Analysis

  • max time kernel
    151s
  • max time network
    112s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    03-12-2020 07:47

General

  • Target

    313f90db50cc3d4164b90d648b83cd75.exe

  • Size

    671KB

  • MD5

    313f90db50cc3d4164b90d648b83cd75

  • SHA1

    f861f285705a4eb7ef51de27baef8dae05c36e15

  • SHA256

    69057a29d94d0ae3e51c435df396178b093d057db5addcdb273dcd5aedc6e1ef

  • SHA512

    cb0acb7106a328a83848812e85d7f998e5c0ef0780b4f0c20ab33cf046053202c265c40d7f68ee156d2ad4f80c114529ef8d8e793302d45991337a5cf37d1546

Malware Config

Signatures

  • CryptBot

    A C++ stealer distributed widely in bundle with other software.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Detected Stratum cryptominer command

    Looks to be attempting to contact Stratum mining pool.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • XMRig Miner Payload 4 IoCs
  • Blocklisted process makes network request 5 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 15 IoCs
  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 5 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 49 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 3 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 17 IoCs
  • Suspicious use of SendNotifyMessage 15 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\313f90db50cc3d4164b90d648b83cd75.exe
    "C:\Users\Admin\AppData\Local\Temp\313f90db50cc3d4164b90d648b83cd75.exe"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1408
    • C:\Users\Admin\AppData\Local\Temp\File2.exe
      "C:\Users\Admin\AppData\Local\Temp\File2.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:308
      • C:\Program Files (x86)\solfer\boleroh\lvfuk.exe
        "C:\Program Files (x86)\solfer\boleroh\lvfuk.exe"
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Checks processor information in registry
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        PID:564
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\ssoujhvp.exe"
          4⤵
          • Loads dropped DLL
          PID:2788
          • C:\Users\Admin\AppData\Local\Temp\ssoujhvp.exe
            "C:\Users\Admin\AppData\Local\Temp\ssoujhvp.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:2820
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\SSOUJH~1.DLL,Z C:\Users\Admin\AppData\Local\Temp\ssoujhvp.exe
              6⤵
              • Loads dropped DLL
              PID:2904
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\rjoviybjtpkn.vbs"
          4⤵
            PID:2800
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\rjoviybjtpkn.vbs"
              5⤵
              • Blocklisted process makes network request
              • Modifies system certificate store
              PID:2880
        • C:\Program Files (x86)\solfer\6las.exe
          "C:\Program Files (x86)\solfer\6las.exe"
          3⤵
          • Executes dropped EXE
          • Checks BIOS information in registry
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:748
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\ebxahtgsydywp & timeout 2 & del /f /q "C:\Program Files (x86)\solfer\6las.exe"
            4⤵
              PID:2492
              • C:\Windows\SysWOW64\timeout.exe
                timeout 2
                5⤵
                • Delays execution with timeout.exe
                PID:2576
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\ebxahtgsydywp & timeout 2 & del /f /q "C:\Program Files (x86)\solfer\6las.exe"
              4⤵
                PID:2536
                • C:\Windows\SysWOW64\timeout.exe
                  timeout 2
                  5⤵
                  • Delays execution with timeout.exe
                  PID:2624
            • C:\Program Files (x86)\solfer\4ger.exe
              "C:\Program Files (x86)\solfer\4ger.exe"
              3⤵
              • Executes dropped EXE
              • Checks BIOS information in registry
              • Drops startup file
              • Identifies Wine through registry keys
              • Loads dropped DLL
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:820
              • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
                "C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"
                4⤵
                • Executes dropped EXE
                • Checks BIOS information in registry
                • Identifies Wine through registry keys
                • Loads dropped DLL
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: AddClipboardFormatListener
                • Suspicious behavior: EnumeratesProcesses
                PID:2228
            • C:\Program Files (x86)\solfer\startveu.exe
              "C:\Program Files (x86)\solfer\startveu.exe"
              3⤵
              • Executes dropped EXE
              • Checks BIOS information in registry
              • Identifies Wine through registry keys
              • Loads dropped DLL
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:2144
              • C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt
                C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"
                4⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:2524
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"
                4⤵
                  PID:2660
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"
                    5⤵
                    • Creates scheduled task(s)
                    PID:2688
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\UQVNKLsrA5 & timeout 2 & del /f /q "C:\Users\Admin\AppData\Local\Temp\313f90db50cc3d4164b90d648b83cd75.exe"
              2⤵
              • Deletes itself
              • Suspicious use of WriteProcessMemory
              PID:980
              • C:\Windows\SysWOW64\timeout.exe
                timeout 2
                3⤵
                • Delays execution with timeout.exe
                PID:1080
          • C:\Windows\system32\taskeng.exe
            taskeng.exe {AB1A6BCA-77F6-4920-B2E3-BE6DE820EC51} S-1-5-21-3825035466-2522850611-591511364-1000:EIDQHRRL\Admin:Interactive:[1]
            1⤵
              PID:2944
              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
                C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe -SystemCheck
                2⤵
                • Executes dropped EXE
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                PID:2988
              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
                C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe -SystemCheck
                2⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: GetForegroundWindowSpam
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                PID:2980
                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
                  7z e -p"DxSqsNKKOxqPrM4Y3xeK" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor.tmp" -o"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\"
                  3⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3016
                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\tor.exe
                  "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\tor.exe" -f TorConfig
                  3⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1368
                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
                  7z e -p"DxSqsNKKOxqPrM4Y3xeK" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SysBackup.tmp" -o"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\"
                  3⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2844
                • C:\Windows\SysWOW64\attrib.exe
                  -o stratum+tcp://Nipan.hk:8888 -u 0001 -p x -t 1
                  3⤵
                  • Suspicious use of AdjustPrivilegeToken
                  • Views/modifies file attributes
                  PID:280
              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
                C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe -SystemCheck
                2⤵
                • Executes dropped EXE
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                PID:2680
              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
                C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe -SystemCheck
                2⤵
                • Executes dropped EXE
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                PID:2664

