Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    189s
  • max time network
    216s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2023, 08:23

General

  • Target

    NEAS.f9970831c7ef7d9a9b544cff6314f220.exe

  • Size

    282KB

  • MD5

    f9970831c7ef7d9a9b544cff6314f220

  • SHA1

    cce902bcfe531c43c01dec177cfbb14f39521455

  • SHA256

    1383f199f9b09d086a731c9a290909a0419e02fc1e12b4d016cb4109de411ede

  • SHA512

    186e3b6757c00caa92c03724b514e832c389e6b6c3ae0ae3194e7d08b02de9278e1576205e4a592ef64c5b6e7a9f6dff308a72f85d0724fdb01b366efbf02120

  • SSDEEP

    6144:QtnqqrpY8RapeqHSJyoFkaGoZxkEjiPISUOgW9X+hOGzC/:QtnqqrZQQqHSJyoFkaGoZxkmZzcukG2/

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 14 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 13 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Windows directory 39 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of SetWindowsHookEx 28 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.f9970831c7ef7d9a9b544cff6314f220.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.f9970831c7ef7d9a9b544cff6314f220.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3996
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\windows\PHDJW.exe.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4812
      • C:\windows\PHDJW.exe
        C:\windows\PHDJW.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2676
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\windows\system32\NVRY.exe.bat" "
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3908
          • C:\windows\SysWOW64\NVRY.exe
            C:\windows\system32\NVRY.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3892
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\windows\system\JJH.exe.bat" "
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2536
              • C:\windows\system\JJH.exe
                C:\windows\system\JJH.exe
                7⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:1620
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c ""C:\windows\THZRMM.exe.bat" "
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3184
                  • C:\windows\THZRMM.exe
                    C:\windows\THZRMM.exe
                    9⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:2972
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c ""C:\windows\system\ATDZTU.exe.bat" "
                      10⤵
                      • Suspicious use of WriteProcessMemory
                      PID:3736
                      • C:\windows\system\ATDZTU.exe
                        C:\windows\system\ATDZTU.exe
                        11⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:2116
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c ""C:\windows\GZE.exe.bat" "
                          12⤵
                          • Suspicious use of WriteProcessMemory
                          PID:3756
                          • C:\windows\GZE.exe
                            C:\windows\GZE.exe
                            13⤵
                            • Checks computer location settings
                            • Executes dropped EXE
                            • Drops file in Windows directory
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of SetWindowsHookEx
                            • Suspicious use of WriteProcessMemory
                            PID:3256
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c ""C:\windows\system\XYR.exe.bat" "
                              14⤵
                              • Suspicious use of WriteProcessMemory
                              PID:4036
                              • C:\windows\system\XYR.exe
                                C:\windows\system\XYR.exe
                                15⤵
                                • Checks computer location settings
                                • Executes dropped EXE
                                • Drops file in Windows directory
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of SetWindowsHookEx
                                • Suspicious use of WriteProcessMemory
                                PID:3804
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c ""C:\windows\system\WZVMFLU.exe.bat" "
                                  16⤵
                                  • Suspicious use of WriteProcessMemory
                                  PID:3128
                                  • C:\windows\system\WZVMFLU.exe
                                    C:\windows\system\WZVMFLU.exe
                                    17⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • Drops file in Windows directory
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of SetWindowsHookEx
                                    • Suspicious use of WriteProcessMemory
                                    PID:3524
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /c ""C:\windows\system\UDRKCFN.exe.bat" "
                                      18⤵
                                      • Suspicious use of WriteProcessMemory
                                      PID:800
                                      • C:\windows\system\UDRKCFN.exe
                                        C:\windows\system\UDRKCFN.exe
                                        19⤵
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • Drops file in Windows directory
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of SetWindowsHookEx
                                        • Suspicious use of WriteProcessMemory
                                        PID:4248
                                        • C:\Windows\SysWOW64\cmd.exe
                                          C:\Windows\system32\cmd.exe /c ""C:\windows\SQATTZ.exe.bat" "
                                          20⤵
                                          • Suspicious use of WriteProcessMemory
                                          PID:2900
                                          • C:\windows\SQATTZ.exe
                                            C:\windows\SQATTZ.exe
                                            21⤵
                                            • Checks computer location settings
                                            • Executes dropped EXE
                                            • Drops file in Windows directory
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of SetWindowsHookEx
                                            • Suspicious use of WriteProcessMemory
                                            PID:2116
                                            • C:\Windows\SysWOW64\cmd.exe
                                              C:\Windows\system32\cmd.exe /c ""C:\windows\JDUZ.exe.bat" "
                                              22⤵
                                              • Suspicious use of WriteProcessMemory
                                              PID:8
                                              • C:\windows\JDUZ.exe
                                                C:\windows\JDUZ.exe
                                                23⤵
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • Drops file in Windows directory
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2720
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c ""C:\windows\system\XYZCR.exe.bat" "
                                                  24⤵
                                                    PID:4112
                                                    • C:\windows\system\XYZCR.exe
                                                      C:\windows\system\XYZCR.exe
                                                      25⤵
                                                      • Checks computer location settings
                                                      • Executes dropped EXE
                                                      • Drops file in Windows directory
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:4208
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c ""C:\windows\NOZEA.exe.bat" "
                                                        26⤵
                                                          PID:1876
                                                          • C:\windows\NOZEA.exe
                                                            C:\windows\NOZEA.exe
                                                            27⤵
                                                            • Checks computer location settings
                                                            • Executes dropped EXE
                                                            • Drops file in Windows directory
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:3004
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c ""C:\windows\system\ITNGH.exe.bat" "
                                                              28⤵
                                                                PID:2008
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 1620 -s 976
                        8⤵
                        • Program crash
                        PID:1056
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3892 -s 960
                    6⤵
                    • Program crash
                    PID:2152
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 960
                4⤵
                • Program crash
                PID:3140
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3996 -s 980
            2⤵
            • Program crash
            PID:3704
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3996 -ip 3996
          1⤵
            PID:2532
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2676 -ip 2676
            1⤵
              PID:2276
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3892 -ip 3892
              1⤵
                PID:1072
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1620 -ip 1620
                1⤵
                  PID:3752
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 2972 -ip 2972
                  1⤵
                    PID:4576
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 2116 -ip 2116
                    1⤵
                      PID:4488
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 3256 -ip 3256
                      1⤵
                        PID:1200
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 3804 -ip 3804
                        1⤵
                          PID:4208
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 724 -p 3524 -ip 3524
                          1⤵
                            PID:4388
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 4248 -ip 4248
                            1⤵
                              PID:4736
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 2116 -ip 2116
                              1⤵
                                PID:3836
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 768 -p 2720 -ip 2720
                                1⤵
                                  PID:3856
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 776 -p 4208 -ip 4208
                                  1⤵
                                    PID:2468
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 768 -p 3004 -ip 3004
                                    1⤵
                                      PID:2984

