Analysis

  • max time kernel
    149s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    08-07-2022 16:12

General

  • Target

    408eb90777d241ef6262ab2264c5612f85e7fd4afe2ce875e5a3f9e8a842a363.exe

  • Size

    370KB

  • MD5

    5faf71a3d9ffc1630c72da2ad1b608ac

  • SHA1

    3afa63e50cbf8008a45538e62a717812916f879d

  • SHA256

    408eb90777d241ef6262ab2264c5612f85e7fd4afe2ce875e5a3f9e8a842a363

  • SHA512

    9e6846c0fa672f1bae3cc36eb3ed4c683f4c4e9d77dd0bdaa51d0c038cd8b41fd236dd11a0c08bc82d75612a04345096b08eb734e74af41a5a9fdc47f7f74210

Malware Config

Extracted

Path

C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\_ReCoVeRy_+hknvl.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA4096 More information about the encryption keys using RSA4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA4096 Key , both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1 - http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/A3DAEBB00DB6317 2 - http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/A3DAEBB00DB6317 3 - http://yyre45dbvn2nhbefbmh.begumvelic.at/A3DAEBB00DB6317 If for some reasons the addresses are not available, follow these steps: 1 - Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2 - After a successful installation, run the browser 3 - Type in the address bar: xlowfznrg4wf7dli.onion/A3DAEBB00DB6317 4 - Follow the instructions on the site IMPORTANT INFORMATION Your personal pages http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/A3DAEBB00DB6317 http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/A3DAEBB00DB6317 http://yyre45dbvn2nhbefbmh.begumvelic.at/A3DAEBB00DB6317 Your personal page Tor-Browser xlowfznrg4wf7dli.ONION/A3DAEBB00DB6317
URLs

http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/A3DAEBB00DB6317

http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/A3DAEBB00DB6317

http://yyre45dbvn2nhbefbmh.begumvelic.at/A3DAEBB00DB6317

http://xlowfznrg4wf7dli.ONION/A3DAEBB00DB6317

Extracted

Path

C:\$Recycle.Bin\S-1-5-21-1819626980-2277161760-1023733287-1000\_ReCoVeRy_+hknvl.html

