ETag: 0x8DCDDD1E3AF2C76
    Server: Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
    x-ms-request-id: 5a3de9f4-401e-0076-22c2-0fdda2000000
    x-ms-version: 2009-09-19
    x-ms-lease-status: unlocked
    x-ms-blob-type: BlockBlob
    Date: Mon, 02 Dec 2024 13:59:33 GMT
    Connection: keep-alive
  • flag-us
    DNS
    www.microsoft.com
    Remote address:
    8.8.8.8:53
    Request
    www.microsoft.com
    IN A
    Response
    www.microsoft.com
    IN CNAME
    www.microsoft.com-c-3.edgekey.net
    www.microsoft.com-c-3.edgekey.net
    IN CNAME
    www.microsoft.com-c-3.edgekey.net.globalredir.akadns.net
    www.microsoft.com-c-3.edgekey.net.globalredir.akadns.net
    IN CNAME
    e13678.dscb.akamaiedge.net
    e13678.dscb.akamaiedge.net
    IN A
    23.41.213.121
  • flag-fr
    GET
    http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl
    Remote address:
    23.41.213.121:80
    Request
    GET /pkiops/crl/MicCodSigPCA2011_2011-07-08.crl HTTP/1.1
    Connection: Keep-Alive
    Accept: */*
    If-Modified-Since: Sun, 18 Aug 2024 00:23:49 GMT
    User-Agent: Microsoft-CryptoAPI/6.1
    Host: www.microsoft.com
    Response
    HTTP/1.1 200 OK
    Content-Length: 1078
    Content-Type: application/octet-stream
    Content-MD5: PjrtHAukbJio72s77Ag5mA==
    Last-Modified: Thu, 31 Oct 2024 23:26:09 GMT
    ETag: 0x8DCFA0366D6C4CA
    x-ms-request-id: 9ecb09d9-b01e-004d-34ee-2b9806000000
    x-ms-version: 2009-09-19
    x-ms-lease-status: unlocked
    x-ms-blob-type: BlockBlob
    Date: Mon, 02 Dec 2024 13:59:33 GMT
    Connection: keep-alive
    TLS_version: UNKNOWN
    ms-cv: CASMicrosoftCV334ff872.0
    ms-cv-esi: CASMicrosoftCV334ff872.0
    X-RTag: RT
  • flag-us
    GET
    https://myexternalip.com/raw
    b88ab587582517006609d2554572f9f4_JaffaCakes118.exe
    Remote address:
    34.160.111.145:443
    Request
    GET /raw HTTP/1.1
    User-Agent: o7HNYDMG7XxDD7ul0s32aOTf68ehROsU
    Host: myexternalip.com
    Cache-Control: no-cache
    Response
    HTTP/1.1 200 OK
    date: Mon, 02 Dec 2024 13:59:59 GMT
    content-type: text/plain; charset=utf-8
    Content-Length: 14
    access-control-allow-origin: *
    via: 1.1 google
    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
  • 50.7.74.172:443
    winscprt.exe
    152 B
    3
  • 127.0.0.1:49231
    winscprt.exe
  • 96.253.78.108:443
    winscprt.exe
    152 B
    3
  • 62.141.38.69:443
    winscprt.exe
    152 B
    3
  • 127.0.0.1:45808
    b88ab587582517006609d2554572f9f4_JaffaCakes118.exe
  • 163.172.176.167:443
    winscprt.exe
    152 B
    120 B
    3
    3
  • 86.59.21.38:443
    winscprt.exe
    152 B
    3
  • 85.235.250.88:443
    winscprt.exe
    152 B
    3
  • 127.0.0.1:45808
    b88ab587582517006609d2554572f9f4_JaffaCakes118.exe
  • 185.4.132.148:443
    www.n45sjaqmxit5rqzwmjfq7.com
    tls
    winscprt.exe
    43.4kB
    797.6kB
    345
    589
  • 109.105.109.162:60784
    www.ca63yse.com
    tls
    winscprt.exe
    597.1kB
    7.5MB
    3484
    5509
  • 157.90.183.103:9001
    www.wy5sxtpbhizm3y.com
    tls
    winscprt.exe
    474.5kB
    5.7MB
    2575
    4145
  • 157.90.183.103:9001
    www.effmt2ma2gq4rleily.com
    tls
    winscprt.exe
    15.4kB
    16.6kB
    37
    35
  • 109.105.109.162:60784
    www.boylan5.com
    tls
    winscprt.exe
    8.3kB
    11.0kB
    22
    28
  • 127.0.0.1:49351
    winscprt.exe
  • 65.108.3.114:1066
    www.6tjrpesizrqh2ekenaqnnixrb.com
    tls
    winscprt.exe
    24.2kB
    34.5kB
    57
    76
  • 144.76.81.198:8443
    www.wxg7mnao4tfm25c64rhf4p5.com
    tls
    winscprt.exe
    16.6kB
    20.2kB
    41
    48
  • 127.0.0.1:45808
    b88ab587582517006609d2554572f9f4_JaffaCakes118.exe
  • 34.160.111.145:443
    https://myexternalip.com/raw
    tls, http
    b88ab587582517006609d2554572f9f4_JaffaCakes118.exe
    936 B
    4.0kB
    10
    10