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Windows\GZE.exe

                                      Filesize

                                      282KB

                                      MD5

                                      e4d65cdf3f6b8631e9d9caa85dc6d09c

                                      SHA1

                                      7acff086589222d8ef52c361cf9df692b74b984a

                                      SHA256

                                      3ec1111641cef9e5a9f96caeb2fbf388f77a7035fc0561d0ff05980ed0be920b

                                      SHA512

                                      359e8efe0719663cad9b670e5e286fb61282be576a627cf7eeadc6b5dbc5d64f7bdc44e9c76967e01e02472a0e59c4cefa9b357cc0f49cb6c5b8e2f7ea166e91

                                    • C:\Windows\JDUZ.exe

                                      Filesize

                                      282KB

                                      MD5

                                      ca306e00eb7e3f5da7505ee27e5c7643

                                      SHA1

                                      589772d5469b7f18c0ae370c861fa31b13d6b45a

                                      SHA256

                                      7fa9f960c3296636992627b19b6edfc4d88dd41d91c400f3807ad6d661c8b762

                                      SHA512

                                      19253b4f345e243f1c7340fef619b0aeddf4df49fb86d2c350a5d9b8d566e074431ee45d37ddb915882253f87d80bd63a3b96e42333f9bb86e05b8dc59b94bed