            Network

            MITRE ATT&CK Matrix ATT&CK v6

            Execution

            Scheduled Task

            1
            T1053

            Persistence

            Scheduled Task

            1
            T1053

            Hidden Files and Directories

            1
            T1158

            Privilege Escalation

            Scheduled Task

            1
            T1053

            Defense Evasion

            Virtualization/Sandbox Evasion

            2
            T1497

            Install Root Certificate

            1
            T1130

            Modify Registry

            1
            T1112

            Hidden Files and Directories

            1
            T1158

            Credential Access

            Credentials in Files

            2
            T1081

            Discovery

            Query Registry

            5
            T1012

            Virtualization/Sandbox Evasion

            2
            T1497

            System Information Discovery

            3
            T1082

            Collection

            Data from Local System

            2
            T1005

            Command and Control

            Web Service

            1
            T1102

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\solfer\4ger.exe
              MD5

              1b482bf0134c52d93039eb961d2e8077

              SHA1

              98488275e5ebd98bc53327956670521cf33f6d22

              SHA256

              86c95550820bf9627e81f256652d482e07f0cfb40504cd319727953197448fd7

              SHA512

              22bfcc05e1ccc8e7ce84598ba7cdfbca143971b5d48b55636b3d794b21483bc948977f5686ce2add1c416f5241908fcacbba96d8ced8cc074605dd6e778f9952

            • C:\Program Files (x86)\solfer\4ger.exe
            • C:\Program Files (x86)\solfer\6las.exe
            • C:\Program Files (x86)\solfer\6las.exe
              MD5

              cf3de7cc91e95a144227364f30736911

              SHA1

              4b9373d0dea078c5a86b6c9258d86f49bb3d8ac4

              SHA256

              5526d3dfc1a497cca23c282a2db8a9ae275fa481ef027f2b5752aaea504d6bbe

              SHA512

              a73c67740f27cab24939474ff55d603fdb2d749d3f868605d305b836256e27ed5f9eb104925d6d32a77eb8de94ec286745b7cd94497cb78ef8c603d74735d3bb

            • C:\Program Files (x86)\solfer\boleroh\lvfuk.exe
              MD5

              64a76236492b14194d6bc86d85d94259

              SHA1

              b6e3f70b2c30b45353f5a98ce6aed407b89dd9f1

              SHA256

              23192ee63ad9c1159acf200c6d51f7b92e74a980630f25a02df23b8e7abf6521

              SHA512

              c94f00e6fe7f6d1c1d96d97d6b91c4c49f404bdac2db3e06fb19116a5091fee88408f202aca0af57a3bbfdb47451469f83ac58bfeddad4475bf586ff0f81448e