    HTTP Request

    GET https://myexternalip.com/raw

    HTTP Response

    200
  • 95.101.74.210:80
    http://r10.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRpD%2BQVZ%2B1vf7U0RGQGBm8JZwdxcgQUdKR2KRcYVIUxN75n5gZYwLzFBXICEgTngi%2FdvXWpmmH77a4ke5pYRA%3D%3D
    http
    b88ab587582517006609d2554572f9f4_JaffaCakes118.exe
    523 B
    1.9kB
    6
    4

    HTTP Request

    GET http://r10.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRpD%2BQVZ%2B1vf7U0RGQGBm8JZwdxcgQUdKR2KRcYVIUxN75n5gZYwLzFBXICEgTngi%2FdvXWpmmH77a4ke5pYRA%3D%3D

    HTTP Response

    200
  • 127.0.0.1:49450
    winscprt.exe
  • 94.23.172.32:444
    www.7inurglmkqqk6k.com
    tls
    winscprt.exe
    17.2kB
    27.4kB
    43
    53
  • 65.108.3.114:1066
    www.r226eh.com
    tls
    winscprt.exe
    19.3kB
    24.7kB
    43
    55
  • 127.0.0.1:45808
    b88ab587582517006609d2554572f9f4_JaffaCakes118.exe
  • 34.160.111.145:443
    https://myexternalip.com/raw
    tls, http
    b88ab587582517006609d2554572f9f4_JaffaCakes118.exe
    870 B
    3.9kB
    8
    9

    HTTP Request

    GET https://myexternalip.com/raw

    HTTP Response

    200
  • 104.124.11.17:80
    http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
    http
    399 B
    1.7kB
    4
    4

    HTTP Request

    GET http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl

    HTTP Response

    200
  • 23.41.213.121:80
    http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl
    http
    393 B
    1.7kB
    4
    4

    HTTP Request

    GET http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl

    HTTP Response

    200
  • 135.181.63.118:9100
    www.5johli6vgqhtq.com
    tls
    winscprt.exe
    3.0kB
    8.1kB
    11
    12
  • 127.0.0.1:49526
    winscprt.exe
  • 94.23.172.32:444
    www.nrqqhwha6hph.com
    tls
    winscprt.exe
    23.4kB
    27.4kB
    51
    69
  • 65.108.3.114:1066
    www.ftgzaejserm4oei.com
    tls
    winscprt.exe
    14.4kB
    20.8kB
    39
    50
  • 127.0.0.1:45808
    b88ab587582517006609d2554572f9f4_JaffaCakes118.exe
  • 34.160.111.145:443
    https://myexternalip.com/raw
    tls, http
    b88ab587582517006609d2554572f9f4_JaffaCakes118.exe
    870 B
    3.9kB
    8
    9