                                    • C:\Windows\NOZEA.exe

                                      Filesize

                                      282KB

                                      MD5

                                      e1c5adfc45faf7839d4e3737a3aecef3

                                      SHA1

                                      aca43394d5267a6803cccf82a35a5466ecf294dd

                                      SHA256

                                      b8e5ddade2c5f2131ff7caa71a31593ac691fb67d56d32d393b29df30bd6764e

                                      SHA512

                                      6ca77e904f0f69779d3328f718664566b44c009d17f4fceccf657d0f630eccbdce033a6a902e290a6ba3556bc9b10aa98154737e107c9df8bc53bb8410b3dbfc

                                    • C:\Windows\PHDJW.exe

                                      Filesize

                                      282KB

                                      MD5

                                      b851914edd3e75ab59172642a07be874

                                      SHA1

                                      4d0cbf22f51e19f78ae456dc05cf9160b118c968

                                      SHA256

                                      d604cef04c414f4c79c4d58754dde45c9a16a875e63cc8f7e42373672162bcd9

                                      SHA512

                                      8aab3736094cce257e92251fe790fb66fe0e6ef74bbbecfe4459e1d5516cf4a30fadfc1e734e5fefe6e42395ae067a7f881013857e8f10b445799d653300e902

                                    • C:\Windows\SQATTZ.exe

                                      Filesize

                                      282KB

                                      MD5

                                      018da7c49c6ec1fddd0f0c71aec3641b

                                      SHA1

                                      91cb744c0a8749fcd36640e1953c05746ad9de1a

                                      SHA256

                                      b39ed544e49acf4ff644054bc4ae6ee537eb7c5422b254d52b1858083b559436

                                      SHA512

                                      d6d1a450d89e025874a4b230e66731fc2bccd8defeba2191da80f90fd5c65d93e9de5ed8b222bd42c1f949969754b5d943446c8cbdba8c022d33a8652fb92a95

                                    • C:\Windows\SysWOW64\NVRY.exe

                                      Filesize

                                      282KB

                                      MD5

                                      7d916c6ecf46501cc5547e92278b8e6a

                                      SHA1

                                      f8c344c086080e2c7e036814bb92e66d2e591a54

                                      SHA256

                                      367658c9ffad8db43e20ef42d72941c1bdd1dbba5bc2d4c908e401a21ce84958

                                      SHA512

                                      a9e371dda8b71897e96170cddabd2cc8e33686cf1e11ac69b432d47aa3ee9f68dbd3d22974f3b84e561d27caf5965b6853e5ef9db283c4337fbba0eee3d59caf

                                    • C:\Windows\SysWOW64\NVRY.exe

                                      Filesize

                                      282KB

                                      MD5

                                      35c21ccef39689dcb5c9e75ab24aae10

                                      SHA1

                                      54873f2a5c9fa76aa995113e5b5bbf3dbe99ef37

                                      SHA256

                                      ab1065837d2847433acacbf6a0b15c77a31ce3b5d2f8ef83665680d1f9363a30

                                      SHA512

                                      30c3d6af25cbd79e486fa767e53df6ddb529780d9ae62336456f843ef96b8dee4b296cbe6dd704374ed917dcb6f23c9bd91f249e41a34fc7cf85c4f25c35aa97

                                    • C:\Windows\System\ATDZTU.exe

                                      Filesize

                                      282KB

                                      MD5

                                      9b3c319cde689f964cc752d9a75dde52

                                      SHA1

                                      6ee95e9363f14565a7c8fcca8e8db300c487b7ea

                                      SHA256

                                      a3332606f759e98623ccc622b79f7f9d2e9c15edf0db41f6c373f28f4a960e77

                                      SHA512

                                      3f3c49d829fc05b7711f7c8f00e0a454ffce5fdf1909d89c0239c97038bef95d5d1ca56b431d70d0d3e52da44586b1600268696deba82e74beae1c296c8ffbd8

                                    • C:\Windows\System\JJH.exe

                                      Filesize

                                      282KB

                                      MD5

                                      43b2a6f0db659cfc95dcc8a5512ea803

                                      SHA1

                                      cfed468d58b5919079b960c1bbb4f006d6ed3899

                                      SHA256

                                      508842f26681c36521b25467713b8041fdb3eca85792fba7f318ae6261816ae0

                                      SHA512

                                      bc23e988dc1dbfb262ae8b78e6b109e257e0999ec6008ceac3248bb7d99cf451f85bcd91a0fa2d941a282b3d80ae168d4247fc75863cf9aad5465d60f4e5600e