            • C:\Program Files (x86)\solfer\boleroh\lvfuk.exe
              MD5

              64a76236492b14194d6bc86d85d94259

              SHA1

              b6e3f70b2c30b45353f5a98ce6aed407b89dd9f1

              SHA256

              23192ee63ad9c1159acf200c6d51f7b92e74a980630f25a02df23b8e7abf6521

              SHA512

              c94f00e6fe7f6d1c1d96d97d6b91c4c49f404bdac2db3e06fb19116a5091fee88408f202aca0af57a3bbfdb47451469f83ac58bfeddad4475bf586ff0f81448e

            • C:\Program Files (x86)\solfer\startveu.exe
            • C:\Program Files (x86)\solfer\startveu.exe
            • C:\ProgramData\ebxahtgsydywp\46173476.txt
            • C:\ProgramData\ebxahtgsydywp\8372422.txt
            • C:\ProgramData\ebxahtgsydywp\Files\_INFOR~1.TXT
            • C:\ProgramData\ebxahtgsydywp\NL_202~1.ZIP
            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
            • C:\Users\Admin\AppData\Local\Temp\32.exe
            • C:\Users\Admin\AppData\Local\Temp\64.exe
            • C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt
            • C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt
            • C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt
            • C:\Users\Admin\AppData\Local\Temp\File2.exe
              MD5

              810e25cc339feaae512e60b98da0a8fc

              SHA1

              46947273eecf22ab2b47492c5691b8297f564781

              SHA256

              d572f5ea3a8bb203dbb26c62bcbffbfbfc3e285560893135eebbf227f124e488

              SHA512

              b236ae60cc04d2c60c2944b70a3bea895ee106b2591838b1a450a2f0dc4898d4e2df768837041e508ec0ecc1242c3317b633f1f00ad927326718f5e0763e6394

            • C:\Users\Admin\AppData\Local\Temp\File2.exe
              MD5

              810e25cc339feaae512e60b98da0a8fc

              SHA1

              46947273eecf22ab2b47492c5691b8297f564781

              SHA256

              d572f5ea3a8bb203dbb26c62bcbffbfbfc3e285560893135eebbf227f124e488

              SHA512

              b236ae60cc04d2c60c2944b70a3bea895ee106b2591838b1a450a2f0dc4898d4e2df768837041e508ec0ecc1242c3317b633f1f00ad927326718f5e0763e6394

            • C:\Users\Admin\AppData\Local\Temp\SSOUJH~1.DLL
            • C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml
            • C:\Users\Admin\AppData\Local\Temp\UQVNKLsrA5\CMNREQ~1.ZIP
              MD5

              29c3b6838e85e970e5e7b16314d334d4

              SHA1

              c47736d3d1b636a164919b3513160883930c6d5b

              SHA256

              6c9cae97fa0a33804997f2b3531d1070c3864d83674871e4a7df3646a2628f18

              SHA512

              6a82c35b471aed11b0aa648513b9692d477f7118ace9d6a309ada4989b6c7d78b8e777c37f86ba6d2064260c3aba3904cf41fb601299e7b25b93df2513cec2c5

            • C:\Users\Admin\AppData\Local\Temp\UQVNKLsrA5\FIUOAK~1.ZIP
              MD5

              2a363b6cfd88aae9a34bb2888f04c23f

              SHA1

              030e57267e6838ab1b0ee859c93b295251ba96e3

              SHA256

              8cf8b060823de79ba2c3e3b473bb41eca1649ca8636d12703091c30ff3492c93

              SHA512

              b39d240ffc0539ad3d72ca6d6b155a92c393cbb6f9d1702750abdba771b9bca36d7000213d3bc0990a3d2eb995247f0104e7a36e9b60f9241b21993998639687

            • C:\Users\Admin\AppData\Local\Temp\UQVNKLsrA5\_Files\_Files\DISABL~1.TXT
              MD5