    HTTP Request

    GET https://myexternalip.com/raw

    HTTP Response

    200
  • 127.0.0.1:49594
    winscprt.exe
  • 185.220.101.48:20048
    winscprt.exe
    152 B
    80 B
    3
    2
  • 94.23.172.32:444
    www.gpbtrgz76tf2f57mrzuutn.com
    tls
    winscprt.exe
    3.0kB
    5.4kB
    9
    11
  • 8.8.8.8:53
    myexternalip.com
    dns
    b88ab587582517006609d2554572f9f4_JaffaCakes118.exe
    62 B
    78 B
    1
    1

    DNS Request

    myexternalip.com

    DNS Response

    34.160.111.145

  • 8.8.8.8:53
    r10.o.lencr.org
    dns
    b88ab587582517006609d2554572f9f4_JaffaCakes118.exe
    61 B
    272 B
    1
    1

    DNS Request

    r10.o.lencr.org

    DNS Response

    95.101.74.210
    95.101.74.198
    95.101.74.223
    95.101.74.218
    95.101.74.219
    95.101.74.199
    95.101.74.201
    95.101.74.217
    95.101.74.196

  • 8.8.8.8:53
    crl.microsoft.com
    dns
    63 B
    162 B
    1
    1

    DNS Request

    crl.microsoft.com

    DNS Response

    104.124.11.17
    104.124.11.58

  • 8.8.8.8:53
    www.microsoft.com
    dns
    63 B
    230 B
    1
    1

    DNS Request

    www.microsoft.com

    DNS Response

    23.41.213.121

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\89d22e83\tor\data\cached-certs

    Filesize

    20KB

    MD5

    4f85bfa3f905003b7f77309774653404

    SHA1

    3cf056921de5631d2df9b992c3b2d6169f23355a

    SHA256

    c00e96bb87763bc6d0ada5582afc7dba1217bfd1a83e8e3b01ad42a32e54fcea

    SHA512

    c9a501a930fd665b75728d8780568b11474a9ec5e65af26b3bcd1803c8b47919eab73e192e1e11460dd3c83278104dc2e40e44314869fed0e871d5f03883d14b

  • C:\Users\Admin\AppData\Local\89d22e83\tor\data\cached-microdesc-consensus.tmp

    Filesize

    2.8MB

    MD5

    0030ec38fb64384275255ed67bb74abe

    SHA1

    245c5b5fc9102f3fb73a442caad840663c3c98c2

    SHA256

    f48dc4b7791869e3d8a11420c100232a1f3ff3e95cfb4f926061c61a9ffccbda

    SHA512

    0d786a7786464006cb1d2d3740e1cd5da0aaba109d853fda92ce50bdd296667a140a1e81e614d612bb0a701324cf0b2ec514c2f932d585b836ebd3fb63552589

  • C:\Users\Admin\AppData\Local\89d22e83\tor\data\cached-microdescs

    Filesize

    20.4MB

    MD5

    8b0ab82b2b3fe5b9c3213b41e388a710

    SHA1

    4c8b24ba57517b53dfb6d3c404091fa8bcb69b8e

    SHA256

    8d96bf2e0d2a470891c835edbe5203f1ef3b88bebb49f06e78da272c89f8fe8c

    SHA512

    be9f7571c8c04671f380e2fedd18c5a3a79a11de8783d82b4ddcf66a733bf861d1474ac6f388f167e19d92af2ad4bc6230cb3c546de780c420680f8f0f7bece2

  • C:\Users\Admin\AppData\Local\89d22e83\tor\data\cached-microdescs.new

    Filesize

    20.4MB

    MD5

    90838f333af7b22b964bef8b22aade9f

    SHA1

    a57e48a416796297a41a4f6ecf086fa349d73696

    SHA256

    491dab0cac60477e170c80a8f65c90a9619e52a96a9cfb3a71cb5881154b5b75

    SHA512

    57fd8b9be4b88277aa17276077d8536b01d5d8c87878699f4ea30a20d4abbafba23a7c5778ee11cbb104aea3a3186b35b00ff7e80b60b5053a303f5c97e02691