                                    • C:\Windows\System\UDRKCFN.exe

                                      Filesize

                                      282KB

                                      MD5

                                      08b9a03cdb91cb4d455f436229704f08

                                      SHA1

                                      7f73e0fc2744abe071187d3cbed44db39eb28f26

                                      SHA256

                                      3534a60ac3fd2af3c1c97e6f4a9ad88ebd7b0f6242b5b1274a5540b5d0da7918

                                      SHA512

                                      ef5289a461772c1d22322122b8ab61d320f2bfa453ff1a4b926b295a6d0584356aeec620cbb1ddefe1b9f5c52bc17c7e3deb1f5846be5a851b7e6d84cb5030bf

                                    • C:\Windows\System\WZVMFLU.exe

                                      Filesize

                                      282KB

                                      MD5

                                      b57465c9759541b7259e2cf35b41cb0e

                                      SHA1

                                      97b2e4cb8be459f8d7ec7a6f74cd0b9ff6f2d8ed

                                      SHA256

                                      49b50b41c3d475dbf6e430e5b5b58f14f896e6a8c9d1cb751e9b5d96f38e4d4c

                                      SHA512

                                      3b4039bc0b8d261f231bc4a84d983dcfa5a0e2ca32c19ed888de3d7c1b4a52a74df1536f104200dd892db971fc97dcee41eb9198560de73515c2c5578f2c97aa

                                    • C:\Windows\System\XYR.exe

                                      Filesize

                                      282KB

                                      MD5

                                      6fd86d8f55841b6f211b632ab7a2d56e

                                      SHA1

                                      ce9c1eedb570069c6de709a369a2300ff59e01f5

                                      SHA256

                                      9a17e4454de9bb4d39219aae8e84eeb64b0864bde62bc3a841f41901d6cce131

                                      SHA512

                                      78349ca8c390593fbbd2b26c5726ac23944f803dba2a91fb9c94a5da7c8ee648d1f2b57907d04a1b42c52110e8bcb0bfdf100bd6b7b29fe28b812e41eeb06502

                                    • C:\Windows\System\XYZCR.exe

                                      Filesize

                                      282KB

                                      MD5

                                      27f8d4dd5bc2b423f3ff38951bfac66d

                                      SHA1

                                      dea5201e43cc71dc01d929f10d09f384e607d0b1

                                      SHA256

                                      f09b60f786bc48047f582e5c3a75ba154b83c5c47ff81999f51373ea287c652a

                                      SHA512

                                      3e6f83241c5b6f84ad134ef0f23c066c6c2d18714485a4d7405204a57bdaf5a6a79b98c5492273c7e905e37514e87c88784577e6f173cc45c11e418eb1d0977d

                                    • C:\Windows\THZRMM.exe

                                      Filesize

                                      282KB

                                      MD5

                                      9b30e44086a1c2b5699ee179d85a9fd5

                                      SHA1

                                      ffacadb5d4ca9f022523f31d3f89377d73a67d82

                                      SHA256

                                      780496e4ea7a7430ac9d67f2ca54b3bfa042ebcc41db79f9ae8f896b44f13ea9

                                      SHA512

                                      5513c2ca80105b9fa89ae728a0cd4b466e23cf4a392a26096716d4fe909133dcc06945032ec681b08c84efb8ae87344a49daaac7a9f0fb23b2fac99fdc9ea39c

                                    • C:\windows\GZE.exe

                                      Filesize

                                      282KB

                                      MD5

                                      e4d65cdf3f6b8631e9d9caa85dc6d09c

                                      SHA1

                                      7acff086589222d8ef52c361cf9df692b74b984a

                                      SHA256

                                      3ec1111641cef9e5a9f96caeb2fbf388f77a7035fc0561d0ff05980ed0be920b

                                      SHA512

                                      359e8efe0719663cad9b670e5e286fb61282be576a627cf7eeadc6b5dbc5d64f7bdc44e9c76967e01e02472a0e59c4cefa9b357cc0f49cb6c5b8e2f7ea166e91