              5c18e5ff2ea51f20e99e059aad8a03a5

              SHA1

              d1d6851ac3b3560f2b87986608cf89f6f34ff01c

              SHA256

              cf3e25ddb334af566fd1148eea16a578c45d81ab9dbf283302d858d2c5549bed

              SHA512

              e83c8bb06bb57f150d2d5e320c326c37203a58ebfb63b0667e3d62ea28f8415a2575907a0cb2609887b8cede7c7355a2a0696ce02b4a76620ae3fb9d9016f712

            • C:\Users\Admin\AppData\Local\Temp\UQVNKLsrA5\_Files\_INFOR~1.TXT
              MD5

              1f4c5f83ed5aa5d0f9a0e8d4929359b9

              SHA1

              ec157bae3851c52c4a4ec04c9f00a27694d1a902

              SHA256

              8782c33b42b1d0e24498596f5da641baa83f8fe0951b7cf85d64d74cca058021

              SHA512

              5ed154bf503772fffeaed5a0ef9d6c5a8fb64deab8686f8502996abab70bd0962b1d8719729e67b7abbd07437a2525fd9e3e7e493ae71dff1b2c34e97c792a32

            • C:\Users\Admin\AppData\Local\Temp\UQVNKLsrA5\_Files\_SCREE~1.JPE
              MD5

              9b9a98e0b9f84f63de6a97c31c335507

              SHA1

              25f3a7f7f87432a8ad963800890d8a66af22d403

              SHA256

              46462bd7851b3019e31d432a1b8f6addd168c84f5e9c146d6adddef9f3a0a621

              SHA512

              2bc63be90697bc191460538dd74a26179bec413acaac5b435f598265a3cdeabcb09e7443694cb445de95e2e0ecf4a66f827470e6c471cad896c9e3210371d13e

            • C:\Users\Admin\AppData\Local\Temp\UQVNKLsrA5\files_\SCREEN~1.JPG
              MD5

              9b9a98e0b9f84f63de6a97c31c335507

              SHA1

              25f3a7f7f87432a8ad963800890d8a66af22d403

              SHA256

              46462bd7851b3019e31d432a1b8f6addd168c84f5e9c146d6adddef9f3a0a621

              SHA512

              2bc63be90697bc191460538dd74a26179bec413acaac5b435f598265a3cdeabcb09e7443694cb445de95e2e0ecf4a66f827470e6c471cad896c9e3210371d13e

            • C:\Users\Admin\AppData\Local\Temp\UQVNKLsrA5\files_\SYSTEM~1.TXT
              MD5

              2cac18ab000a42116fcf338855797477

              SHA1

              90823a81339bba4e42bd8fc965337343d29f6b3f

              SHA256

              8dac433f5903be0bb2293cc3c4efc6409397da2417192830c471e1b223c872ba

              SHA512

              8e1b524cd9b285ddd7ef4a421073ca8ccc43d7e01c129f781a1b2f57947d21f7167af21a5e57dbf63575ece1a398d16f8c1a2c60ae6c8db34a99b3927375f79a

            • C:\Users\Admin\AppData\Local\Temp\UQVNKLsrA5\files_\files\DISABL~1.TXT
              MD5

              5c18e5ff2ea51f20e99e059aad8a03a5

              SHA1

              d1d6851ac3b3560f2b87986608cf89f6f34ff01c

              SHA256

              cf3e25ddb334af566fd1148eea16a578c45d81ab9dbf283302d858d2c5549bed

              SHA512

              e83c8bb06bb57f150d2d5e320c326c37203a58ebfb63b0667e3d62ea28f8415a2575907a0cb2609887b8cede7c7355a2a0696ce02b4a76620ae3fb9d9016f712