  • C:\Users\Admin\AppData\Local\89d22e83\tor\data\cached-microdescs.new

    Filesize

    7.6MB

    MD5

    e9c41616912c34b6b59528779e5eb05f

    SHA1

    921709969c30880d31aaa1439f3d9e46d6d3e679

    SHA256

    94819c5ebbeb3b2aea240d3a908c49444e255341b87ee982caf41bb0f9c2e003

    SHA512

    ef3078a956158d264d723239349acff77e5b5a407de97ceeb25ea695cf10a728f280d662ecec746e28305692ab24cd3a7494384d9c1dcc6c9401157893fa3dae

  • C:\Users\Admin\AppData\Local\89d22e83\tor\data\state

    Filesize

    232B

    MD5

    d77472ffb7510c53967379874015c638

    SHA1

    d9850d931e85c88dbd5b2590fbd46d597c48d11b

    SHA256

    771e4f8dc6178fd7e117be8665467d2bbb48cfb625c1ad0b50f82fc83be9801b

    SHA512

    fdde1382fefad6804cbf9f86add6e9b5d69705f67e276dae4ec6e5aa703006c975eb45e37acbcbf90b88201d42a9f15ab69cdd6ebce19149b7112968308c5c31

  • C:\Users\Admin\AppData\Local\89d22e83\tor\data\state

    Filesize

    5KB

    MD5

    d43b3732d91e746d0c70c77176f4ddfa

    SHA1

    0030347845fa58489a934e14f56072d1aceb7a90

    SHA256

    5a5312ba3bdd16582e4a01b4cc48d8bab1974f5c1b7b222f9fda187e20fb9285

    SHA512

    78273f714277371af8093b508823154d4ebd0b9f5f34a97f4760f5d4406dec3defcae003a3c5a4bea3a3006ee6d77dd546363c7b0332c3df182a87ca35597fbc

  • C:\Users\Admin\AppData\Local\89d22e83\tor\data\state

    Filesize

    3KB

    MD5

    5bdbbff3fc3675e9e82b254c6a56f9b2

    SHA1

    13b422dc199b10f3adaf944551340a6e00515da4

    SHA256

    a04f4d5a8d4077420b88862e688aeed34637d7a24b6587150283a73c059677c1

    SHA512

    b952dcaf995d1916d6f276604bc541bf2ddfff16f5412f339c3db9c5eb4f13d0b3224cf6663d5a43734596ea717715e040fb4a3c09237a6fed214d03e6d6d9cf

  • C:\Users\Admin\AppData\Local\89d22e83\tor\libcrypto-1_1.dll

    Filesize

    1.7MB

    MD5

    2384a02c4a1f7ec481adde3a020607d3

    SHA1

    7e848d35a10bf9296c8fa41956a3daa777f86365

    SHA256

    c8db0ff0f7047ed91b057005e86ad3a23eae616253313aa047c560d9eb398369

    SHA512

    1ac74dd2d863acd7415ef8b9490a5342865462fbabdad0645da22424b0d56f5e9c389a3d7c41386f2414d6c4715c79a6ddecb6e6cff29e98319e1fd1060f4503

  • C:\Users\Admin\AppData\Local\89d22e83\tor\libevent-2-1-6.dll

    Filesize

    366KB

    MD5

    099983c13bade9554a3c17484e5481f1

    SHA1

    a84e69ad9722f999252d59d0ed9a99901a60e564

    SHA256

    b65f9aa0c7912af64bd9b05e9322e994339a11b0c8907e6a6166d7b814bda838

    SHA512

    89f1a963de77873296395662d4150e3eff7a2d297fb9ec54ec06aa2e40d41e5f4fc4611e9bc34126d760c9134f2907fea3bebdf2fbbd7eaddad99f8e4be1f5e2