                                    • C:\windows\GZE.exe.bat

                                      Filesize

                                      52B

                                      MD5

                                      2de2b91ea300955a8c445bd6459ad116

                                      SHA1

                                      1164b89d6067d712c3a491f32a04ce2293098a2d

                                      SHA256

                                      de88ebb5d9e8bc767bb235912a535b7b58947384cf3a08d858545f7966b88261

                                      SHA512

                                      5484c51b25ebe524ae7a071c31e6225988ad97343de790da4c3d07f5e8d8408109487586d941035664330c745a75b734505dd77604f704517c5667fc9c14a390

                                    • C:\windows\JDUZ.exe

                                      Filesize

                                      282KB

                                      MD5

                                      ca306e00eb7e3f5da7505ee27e5c7643

                                      SHA1

                                      589772d5469b7f18c0ae370c861fa31b13d6b45a

                                      SHA256

                                      7fa9f960c3296636992627b19b6edfc4d88dd41d91c400f3807ad6d661c8b762

                                      SHA512

                                      19253b4f345e243f1c7340fef619b0aeddf4df49fb86d2c350a5d9b8d566e074431ee45d37ddb915882253f87d80bd63a3b96e42333f9bb86e05b8dc59b94bed

                                    • C:\windows\JDUZ.exe.bat

                                      Filesize

                                      54B

                                      MD5

                                      f4f59e6f5de1feaad576a4c4c350bfc2

                                      SHA1

                                      39ff88a65a9f086c2b9e33aa053934ac03ffeb8d

                                      SHA256

                                      b88c3fbd53f42f38a9dd3758c1a7ab52e0299a73b8485ea5c4d7b1e1f1a5d50d

                                      SHA512

                                      4377a386e2bdb9ae12421077f3562e00ec6c8a19201560a4a8e5cc2a217e5bf70ad650ad3e366abbc59b754c861a7a480d1e5d2cdf06bc4573341329ad826e24

                                    • C:\windows\NOZEA.exe

                                      Filesize

                                      282KB

                                      MD5

                                      e1c5adfc45faf7839d4e3737a3aecef3

                                      SHA1

                                      aca43394d5267a6803cccf82a35a5466ecf294dd

                                      SHA256

                                      b8e5ddade2c5f2131ff7caa71a31593ac691fb67d56d32d393b29df30bd6764e

                                      SHA512

                                      6ca77e904f0f69779d3328f718664566b44c009d17f4fceccf657d0f630eccbdce033a6a902e290a6ba3556bc9b10aa98154737e107c9df8bc53bb8410b3dbfc

                                    • C:\windows\NOZEA.exe.bat

                                      Filesize

                                      56B

                                      MD5

                                      d8b355e2cb50dbf5b00dae92d3f74df3

                                      SHA1

                                      d9e81ffecd81f334f9cbfd0cb9447fe5fe85239a

                                      SHA256

                                      7be6f9b4a16f415abfbb22b6b413b53ccb0304c2e8e6218927ff20a8d2601aeb

                                      SHA512

                                      4ab99a46a66116424fdd4c98172e0f9ab7bdfd7b15cd3df2ed3d6fc50320e9c3189cbc6de0f21757717976bbdf95b548bb8cca5ca128dc0ea41a2edf5541c91b

                                    • C:\windows\PHDJW.exe

                                      Filesize

                                      282KB

                                      MD5

                                      b851914edd3e75ab59172642a07be874

                                      SHA1

                                      4d0cbf22f51e19f78ae456dc05cf9160b118c968

                                      SHA256

                                      d604cef04c414f4c79c4d58754dde45c9a16a875e63cc8f7e42373672162bcd9

                                      SHA512

                                      8aab3736094cce257e92251fe790fb66fe0e6ef74bbbecfe4459e1d5516cf4a30fadfc1e734e5fefe6e42395ae067a7f881013857e8f10b445799d653300e902

                                    • C:\windows\PHDJW.exe.bat

                                      Filesize

                                      56B

                                      MD5

                                      99bbd50cd4bf19adf93feaa81c4a7044

                                      SHA1

                                      a142adc663588f3056456d0cfc50d5d2cc9bb6b7

                                      SHA256

                                      5616bdfd552b70c3933a6243a8280b916aa1ae7998a1a988af6afb532bc1818f

                                      SHA512

                                      138069c8f44296e24bb5beec18e214ad8e52d9f1bfd2758bbb35109297c2e62114010477a23123ba236cfd17eceaaf6b9ff3d850815fd11bc5bf058f52ec52a4