Ransom Note
<html> <style>a { color:green; }.tb { background:white; border-style:solid; border-width:1px; padding:3px; border-color:lime; } .ttl { font-size:13px; color:880000; }</style><body style="background:#33CCFF;"> <center> <div style="text-align:left; font-family:Arial; <!---4231213423142134231421342341234 --> font-size:13px; line-height:20px; margin-top:10px; width:800px; background:#F4F4F4; padding:20px; border-style:solid; border-width:5px; border-color:#BABABA;"> <b><font class="ttl"><center><b>NOT YOUR LANGUAGE? USE <a href="https://translate.google.com" target="_blank">Google Translate</a></b></center> What<!------4231213423142134231421342341234 --> happened <!------4231213423142134231421342341234 --> to your<!------4231213423142134231421342341234 --> files?</b></font><br> <font style="font-size:13px;">All <!------4231213423142134231421342341234 -->of your files<!------4231213423142134231421342341234 --> were <!------4231213423142134231421342341234 --> protected by a strong<!------4231213423142134231421342341234 --> encr<!---4231213423142134231421342341234 -->yption wi<!---4231213423142134231421342341234 -->th <!------4231213423142134231421342341234 -->RSA4096 <!------4231213423142134231421342341234 --> <br> More <!------4231213423142134231421342341234 --> information about the <!------4231213423142134231421342341234 -->encryption RSA4096 can be<!------4231213423142134231421342341234 --> fou<!---4231213423142134231421342341234 -->nd <a href= http://en.wikipedia.org/wiki/RSA_(cryptosystem) target="_blank"> htt<!--4231213423142134231421342341234 -->ps:<!--4231213423142134231421342341234 -->//en<!--4231213423142134231421342341234 -->.w<!--4231213423142134231421342341234 -->ikipedia<!--4231213423142134231421342341234 -->.<!--4231213423142134231421342341234 -->org/wiki/RSA_(cry<!--4231213423142134231421342341234 -->ptosystem) </a><br></font> <br><b><font class="ttl">Wh<!--4231213423142134231421342341234 -->at <!------4231213423142134231421342341234 --> does th<!--4231213423142134231421342341234 -->is mean?</b></font><br><font style="font-size:13px;"> T<!--4231213423142134231421342341234 -->his<!------4231213423142134231421342341234 --> mea<!--4231213423142134231421342341234 -->ns that the <!------4231213423142134231421342341234 --> str<!--4231213423142134231421342341234 -->ucture and da<!--4231213423142134231421342341234 -->ta wi<!--4231213423142134231421342341234 -->thin your <!------4231213423142134231421342341234 -->files ha<!--4231213423142134231421342341234 -->ve be<!--4231213423142134231421342341234 -->en<!------4231213423142134231421342341234 --> irre<!--4231213423142134231421342341234 -->voca<!--4231213423142134231421342341234 -->bly changed, you will not be able work wi<!--4231213423142134231421342341234 -->th them, read<!------4231213423142134231421342341234 --> th<!--4231213423142134231421342341234 -->em or see them, <!------4231213423142134231421342341234 -->it is the s<!--4231213423142134231421342341234 -->ame thing <!------4231213423142134231421342341234 -->as los<!--4231213423142134231421342341234 -->ing <!------4231213423142134231421342341234 -->them for<!--4231213423142134231421342341234 -->ever, but with our he<!--4231213423142134231421342341234 -->lp, you <!------4231213423142134231421342341234 --> can re<!--4231213423142134231421342341234 -->st<!--4231213423142134231421342341234 -->ore t<!--4231213423142134231421342341234 -->hem <br><br><b><font class="ttl"><!------4231213423142134231421342341234 -->Ho<!--4231213423142134231421342341234 -->w d<!--4231213423142134231421342341234 -->id th<!--4231213423142134231421342341234 -->is hap<!--4231213423142134231421342341234 -->pen?<!------4231213423142134231421342341234 --></b></font> <br> <!------4231213423142134231421342341234 --> <font style="font-size:13px;"><!------4231213423142134231421342341234 --> Espec<!--4231213423142134231421342341234 -->ially for y<!--4231213423142134231421342341234 -->ou,<!------4231213423142134231421342341234 --> on our SER<!--4231213423142134231421342341234 -->VER <!------4231213423142134231421342341234 -->was gene<!