  • C:\Users\Admin\AppData\Local\89d22e83\tor\libgcc_s_sjlj-1.dll

    Filesize

    286KB

    MD5

    b0d98f7157d972190fe0759d4368d320

    SHA1

    5715a533621a2b642aad9616e603c6907d80efc4

    SHA256

    2922193133dabab5b82088d4e87484e2fac75e9e0c765dacaf22eb5f4f18b0c5

    SHA512

    41ce56c428158533bf8b8ffe0a71875b5a3abc549b88d7d3e69acc6080653abea344d6d66fff39c04bf019fcaa295768d620377d85a933ddaf17f3d90df29496

  • C:\Users\Admin\AppData\Local\89d22e83\tor\libssl-1_1.dll

    Filesize

    439KB

    MD5

    c88826ac4bb879622e43ead5bdb95aeb

    SHA1

    87d29853649a86f0463bfd9ad887b85eedc21723

    SHA256

    c4d898b1a4285a45153af9ed88d79aa2a073dcb7225961b6b276b532b4d18b6f

    SHA512

    f733041ef35b9b8058fbcf98faa0d1fea5c0858fea941ecebbe9f083cd73e3e66323afffd8d734097fcdd5e6e59db4d94f51fca5874edbcd2a382d9ba6cd97b3

  • C:\Users\Admin\AppData\Local\89d22e83\tor\libwinpthread-1.dll

    Filesize

    188KB

    MD5

    d407cc6d79a08039a6f4b50539e560b8

    SHA1

    21171adbc176dc19aaa5e595cd2cd4bd1dfd0c71

    SHA256

    92cfd0277c8781a15a0f17b7aee6cff69631b9606a001101631f04b3381efc4e

    SHA512

    378a10fed915591445d97c6d04e82d28008d8ea65e0e40c142b8ee59867035d561d4e103495c8f0d9c19b51597706ce0b450c25516aa0f1744579ffcd097ae0c

  • C:\Users\Admin\AppData\Local\89d22e83\tor\torrc

    Filesize

    157B

    MD5

    644896c07049391168b23e7cbd46dcf0

    SHA1

    4dbdc7933b3984b6894ba5b05952de68586ef734

    SHA256

    a09a2fa3765c77e7dfdacc46f16da82448131b6d44754cdf984bc5b5aeb0d12f

    SHA512

    20faaa8ce578d9a11d4b86308a797a95d7d0757e120807b42d504b1a799dfc3131d3c3ab7610467cc4f4573ad35117c008b43b90996725b9f22647d5679decbb

  • C:\Users\Admin\AppData\Local\89d22e83\tor\zlib1.dll

    Filesize

    52KB

    MD5

    add33041af894b67fe34e1dc819b7eb6

    SHA1

    6db46eb021855a587c95479422adcc774a272eeb

    SHA256

    8688bd7ca55dcc0c23c429762776a0a43fe5b0332dfd5b79ef74e55d4bbc1183

    SHA512

    bafc441198d03f0e7fe804bab89283c389d38884d0f87d81b11950a9b79fcbf7b32be4bb16f4fcd9179b66f865c563c172a46b4514a6087ef0af64425a4b2cfa

  • \Users\Admin\AppData\Local\89d22e83\tor\libssp-0.dll

    Filesize

    88KB

    MD5

    2c916456f503075f746c6ea649cf9539

    SHA1

    fa1afc1f3d728c89b2e90e14ca7d88b599580a9d

    SHA256

    cbb5236d923d4f4baf2f0d2797c72a2cbae42ef7ac0acce786daf5fdc5b456e6

    SHA512

    1c1995e1aa7c33c597c64122395275861d9219e46d45277d4f1768a2e06227b353d5d77d6b7cb655082dc6fb9736ad6f7cfcc0c90e02776e27d50857e792e3fd