            • C:\Users\Admin\AppData\Local\Temp\rjoviybjtpkn.vbs
            • C:\Users\Admin\AppData\Local\Temp\ssoujhvp.exe
            • C:\Users\Admin\AppData\Local\Temp\ssoujhvp.exe
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SysBackup.tmp
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SysBackup.txt
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor.tmp
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\LIBEAY32.dll
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\SSLEAY32.dll
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\TorDataSocksListenAddress 127.0.0.1\cached-certs
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\TorDataSocksListenAddress 127.0.0.1\cached-microdesc-consensus
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\TorDataSocksListenAddress 127.0.0.1\cached-microdescs.new
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\TorDataSocksListenAddress 127.0.0.1\state
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\TorData\Tor.pid
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\TorData\TorConfig
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libevent-2-1-6.dll
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libevent_core-2-1-6.dll
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libevent_extra-2-1-6.dll
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libgcc_s_sjlj-1.dll
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libgmp-10.dll
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libssp-0.dll
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libwinpthread-1.dll
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\tor.exe
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\tor.exe
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\zlib1.dll
            • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
            • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
            • \Program Files (x86)\solfer\4ger.exe
              MD5

              1b482bf0134c52d93039eb961d2e8077

              SHA1

              98488275e5ebd98bc53327956670521cf33f6d22

              SHA256

              86c95550820bf9627e81f256652d482e07f0cfb40504cd319727953197448fd7

              SHA512

              22bfcc05e1ccc8e7ce84598ba7cdfbca143971b5d48b55636b3d794b21483bc948977f5686ce2add1c416f5241908fcacbba96d8ced8cc074605dd6e778f9952

            • \Program Files (x86)\solfer\4ger.exe
              MD5

              1b482bf0134c52d93039eb961d2e8077

              SHA1

              98488275e5ebd98bc53327956670521cf33f6d22

              SHA256

              86c95550820bf9627e81f256652d482e07f0cfb40504cd319727953197448fd7

              SHA512

              22bfcc05e1ccc8e7ce84598ba7cdfbca143971b5d48b55636b3d794b21483bc948977f5686ce2add1c416f5241908fcacbba96d8ced8cc074605dd6e778f9952

            • \Program Files (x86)\solfer\4ger.exe
            • \Program Files (x86)\solfer\4ger.exe
            • \Program Files (x86)\solfer\4ger.exe
              MD5

              1b482bf0134c52d93039eb961d2e8077

              SHA1

              98488275e5ebd98bc53327956670521cf33f6d22

              SHA256

              86c95550820bf9627e81f256652d482e07f0cfb40504cd319727953197448fd7

              SHA512

              22bfcc05e1ccc8e7ce84598ba7cdfbca143971b5d48b55636b3d794b21483bc948977f5686ce2add1c416f5241908fcacbba96d8ced8cc074605dd6e778f9952

            • \Program Files (x86)\solfer\6las.exe
              MD5

              cf3de7cc91e95a144227364f30736911

              SHA1

              4b9373d0dea078c5a86b6c9258d86f49bb3d8ac4

              SHA256

              5526d3dfc1a497cca23c282a2db8a9ae275fa481ef027f2b5752aaea504d6bbe

              SHA512

              a73c67740f27cab24939474ff55d603fdb2d749d3f868605d305b836256e27ed5f9eb104925d6d32a77eb8de94ec286745b7cd94497cb78ef8c603d74735d3bb

            • \Program Files (x86)\solfer\6las.exe
              MD5

              cf3de7cc91e95a144227364f30736911

              SHA1

              4b9373d0dea078c5a86b6c9258d86f49bb3d8ac4

              SHA256

              5526d3dfc1a497cca23c282a2db8a9ae275fa481ef027f2b5752aaea504d6bbe

              SHA512

              a73c67740f27cab24939474ff55d603fdb2d749d3f868605d305b836256e27ed5f9eb104925d6d32a77eb8de94ec286745b7cd94497cb78ef8c603d74735d3bb

            • \Program Files (x86)\solfer\6las.exe
              MD5

              cf3de7cc91e95a144227364f30736911

              SHA1

              4b9373d0dea078c5a86b6c9258d86f49bb3d8ac4

              SHA256

              5526d3dfc1a497cca23c282a2db8a9ae275fa481ef027f2b5752aaea504d6bbe

              SHA512

              a73c67740f27cab24939474ff55d603fdb2d749d3f868605d305b836256e27ed5f9eb104925d6d32a77eb8de94ec286745b7cd94497cb78ef8c603d74735d3bb