--4231213423142134231421342341234 -->rated <!------4231213423142134231421342341234 -->the sec<!--4231213423142134231421342341234 -->ret k<!--4231213423142134231421342341234 -->ey <br>Al<!--4231213423142134231421342341234-->l y<!--4231213423142134231421342341234-->our <!------4231213423142134231421342341234 --> files w<!--4231213423142134231421342341234-->ere encry<!--4231213423142134231421342341234-->pted with the p<!--4231213423142134231421342341234-->ublic k<!--4231213423142134231421342341234-->ey, <!------4231213423142134231421342341234 --> wh<!--4231213423142134231421342341234-->ich has b<!--4231213423142134231421342341234-->een <!------4231213423142134231421342341234 --> trans<!--4231213423142134231421342341234-->ferred to <!------4231213423142134231421342341234 -->y<!--4231213423142134231421342341234-->our co<!--4231213423142134231421342341234-->mputer via <!------4231213423142134231421342341234 -->the Inter<!--4231213423142134231421342341234-->net.<!--4231213423142134231421342341234--><br> <!------4231213423142134231421342341234 --> Decr<!--4231213423142134231421342341234-->ypting of <!------4231213423142134231421342341234 -->YO<!--4231213423142134231421342341234-->UR FI<!--4231213423142134231421342341234-->LES is <!--4231213423142134231421342341234 -->on<!--4231213423142134231421342341234 -->ly p<!--4231213423142134231421342341234 -->oss<!--4231213423142134231421342341234-->ible <!--- -4231213423142134231421342341234 -->w<!--4231213423142134231421342341234 -->ith the he<!--4231213423142134231421342341234-->lp of t<!--4231213423142134231421342341234 -->he <!----4231213423142134231421342341234 -->pri<!--4231213423142134231421342341234-->va<!--4231213423142134231421342341234 -->te k<!--4231213423142134231421342341234-->ey a<!--4231213423142134231421342341234 -->nd <!--4231213423142134231421342341234 -->d<!--4231213423142134231421342341234 -->ecr<!--4231213423142134231421342341234-->ypt p<!--4231213423142134231421342341234 -->rog<!--4231213423142134231421342341234-->ram <!--4231213423142134231421342341234 -->wh<!--4231213423142134231421342341234-->ich is on our <!--- -4231213423142134231421342341234 -->Sec<!--4231213423142134231421342341234-->ret <!--4231213423142134231421342341234 -->Ser<!--4231213423142134231421342341234-->ver!!! </font><br><br><b><font class="ttl">Wh<!--4231213423142134231421342341234-->at do I do?</b></font> <br><font style="font-size:13px;">Alas, if you <!--4231213423142134231421342341234 --> do not take <!---4231213423142134231421342341234 --> the nece<!--4231213423142134231421342341234-->ssary meas<!--4231213423142134231421342341234-->ures <!--4231213423142134231421342341234-->for the spec<!--4231213423142134231421342341234-->ified ti<!--4231213423142134231421342341234-->me th<!--4231213423142134231421342341234-->en t<!--4231213423142134231421342341234-->he co<!--4231213423142134231421342341234-->nditions fo<!--4231213423142134231421342341234-->r obta<!--4231213423142134231421342341234-->ining the priv<!--4231213423142134231421342341234-->ate ke<!--4231213423142134231421342341234-->y w<!--4231213423142134231421342341234-->ill be cha<!--4231213423142134231421342341234-->nged<!--- 4231213423142134231421342341234 --> <br> <!-----4231213423142134231421342341234 --> If you really need <!------4231213423142134231421342341234 --> your data, <!------4231213423142134231421342341234 -->then we suggest you <!------4231213423142134231421342341234 --> do not waste<!------4231213423142134231421342341234 --> valuable <!------4231213423142134231421342341234 --> time searching <!------4231213423142134231421342341234 -->for other <!------4231213423142134231421342341234 --> solutions <!------4231213423142134231421342341234 -->becausen <!----4231213423142134231421342341234 --> they do not exist.</font><br><br> <!----4231213423142134231421342341234 --><div class="tb" style="color:#880000; font-size:13px; border-width:3px;">For more specific instructions, please<!------4231213423142134231421342341234 --> visit your <!------4231213423142134231421342341234 --> personal <!------4231213423142134231421342341234 -->home page,<!