  • \Users\Admin\AppData\Local\89d22e83\tor\winscprt.exe

    Filesize

    973KB

    MD5

    5cfe61ff895c7daa889708665ef05d7b

    SHA1

    5e58efe30406243fbd58d4968b0492ddeef145f2

    SHA256

    f9c1d18b50ce7484bf212cb61a9035602cfb90ebdfe66a077b9f6df73196a9f5

    SHA512

    43b6f10391a863a21f70e05cee41900729c7543750e118ff5d74c0cac3d1383f10bcb73eade2a28b555a393cada4795e204246129b01ad9177d1167827dd68da

  • memory/1100-63-0x00000000013A0000-0x00000000017A4000-memory.dmp

    Filesize

    4.0MB

  • memory/1100-125-0x00000000013A0000-0x00000000017A4000-memory.dmp

    Filesize

    4.0MB

  • memory/1100-39-0x0000000073F70000-0x000000007403E000-memory.dmp

    Filesize

    824KB

  • memory/1100-21-0x00000000013A0000-0x00000000017A4000-memory.dmp

    Filesize

    4.0MB

  • memory/1100-46-0x00000000013A0000-0x00000000017A4000-memory.dmp

    Filesize

    4.0MB

  • memory/1100-47-0x0000000074220000-0x00000000744EF000-memory.dmp

    Filesize

    2.8MB

  • memory/1100-48-0x0000000074780000-0x00000000747C9000-memory.dmp

    Filesize

    292KB

  • memory/1100-50-0x0000000074150000-0x0000000074218000-memory.dmp

    Filesize

    800KB

  • memory/1100-36-0x00000000746F0000-0x0000000074778000-memory.dmp

    Filesize

    544KB

  • memory/1100-51-0x0000000074040000-0x000000007414A000-memory.dmp

    Filesize

    1.0MB

  • memory/1100-52-0x00000000746F0000-0x0000000074778000-memory.dmp

    Filesize

    544KB

  • memory/1100-53-0x0000000073F70000-0x000000007403E000-memory.dmp

    Filesize

    824KB

  • memory/1100-54-0x00000000013A0000-0x00000000017A4000-memory.dmp

    Filesize

    4.0MB

  • memory/1100-33-0x0000000074040000-0x000000007414A000-memory.dmp

    Filesize

    1.0MB

  • memory/1100-30-0x0000000074150000-0x0000000074218000-memory.dmp

    Filesize

    800KB

  • memory/1100-26-0x0000000074780000-0x00000000747C9000-memory.dmp

    Filesize

    292KB

  • memory/1100-25-0x0000000074220000-0x00000000744EF000-memory.dmp

    Filesize

    2.8MB

  • memory/1100-83-0x00000000013A0000-0x00000000017A4000-memory.dmp

    Filesize

    4.0MB

  • memory/1100-42-0x0000000074820000-0x0000000074844000-memory.dmp

    Filesize

    144KB

  • memory/1100-108-0x00000000013A0000-0x00000000017A4000-memory.dmp

    Filesize

    4.0MB

  • memory/1792-367-0x0000000004D40000-0x0000000004D4A000-memory.dmp

    Filesize

    40KB

  • memory/1792-139-0x0000000000400000-0x0000000000BD8000-memory.dmp

    Filesize

    7.8MB

  • memory/1792-366-0x0000000004D40000-0x0000000004D4A000-memory.dmp

    Filesize

    40KB

  • memory/1792-41-0x0000000004040000-0x0000000004444000-memory.dmp

    Filesize

    4.0MB

  • memory/1792-295-0x0000000005970000-0x0000000005D74000-memory.dmp

    Filesize

    4.0MB

  • memory/1792-357-0x0000000005970000-0x0000000005D74000-memory.dmp

    Filesize

    4.0MB

  • memory/1792-18-0x0000000004040000-0x0000000004444000-memory.dmp

    Filesize

    4.0MB

  • memory/1792-306-0x0000000004D40000-0x0000000004D4A000-memory.dmp

    Filesize

    40KB

  • memory/1792-270-0x0000000004D40000-0x0000000004D4A000-memory.dmp

    Filesize

    40KB