            • \Program Files (x86)\solfer\6las.exe
              MD5

              cf3de7cc91e95a144227364f30736911

              SHA1

              4b9373d0dea078c5a86b6c9258d86f49bb3d8ac4

              SHA256

              5526d3dfc1a497cca23c282a2db8a9ae275fa481ef027f2b5752aaea504d6bbe

              SHA512

              a73c67740f27cab24939474ff55d603fdb2d749d3f868605d305b836256e27ed5f9eb104925d6d32a77eb8de94ec286745b7cd94497cb78ef8c603d74735d3bb

            • \Program Files (x86)\solfer\6las.exe
              MD5

              cf3de7cc91e95a144227364f30736911

              SHA1

              4b9373d0dea078c5a86b6c9258d86f49bb3d8ac4

              SHA256

              5526d3dfc1a497cca23c282a2db8a9ae275fa481ef027f2b5752aaea504d6bbe

              SHA512

              a73c67740f27cab24939474ff55d603fdb2d749d3f868605d305b836256e27ed5f9eb104925d6d32a77eb8de94ec286745b7cd94497cb78ef8c603d74735d3bb

            • \Program Files (x86)\solfer\boleroh\lvfuk.exe
              MD5

              64a76236492b14194d6bc86d85d94259

              SHA1

              b6e3f70b2c30b45353f5a98ce6aed407b89dd9f1

              SHA256

              23192ee63ad9c1159acf200c6d51f7b92e74a980630f25a02df23b8e7abf6521

              SHA512

              c94f00e6fe7f6d1c1d96d97d6b91c4c49f404bdac2db3e06fb19116a5091fee88408f202aca0af57a3bbfdb47451469f83ac58bfeddad4475bf586ff0f81448e

            • \Program Files (x86)\solfer\boleroh\lvfuk.exe
              MD5

              64a76236492b14194d6bc86d85d94259

              SHA1

              b6e3f70b2c30b45353f5a98ce6aed407b89dd9f1

              SHA256

              23192ee63ad9c1159acf200c6d51f7b92e74a980630f25a02df23b8e7abf6521

              SHA512

              c94f00e6fe7f6d1c1d96d97d6b91c4c49f404bdac2db3e06fb19116a5091fee88408f202aca0af57a3bbfdb47451469f83ac58bfeddad4475bf586ff0f81448e

            • \Program Files (x86)\solfer\boleroh\lvfuk.exe
              MD5

              64a76236492b14194d6bc86d85d94259

              SHA1

              b6e3f70b2c30b45353f5a98ce6aed407b89dd9f1

              SHA256

              23192ee63ad9c1159acf200c6d51f7b92e74a980630f25a02df23b8e7abf6521

              SHA512

              c94f00e6fe7f6d1c1d96d97d6b91c4c49f404bdac2db3e06fb19116a5091fee88408f202aca0af57a3bbfdb47451469f83ac58bfeddad4475bf586ff0f81448e

            • \Program Files (x86)\solfer\startveu.exe
            • \Program Files (x86)\solfer\startveu.exe
            • \Program Files (x86)\solfer\startveu.exe
            • \Program Files (x86)\solfer\startveu.exe
            • \Program Files (x86)\solfer\startveu.exe
            • \Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt
            • \Users\Admin\AppData\Local\Temp\File2.exe
              MD5

              810e25cc339feaae512e60b98da0a8fc

              SHA1

              46947273eecf22ab2b47492c5691b8297f564781

              SHA256

              d572f5ea3a8bb203dbb26c62bcbffbfbfc3e285560893135eebbf227f124e488

              SHA512

              b236ae60cc04d2c60c2944b70a3bea895ee106b2591838b1a450a2f0dc4898d4e2df768837041e508ec0ecc1242c3317b633f1f00ad927326718f5e0763e6394

            • \Users\Admin\AppData\Local\Temp\File2.exe
              MD5

              810e25cc339feaae512e60b98da0a8fc

              SHA1

              46947273eecf22ab2b47492c5691b8297f564781

              SHA256

              d572f5ea3a8bb203dbb26c62bcbffbfbfc3e285560893135eebbf227f124e488

              SHA512

              b236ae60cc04d2c60c2944b70a3bea895ee106b2591838b1a450a2f0dc4898d4e2df768837041e508ec0ecc1242c3317b633f1f00ad927326718f5e0763e6394