------4231213423142134231421342341234 --> there are<!------4231213423142134231421342341234 --> a few <!------4231213423142134231421342341234 -->different <!------4231213423142134231421342341234 -->addresses<!------4231213423142134231421342341234 --> pointing to <!------4231213423142134231421342341234 --> your page<!------4231213423142134231421342341234 --> below:<b><hr> <!---000==-=-==-=-=-=-=-=-=---> 1 - <a href=http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/A3DAEBB00DB6317 target="_blank">http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/A3DAEBB00DB6317</a> <br> <!------000==-=-==-=-=-=-=-=-= --> 2 - <a href=http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/A3DAEBB00DB6317 target="_blank">http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/A3DAEBB00DB6317</a> <br> <!------000==-=-==-=-=-=-=-=-= --> 3 - <a href=http://yyre45dbvn2nhbefbmh.begumvelic.at/A3DAEBB00DB6317 target="_blank">http://yyre45dbvn2nhbefbmh.begumvelic.at/A3DAEBB00DB6317</a> <br> <!------000==-=-==-=-=-=-=-=-= --></div><br><div class="tb" style="font-size:13px; border-color:#880000;"><b>If for some reasons the <!-----000==-=-==-=-=-=-=-=-= --> addresses are not available, <!------000==-=-==-=-=-=-=-=-= --> follow these steps:</b> <hr> 1 - <!------000==-=-==-=-=-=-=-=-= --> Download and <!------000==-=-==-=-=-=-=-=-= --> install tor-browser: <a href=http://www.torproject.org/projects/torbrowser.html.en target="_blank">http://www.torproject.org/projects/torbrowser.html.en</a><br> 2 - <!---000==-=-==-=-=-=-=-=-= --> Af<!---000==-=-==-=-=-=-=-=-=--->ter a<!---000==-=-==-=-=-=-=-=-=---> succe<!---000==-=-==-=-=-=-=-=-=--->ssful<!------000==-=-==-=-=-=-=-=-= --> instal<!---000==-=-==-=-=-=-=-=-=--->lation, run the br<!---000==-=-==-=-=-=-=-=-=--->owser and w<!---000==-=-==-=-=-=-=-=-=--->ait for initi<!---000==-=-==-=-=-=-=-=-=--->alization.<br> 3 - <!--- 000==-=-==-=-=-=-=-=-= --> Ty<!---000==-=-==-=-=-=-=-=-=--->pe<!-- 000==-=-==-=-=-=-=-=-= --> in<!-- 000==-=-==-=-=-=-=-=-= --> the t<!---000==-=-==-=-=-=-=-=-=--->or-bro<!---000==-=-==-=-=-=-=-=-=--->wser<!-- 000==-=-==-=-=-=-=-=-= --> add<!---000==-=-==-=-=-=-=-=-=--->ress<!-- 000==-=-==-=-=-=-=-=-= --> bar: <font style="font-weight:bold; color:#009977;"><!-- 000==-=-==-=-=-=-=-=-= -->xlowfznrg4wf7dli.onion/A3DAEBB00DB6317<!-- 000==-=-==-=-=-=-=-=-= --></font><!-- 000==-=-==-=-=-=-=-=-= --><br> 4 - <!--- 000==-=-==-=-=-=-=-=-= --> Fol<!---000==-=-==-=-=-=-=-=-=--->low the instr<!---000==-=-==-=-=-=-=-=-=--->uctions <!-- 000==-=-==-=-=-=-=-=-= --> on the site.</div><br><br><b>!!! IMPO<!---000==-=-==-=-=-=-=-=-=--->RTANT INFO<!---000==-=-==-=-=-=-=-=-=--->RMATION:</b><br> <!-----000==-=-==-=-=-=-=-=-= --><div class="tb" style="width:790px;"><!-----000==-=-==-=-=-=-=-=-= --> Yo<!---000==-=-==-=-=-=-=-=-=--->ur Pers<!---000==-=-==-=-=-=-=-=-=--->onal PAGES<b>: <br> <a href=http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/A3DAEBB00DB6317 target="_blank">http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/A3DAEBB00DB6317</a> <br><a href=http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/A3DAEBB00DB6317 target="_blank">http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/A3DAEBB00DB6317</a> <br> <!-----000==-=-==-=-=-=-=-=-= --><a href=http://yyre45dbvn2nhbefbmh.begumvelic.at/A3DAEBB00DB6317 target="_blank">http://yyre45dbvn2nhbefbmh.begumvelic.at/A3DAEBB00DB6317</a> <br> <!-----000==-=-==-=-=-=-=-=-= --> Your <!------000==-=-==-=-=-=-=-=-= --> Personal TOR-Browser<!-----000==-=-==-=-=-=-=-=-= --> page : <!-----000==-=-==-=-=-=-=-=-= --><font style="font-weight:bold; color:#009977;"><!-- 000==-=-==-=-=-=-=-=-= -->xlowfznrg4wf7dli.onion/A3DAEBB00DB6317<!-- 000==-=-==-=-=-=-=-=-= --></font><br> <!-----000==-=-==-=-=-=-=-=-= --> Your personal <!------000==-=-==-=-=-=-=-=-= --> ID <!-----000==-=-==-=-=-=-=-=-= --> (if you open <!------000==-=-==-=-=-=-=-=-= --> the site directly): <!-----000==-=-==-=-=-=-=-=-= --> <font style="font-weight:bold; color:#770000;">A3DAEBB00DB6317</font><br> </div></div></center></body></html>