  • memory/1792-71-0x0000000000400000-0x0000000000BD8000-memory.dmp

    Filesize

    7.8MB

  • memory/1792-230-0x0000000005970000-0x0000000005D74000-memory.dmp

    Filesize

    4.0MB

  • memory/1792-62-0x0000000000400000-0x0000000000BD8000-memory.dmp

    Filesize

    7.8MB

  • memory/1792-271-0x0000000004D40000-0x0000000004D4A000-memory.dmp

    Filesize

    40KB

  • memory/1792-140-0x0000000004BE0000-0x0000000004FE4000-memory.dmp

    Filesize

    4.0MB

  • memory/1792-161-0x0000000004BE0000-0x0000000004FE4000-memory.dmp

    Filesize

    4.0MB

  • memory/1792-247-0x0000000005970000-0x0000000005D74000-memory.dmp

    Filesize

    4.0MB

  • memory/1792-244-0x0000000000CD0000-0x0000000000CDA000-memory.dmp

    Filesize

    40KB

  • memory/1792-243-0x0000000000CD0000-0x0000000000CDA000-memory.dmp

    Filesize

    40KB

  • memory/1792-334-0x0000000004D40000-0x0000000004D4A000-memory.dmp

    Filesize

    40KB

  • memory/1792-49-0x0000000000400000-0x0000000000BD8000-memory.dmp

    Filesize

    7.8MB

  • memory/1792-311-0x0000000005970000-0x0000000005D74000-memory.dmp

    Filesize

    4.0MB

  • memory/1792-193-0x0000000000CD0000-0x0000000000CDA000-memory.dmp

    Filesize

    40KB

  • memory/1792-192-0x0000000000CD0000-0x0000000000CDA000-memory.dmp

    Filesize

    40KB

  • memory/1792-0-0x0000000000400000-0x0000000000BD8000-memory.dmp

    Filesize

    7.8MB

  • memory/1792-17-0x0000000004040000-0x0000000004444000-memory.dmp

    Filesize

    4.0MB

  • memory/1792-308-0x0000000004D40000-0x0000000004D4A000-memory.dmp

    Filesize

    40KB

  • memory/2268-359-0x0000000074220000-0x00000000744EF000-memory.dmp

    Filesize

    2.8MB

  • memory/2268-363-0x00000000746F0000-0x0000000074778000-memory.dmp

    Filesize

    544KB

  • memory/2268-360-0x0000000074780000-0x00000000747C9000-memory.dmp

    Filesize

    292KB

  • memory/2268-361-0x0000000074150000-0x0000000074218000-memory.dmp

    Filesize

    800KB

  • memory/2268-362-0x0000000074040000-0x000000007414A000-memory.dmp

    Filesize

    1.0MB

  • memory/2268-364-0x0000000073F70000-0x000000007403E000-memory.dmp

    Filesize

    824KB

  • memory/2268-365-0x0000000074820000-0x0000000074844000-memory.dmp

    Filesize

    144KB

  • memory/2268-358-0x00000000013A0000-0x00000000017A4000-memory.dmp

    Filesize

    4.0MB

  • memory/2296-236-0x00000000746F0000-0x0000000074778000-memory.dmp

    Filesize

    544KB

  • memory/2296-238-0x0000000074820000-0x0000000074844000-memory.dmp

    Filesize

    144KB

  • memory/2296-237-0x0000000073F70000-0x000000007403E000-memory.dmp

    Filesize

    824KB

  • memory/2296-235-0x0000000074040000-0x000000007414A000-memory.dmp

    Filesize

    1.0MB

  • memory/2296-248-0x00000000013A0000-0x00000000017A4000-memory.dmp

    Filesize

    4.0MB

  • memory/2296-249-0x0000000074220000-0x00000000744EF000-memory.dmp

    Filesize

    2.8MB

  • memory/2296-251-0x0000000073F70000-0x000000007403E000-memory.dmp

    Filesize

    824KB

  • memory/2296-250-0x0000000074150000-0x0000000074218000-memory.dmp

    Filesize

    800KB