            • \Users\Admin\AppData\Local\Temp\File2.exe
              MD5

              810e25cc339feaae512e60b98da0a8fc

              SHA1

              46947273eecf22ab2b47492c5691b8297f564781

              SHA256

              d572f5ea3a8bb203dbb26c62bcbffbfbfc3e285560893135eebbf227f124e488

              SHA512

              b236ae60cc04d2c60c2944b70a3bea895ee106b2591838b1a450a2f0dc4898d4e2df768837041e508ec0ecc1242c3317b633f1f00ad927326718f5e0763e6394

            • \Users\Admin\AppData\Local\Temp\File2.exe
              MD5

              810e25cc339feaae512e60b98da0a8fc

              SHA1

              46947273eecf22ab2b47492c5691b8297f564781

              SHA256

              d572f5ea3a8bb203dbb26c62bcbffbfbfc3e285560893135eebbf227f124e488

              SHA512

              b236ae60cc04d2c60c2944b70a3bea895ee106b2591838b1a450a2f0dc4898d4e2df768837041e508ec0ecc1242c3317b633f1f00ad927326718f5e0763e6394

            • \Users\Admin\AppData\Local\Temp\SSOUJH~1.DLL
            • \Users\Admin\AppData\Local\Temp\SSOUJH~1.DLL
            • \Users\Admin\AppData\Local\Temp\SSOUJH~1.DLL
            • \Users\Admin\AppData\Local\Temp\SSOUJH~1.DLL
            • \Users\Admin\AppData\Local\Temp\nsdB952.tmp\UAC.dll
              MD5

              adb29e6b186daa765dc750128649b63d

              SHA1

              160cbdc4cb0ac2c142d361df138c537aa7e708c9

              SHA256

              2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

              SHA512

              b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

            • \Users\Admin\AppData\Local\Temp\ssoujhvp.exe
            • \Users\Admin\AppData\Local\Temp\ssoujhvp.exe
            • \Users\Admin\AppData\Local\Temp\ssoujhvp.exe
            • \Users\Admin\AppData\Local\Temp\ssoujhvp.exe
            • \Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libeay32.dll
            • \Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libevent-2-1-6.dll
            • \Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libgcc_s_sjlj-1.dll
            • \Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libssp-0.dll
            • \Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\libwinpthread-1.dll
            • \Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\ssleay32.dll
            • \Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\tor.exe
            • \Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\tor.exe
            • \Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\tor.exe
            • \Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\tor.exe
            • \Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\zlib1.dll
            • \Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
            • \Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
            • \Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
            • \Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
            • \Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
            • \Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
            • memory/280-671-0x0000000000400000-0x0000000000B59000-memory.dmp
              Filesize

              7.3MB

            • memory/280-670-0x0000000000400000-0x0000000000B59000-memory.dmp
              Filesize

              7.3MB

            • memory/280-669-0x00000000004014C0-mapping.dmp
            • memory/280-668-0x0000000000400000-0x0000000000B59000-memory.dmp
              Filesize

              7.3MB

            • memory/308-6-0x0000000000000000-mapping.dmp
            • memory/564-40-0x0000000004540000-0x0000000004551000-memory.dmp
              Filesize

              68KB

            • memory/564-18-0x0000000000000000-mapping.dmp
            • memory/564-42-0x0000000004950000-0x0000000004961000-memory.dmp
              Filesize

              68KB

            • memory/748-53-0x0000000004E40000-0x0000000004E51000-memory.dmp
              Filesize

              68KB

            • memory/748-52-0x0000000004A30000-0x0000000004A41000-memory.dmp
              Filesize

              68KB

            • memory/748-34-0x0000000000000000-mapping.dmp
            • memory/820-50-0x0000000004B60000-0x0000000004B71000-memory.dmp
              Filesize

              68KB

            • memory/820-44-0x0000000000000000-mapping.dmp
            • memory/820-51-0x0000000004F70000-0x0000000004F81000-memory.dmp
              Filesize

              68KB

            • memory/980-9-0x0000000000000000-mapping.dmp
            • memory/1080-27-0x0000000000000000-mapping.dmp
            • memory/1368-143-0x0000000003200000-0x0000000003211000-memory.dmp
              Filesize

              68KB

            • memory/1368-311-0x0000000002DF0000-0x0000000002E01000-memory.dmp
              Filesize