                                    • C:\windows\SQATTZ.exe

                                      Filesize

                                      282KB

                                      MD5

                                      018da7c49c6ec1fddd0f0c71aec3641b

                                      SHA1

                                      91cb744c0a8749fcd36640e1953c05746ad9de1a

                                      SHA256

                                      b39ed544e49acf4ff644054bc4ae6ee537eb7c5422b254d52b1858083b559436

                                      SHA512

                                      d6d1a450d89e025874a4b230e66731fc2bccd8defeba2191da80f90fd5c65d93e9de5ed8b222bd42c1f949969754b5d943446c8cbdba8c022d33a8652fb92a95

                                    • C:\windows\SQATTZ.exe.bat

                                      Filesize

                                      58B

                                      MD5

                                      2c35c1cf4a75d636956b80ad1d22ee68

                                      SHA1

                                      794292a654f49ef9a825df57efc94c1857315122

                                      SHA256

                                      b4c3909d105fe928510a6a2559b777cb856c06394ae88e16d88ed7e84d235265

                                      SHA512

                                      c957231cb26afc5d8f1e4f791dc83300e07e0bc583503b81a4091e2f0abafe2090c312d3a6658db9bcf3b2dc1148eef6e5517dc25df57e0d570bafec9b85acab

                                    • C:\windows\SysWOW64\NVRY.exe

                                      Filesize

                                      282KB

                                      MD5

                                      35c21ccef39689dcb5c9e75ab24aae10

                                      SHA1

                                      54873f2a5c9fa76aa995113e5b5bbf3dbe99ef37

                                      SHA256

                                      ab1065837d2847433acacbf6a0b15c77a31ce3b5d2f8ef83665680d1f9363a30

                                      SHA512

                                      30c3d6af25cbd79e486fa767e53df6ddb529780d9ae62336456f843ef96b8dee4b296cbe6dd704374ed917dcb6f23c9bd91f249e41a34fc7cf85c4f25c35aa97

                                    • C:\windows\SysWOW64\NVRY.exe.bat

                                      Filesize

                                      72B

                                      MD5

                                      024212365f5b03bfd746595d66ba5722

                                      SHA1

                                      71e4aa567729bc279c232da9ea173e0b7c90a6a9

                                      SHA256

                                      6e6190fc9291b89806898e92011d60bd6eb28850650c059461b306ee2c2eaa95

                                      SHA512

                                      3160ede01fa96033b85389a2b80a78e90c784cc373cf3a58d2cf0cfbb308f60a1ecc753745b3a9a0059223c1e8fe7d55178d7e96f7d7667a06e96855f2692d3a

                                    • C:\windows\THZRMM.exe

                                      Filesize

                                      282KB

                                      MD5

                                      9b30e44086a1c2b5699ee179d85a9fd5

                                      SHA1

                                      ffacadb5d4ca9f022523f31d3f89377d73a67d82

                                      SHA256

                                      780496e4ea7a7430ac9d67f2ca54b3bfa042ebcc41db79f9ae8f896b44f13ea9

                                      SHA512

                                      5513c2ca80105b9fa89ae728a0cd4b466e23cf4a392a26096716d4fe909133dcc06945032ec681b08c84efb8ae87344a49daaac7a9f0fb23b2fac99fdc9ea39c

                                    • C:\windows\THZRMM.exe.bat

                                      Filesize

                                      58B

                                      MD5

                                      663a83936086d1ecaa98f5987ec0c85c

                                      SHA1

                                      43db1097e3771449ab031a1363d0eded03ecd9cf

                                      SHA256

                                      961cb17070e7fbd1620a731676a21368bfdf0e693525fce79a204dae4a6d6200

                                      SHA512

                                      0dc74b049ef0a7040e6c1900e5caafc92c531bf0b5f715de649e300f16fe254911c3e6585318ce1b1fc40e64364acb969a52b316205e66f74303893ded0ed08f