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon

    suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Executes dropped EXE 1 IoCs
  • Modifies extensions of user files 6 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Deletes itself 1 IoCs
  • Drops startup file 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\408eb90777d241ef6262ab2264c5612f85e7fd4afe2ce875e5a3f9e8a842a363.exe
    "C:\Users\Admin\AppData\Local\Temp\408eb90777d241ef6262ab2264c5612f85e7fd4afe2ce875e5a3f9e8a842a363.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1800
    • C:\Windows\nchiljknbnit.exe
      C:\Windows\nchiljknbnit.exe
      2⤵
      • Executes dropped EXE
      • Modifies extensions of user files
      • Drops startup file
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:996
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1280
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_ReCoVeRy_.TXT
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:1768
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\_ReCoVeRy_.HTM
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:832
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:832 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:204
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:232
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\NCHILJ~1.EXE
        3⤵
          PID:1832
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\408EB9~1.EXE
        2⤵
        • Deletes itself
        PID:1768
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1928
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
      1⤵
      • Suspicious use of FindShellTrayWindow
      PID:1968

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Desktop\_ReCoVeRy_.HTM

      Filesize

      12KB

      MD5

      b07b5cbe997a5ddf3807ed492ad7dab4

      SHA1

      996bb53fce7d89e47068316da80a404a02811b72

      SHA256

      4aa7e7acc8bb523808bb4e087201682bd20fd245382a518992ba3eb0cd190090

      SHA512

      a608c0be9308359ed97d1b115b562115765b136eefe3453cb3954dfcc6f57df4c67361cd91ebd465788a0391856797b3b13f2fb8fe08a9c7e2f13a603dbc176d

    • C:\Users\Admin\Desktop\_ReCoVeRy_.TXT

      Filesize

      1KB

      MD5

      df1834d34706eea3f841c9a954aadc51

      SHA1

      e633fd73e9a61322eb48d9b93f08640ba115b8d3

      SHA256

      4dd400b6eda6e097e80834fb9419c46806bd9b2417fd19152d5c20b9e2e6cc77

      SHA512

      f8929fb43da4aa81781236e3b48142f18fb17aaa14b1b8153bcda028926ec173c0738e9718d7d39d16c3f6481572757faa7ccb118e74c76f35c082afad77001b

    • C:\Users\Admin\Desktop\_ReCoVeRy_.png

      Filesize

      64KB

      MD5

      f818840f895b16c405b6d506b4be9f30

      SHA1

      1f4d73b5f2783e8fc60b640b48c6a79ac04b3822

      SHA256

      7af651ce1a660ba13f71d7d5e5f9aec9e964d3803951a77e1ecdbe2bd3bb8f0a

      SHA512

      ef4759780bad5817938940c6c520449204820fd803b5ebc27d5016321f16b1e69b52a41419b801e359b0b5fa9cf51ef0ff96603774950e3ddc66ff0052544c5e

    • C:\Windows\nchiljknbnit.exe

      Filesize

      370KB

      MD5

      5faf71a3d9ffc1630c72da2ad1b608ac

      SHA1

      3afa63e50cbf8008a45538e62a717812916f879d

      SHA256

      408eb90777d241ef6262ab2264c5612f85e7fd4afe2ce875e5a3f9e8a842a363

      SHA512

      9e6846c0fa672f1bae3cc36eb3ed4c683f4c4e9d77dd0bdaa51d0c038cd8b41fd236dd11a0c08bc82d75612a04345096b08eb734e74af41a5a9fdc47f7f74210

    • C:\Windows\nchiljknbnit.exe

      Filesize

      370KB

      MD5

      5faf71a3d9ffc1630c72da2ad1b608ac

      SHA1

      3afa63e50cbf8008a45538e62a717812916f879d

      SHA256

      408eb90777d241ef6262ab2264c5612f85e7fd4afe2ce875e5a3f9e8a842a363

      SHA512

      9e6846c0fa672f1bae3cc36eb3ed4c683f4c4e9d77dd0bdaa51d0c038cd8b41fd236dd11a0c08bc82d75612a04345096b08eb734e74af41a5a9fdc47f7f74210

    • memory/232-70-0x0000000000000000-mapping.dmp

    • memory/996-62-0x0000000000400000-0x00000000004B3000-memory.dmp

      Filesize

      716KB

    • memory/996-64-0x0000000000400000-0x00000000004B3000-memory.dmp

      Filesize

      716KB

    • memory/996-57-0x0000000000000000-mapping.dmp

    • memory/996-74-0x0000000000400000-0x00000000004B3000-memory.dmp

      Filesize

      716KB

    • memory/1280-65-0x0000000000000000-mapping.dmp

    • memory/1768-66-0x0000000000000000-mapping.dmp

    • memory/1768-60-0x0000000000000000-mapping.dmp

    • memory/1800-54-0x0000000075C71000-0x0000000075C73000-memory.dmp

      Filesize

      8KB

    • memory/1800-61-0x0000000000400000-0x00000000004B3000-memory.dmp

      Filesize

      716KB

    • memory/1800-56-0x0000000000400000-0x00000000004B3000-memory.dmp

      Filesize

      716KB

    • memory/1800-55-0x0000000000290000-0x00000000002BF000-memory.dmp

      Filesize

      188KB

    • memory/1832-73-0x0000000000000000-mapping.dmp