              68KB

            • memory/1368-360-0x0000000003C00000-0x0000000003C11000-memory.dmp
              Filesize

              68KB

            • memory/1368-361-0x00000000037F0000-0x0000000003801000-memory.dmp
              Filesize

              68KB

            • memory/1368-310-0x0000000003200000-0x0000000003211000-memory.dmp
              Filesize

              68KB

            • memory/1368-141-0x0000000064B40000-0x0000000064BBE000-memory.dmp
              Filesize

              504KB

            • memory/1368-309-0x0000000002DF0000-0x0000000002E01000-memory.dmp
              Filesize

              68KB

            • memory/1368-142-0x0000000002DF0000-0x0000000002E01000-memory.dmp
              Filesize

              68KB

            • memory/1368-125-0x0000000000000000-mapping.dmp
            • memory/1368-144-0x0000000002DF0000-0x0000000002E01000-memory.dmp
              Filesize

              68KB

            • memory/1368-359-0x00000000037F0000-0x0000000003801000-memory.dmp
              Filesize

              68KB

            • memory/1408-2-0x0000000002580000-0x0000000002591000-memory.dmp
              Filesize

              68KB

            • memory/1408-3-0x0000000002780000-0x0000000002781000-memory.dmp
              Filesize

              4KB

            • memory/1724-4-0x000007FEF6680000-0x000007FEF68FA000-memory.dmp
              Filesize

              2.5MB

            • memory/2144-72-0x000000000B1C0000-0x000000000B1D1000-memory.dmp
              Filesize

              68KB

            • memory/2144-71-0x000000000ADB0000-0x000000000ADC1000-memory.dmp
              Filesize

              68KB

            • memory/2144-57-0x0000000000000000-mapping.dmp
            • memory/2228-74-0x0000000004FF0000-0x0000000005001000-memory.dmp
              Filesize

              68KB

            • memory/2228-73-0x0000000004BE0000-0x0000000004BF1000-memory.dmp
              Filesize

              68KB

            • memory/2228-65-0x0000000000000000-mapping.dmp
            • memory/2492-75-0x0000000000000000-mapping.dmp
            • memory/2524-78-0x0000000000000000-mapping.dmp
            • memory/2536-77-0x0000000000000000-mapping.dmp
            • memory/2576-83-0x0000000000000000-mapping.dmp
            • memory/2624-85-0x0000000000000000-mapping.dmp
            • memory/2660-89-0x0000000000000000-mapping.dmp
            • memory/2664-672-0x0000000000000000-mapping.dmp
            • memory/2680-673-0x0000000000000000-mapping.dmp
            • memory/2688-90-0x0000000000000000-mapping.dmp
            • memory/2788-93-0x0000000000000000-mapping.dmp
            • memory/2800-354-0x0000000000000000-mapping.dmp
            • memory/2820-97-0x0000000000000000-mapping.dmp
            • memory/2820-98-0x0000000000000000-mapping.dmp
            • memory/2820-102-0x00000000026C0000-0x0000000002A8B000-memory.dmp
              Filesize

              3.8MB

            • memory/2820-103-0x0000000002A90000-0x0000000002AA1000-memory.dmp
              Filesize

              68KB

            • memory/2844-657-0x0000000000080000-0x0000000000140000-memory.dmp
              Filesize

              768KB

            • memory/2844-654-0x0000000000080000-0x0000000000140000-memory.dmp
              Filesize

              768KB

            • memory/2844-655-0x0000000000111C58-mapping.dmp
            • memory/2880-357-0x0000000000000000-mapping.dmp
            • memory/2880-424-0x0000000002970000-0x0000000002974000-memory.dmp
              Filesize

              16KB

            • memory/2904-104-0x0000000000000000-mapping.dmp
            • memory/2980-112-0x0000000000000000-mapping.dmp
            • memory/2988-111-0x0000000000000000-mapping.dmp
            • memory/3016-115-0x0000000000820000-0x00000000008E0000-memory.dmp
              Filesize

              768KB

            • memory/3016-116-0x00000000008B1C58-mapping.dmp
            • memory/3016-118-0x0000000000820000-0x00000000008E0000-memory.dmp
              Filesize

              768KB