                                    • C:\windows\system\ATDZTU.exe

                                      Filesize

                                      282KB

                                      MD5

                                      9b3c319cde689f964cc752d9a75dde52

                                      SHA1

                                      6ee95e9363f14565a7c8fcca8e8db300c487b7ea

                                      SHA256

                                      a3332606f759e98623ccc622b79f7f9d2e9c15edf0db41f6c373f28f4a960e77

                                      SHA512

                                      3f3c49d829fc05b7711f7c8f00e0a454ffce5fdf1909d89c0239c97038bef95d5d1ca56b431d70d0d3e52da44586b1600268696deba82e74beae1c296c8ffbd8

                                    • C:\windows\system\ATDZTU.exe.bat

                                      Filesize

                                      72B

                                      MD5

                                      d1131575ed15831ccd7e67d4ad591855

                                      SHA1

                                      e3b4dcf5c5b9c6787f67d575f34a93dcf4f436ec

                                      SHA256

                                      651f6f5c70af656c491bd00c0097ec61b03d6ef8e028ddf696d9a6dc0a607702

                                      SHA512

                                      d90f2f1818c8d022886a5d4f7e8ba44877feb1d467b52279c042a9261a6ee7141b1b173a81e20fa46ffffbcf3fcd72362b0fe374117615275da8d296442d240d

                                    • C:\windows\system\ITNGH.exe.bat

                                      Filesize

                                      70B

                                      MD5

                                      e54567d35fdb3cb6c58f403fb8aa18da

                                      SHA1

                                      90f0d8202f554c6d39c93aa0bd9d67e301c442de

                                      SHA256

                                      2f8718e7a3923b5a27651c322785e1f987fe23cd615bf235ab700c9091f1559c

                                      SHA512

                                      491f6da074fc161b4ee2bfcd6452df610796b99429bdf754529f3d8cddb840caffd033601c6ce68d50181bbc8d92de0d61b832996db77187fc0cdb84006eab74

                                    • C:\windows\system\JJH.exe

                                      Filesize

                                      282KB

                                      MD5

                                      43b2a6f0db659cfc95dcc8a5512ea803

                                      SHA1

                                      cfed468d58b5919079b960c1bbb4f006d6ed3899

                                      SHA256

                                      508842f26681c36521b25467713b8041fdb3eca85792fba7f318ae6261816ae0

                                      SHA512

                                      bc23e988dc1dbfb262ae8b78e6b109e257e0999ec6008ceac3248bb7d99cf451f85bcd91a0fa2d941a282b3d80ae168d4247fc75863cf9aad5465d60f4e5600e

                                    • C:\windows\system\JJH.exe.bat

                                      Filesize

                                      66B

                                      MD5

                                      cb359f571722c015adb7b9508ce9fb87

                                      SHA1

                                      ef84fdace32bd837f7d4baef121c874d97b516fc

                                      SHA256

                                      f0808b8838bc567564ac453d665af753f9d7928b06afeb825fcc53ff8cecb2b4

                                      SHA512

                                      24c2b27345321add7650c21d17179107f19d0a8f3f8a337a4157caf25f5cc257626b3e5e78f5df7313b6d1d3c78db434d20743d4f146f46c3ac92d315ef09c5a

                                    • C:\windows\system\UDRKCFN.exe

                                      Filesize

                                      282KB

                                      MD5

                                      08b9a03cdb91cb4d455f436229704f08

                                      SHA1

                                      7f73e0fc2744abe071187d3cbed44db39eb28f26

                                      SHA256

                                      3534a60ac3fd2af3c1c97e6f4a9ad88ebd7b0f6242b5b1274a5540b5d0da7918

                                      SHA512

                                      ef5289a461772c1d22322122b8ab61d320f2bfa453ff1a4b926b295a6d0584356aeec620cbb1ddefe1b9f5c52bc17c7e3deb1f5846be5a851b7e6d84cb5030bf

                                    • C:\windows\system\UDRKCFN.exe.bat

                                      Filesize

                                      74B

                                      MD5

                                      694343439c91d826f1556296a0e9be65

                                      SHA1

                                      f3216c138fdbb8c403570ff58b65582273c8451e

                                      SHA256

                                      552b9df6c3d603c13c961f402f7b7f5b0bd6bb9faedad2a5bf374aaafe9f5cfb

                                      SHA512

                                      afe15dc3e3d8fc76a5c7ab4e8912b4b1e64473af56cc5dc183af33d0cfc11fdc4368a5ab63b841028d047b03359fbfd0a6a894bebf54e66c5e32ab6d00adcc48