  • memory/2296-234-0x0000000074150000-0x0000000074218000-memory.dmp

    Filesize

    800KB

  • memory/2296-231-0x00000000013A0000-0x00000000017A4000-memory.dmp

    Filesize

    4.0MB

  • memory/2296-281-0x00000000013A0000-0x00000000017A4000-memory.dmp

    Filesize

    4.0MB

  • memory/2296-232-0x0000000074220000-0x00000000744EF000-memory.dmp

    Filesize

    2.8MB

  • memory/2296-233-0x0000000074780000-0x00000000747C9000-memory.dmp

    Filesize

    292KB

  • memory/2424-166-0x00000000013A0000-0x00000000017A4000-memory.dmp

    Filesize

    4.0MB

  • memory/2424-144-0x0000000074150000-0x0000000074218000-memory.dmp

    Filesize

    800KB

  • memory/2424-141-0x00000000013A0000-0x00000000017A4000-memory.dmp

    Filesize

    4.0MB

  • memory/2424-148-0x0000000074820000-0x0000000074844000-memory.dmp

    Filesize

    144KB

  • memory/2424-147-0x0000000073F70000-0x000000007403E000-memory.dmp

    Filesize

    824KB

  • memory/2424-146-0x0000000074040000-0x000000007414A000-memory.dmp

    Filesize

    1.0MB

  • memory/2424-145-0x00000000746F0000-0x0000000074778000-memory.dmp

    Filesize

    544KB

  • memory/2424-163-0x0000000074220000-0x00000000744EF000-memory.dmp

    Filesize

    2.8MB

  • memory/2424-143-0x0000000074780000-0x00000000747C9000-memory.dmp

    Filesize

    292KB

  • memory/2424-229-0x00000000013A0000-0x00000000017A4000-memory.dmp

    Filesize

    4.0MB

  • memory/2424-175-0x00000000013A0000-0x00000000017A4000-memory.dmp

    Filesize

    4.0MB

  • memory/2424-142-0x0000000074220000-0x00000000744EF000-memory.dmp

    Filesize

    2.8MB

  • memory/2424-162-0x00000000013A0000-0x00000000017A4000-memory.dmp

    Filesize

    4.0MB

  • memory/2424-165-0x0000000073F70000-0x000000007403E000-memory.dmp

    Filesize

    824KB

  • memory/2424-164-0x0000000074150000-0x0000000074218000-memory.dmp

    Filesize

    800KB

  • memory/2500-302-0x00000000741B0000-0x000000007427E000-memory.dmp

    Filesize

    824KB

  • memory/2500-344-0x00000000013A0000-0x00000000017A4000-memory.dmp

    Filesize

    4.0MB

  • memory/2500-313-0x0000000073120000-0x00000000733EF000-memory.dmp

    Filesize

    2.8MB

  • memory/2500-315-0x00000000741B0000-0x000000007427E000-memory.dmp

    Filesize

    824KB

  • memory/2500-314-0x0000000074420000-0x00000000744E8000-memory.dmp

    Filesize

    800KB

  • memory/2500-312-0x00000000013A0000-0x00000000017A4000-memory.dmp

    Filesize

    4.0MB

  • memory/2500-303-0x00000000747A0000-0x00000000747C4000-memory.dmp

    Filesize

    144KB

  • memory/2500-300-0x0000000074310000-0x000000007441A000-memory.dmp

    Filesize

    1.0MB

  • memory/2500-301-0x0000000074280000-0x0000000074308000-memory.dmp

    Filesize

    544KB

  • memory/2500-296-0x00000000013A0000-0x00000000017A4000-memory.dmp

    Filesize

    4.0MB

  • memory/2500-297-0x0000000073120000-0x00000000733EF000-memory.dmp

    Filesize

    2.8MB

  • memory/2500-298-0x0000000074730000-0x0000000074779000-memory.dmp

    Filesize

    292KB

  • memory/2500-299-0x0000000074420000-0x00000000744E8000-memory.dmp

    Filesize

    800KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.