                                    • C:\windows\system\WZVMFLU.exe

                                      Filesize

                                      282KB

                                      MD5

                                      b57465c9759541b7259e2cf35b41cb0e

                                      SHA1

                                      97b2e4cb8be459f8d7ec7a6f74cd0b9ff6f2d8ed

                                      SHA256

                                      49b50b41c3d475dbf6e430e5b5b58f14f896e6a8c9d1cb751e9b5d96f38e4d4c

                                      SHA512

                                      3b4039bc0b8d261f231bc4a84d983dcfa5a0e2ca32c19ed888de3d7c1b4a52a74df1536f104200dd892db971fc97dcee41eb9198560de73515c2c5578f2c97aa

                                    • C:\windows\system\WZVMFLU.exe.bat

                                      Filesize

                                      74B

                                      MD5

                                      24f293208d746d2c8b1decc5b36e3e53

                                      SHA1

                                      87be52a51510af9910c1ee835a405338d2253489

                                      SHA256

                                      4ed62976bf16d8cd2b6940ded4ee60f05e0739051efd1f1a403e2a88e184280d

                                      SHA512

                                      5b0428f9e159f96d89f1b315b6355780904e0d23fa1c5e0a55397f42e9d951746ca3cf93b6aa400e4db0c736bf445b45f4478fa6cae3ecc3d24e2ad62393c409

                                    • C:\windows\system\XYR.exe

                                      Filesize

                                      282KB

                                      MD5

                                      6fd86d8f55841b6f211b632ab7a2d56e

                                      SHA1

                                      ce9c1eedb570069c6de709a369a2300ff59e01f5

                                      SHA256

                                      9a17e4454de9bb4d39219aae8e84eeb64b0864bde62bc3a841f41901d6cce131

                                      SHA512

                                      78349ca8c390593fbbd2b26c5726ac23944f803dba2a91fb9c94a5da7c8ee648d1f2b57907d04a1b42c52110e8bcb0bfdf100bd6b7b29fe28b812e41eeb06502

                                    • C:\windows\system\XYR.exe.bat

                                      Filesize

                                      66B

                                      MD5

                                      ff0165efa1c1201a908f8839a687d063

                                      SHA1

                                      980db015abf46e20e9b969760a2a10bc1fce4cd8

                                      SHA256

                                      5a6450573ecf4981622016303d2c9bca5284f5168eaeb2f7c507927e9ac7e122

                                      SHA512

                                      fc48923f23c25d45bd3b19d2f9d0c4abb9e0ada215486b9cf57fd3ff2986e9baaa45cbda60700a7dc78e587b6a5a93c39e2bd960f4e2cfb626e95858823776af

                                    • C:\windows\system\XYZCR.exe

                                      Filesize

                                      282KB

                                      MD5

                                      27f8d4dd5bc2b423f3ff38951bfac66d

                                      SHA1

                                      dea5201e43cc71dc01d929f10d09f384e607d0b1

                                      SHA256

                                      f09b60f786bc48047f582e5c3a75ba154b83c5c47ff81999f51373ea287c652a

                                      SHA512

                                      3e6f83241c5b6f84ad134ef0f23c066c6c2d18714485a4d7405204a57bdaf5a6a79b98c5492273c7e905e37514e87c88784577e6f173cc45c11e418eb1d0977d

                                    • C:\windows\system\XYZCR.exe.bat

                                      Filesize

                                      70B

                                      MD5

                                      72668c6b2745920489017a22735c121e

                                      SHA1

                                      8e3520d37f70e2b823f420da9fdf2556e9ed776d

                                      SHA256

                                      ceb0cd35487c034da989ad6f6e3ea0bdcaf17b2d1701ae1adcb98160a9fc589d

                                      SHA512

                                      46526a7ae4a1cb9aef21878c140a942c107600d5c47505c3111df8cb2b737578e27add3594695584a47e3648e81ec90733b9e758d13206aa9015794b5bd9362c

                                    • memory/1620-33-0x0000000000400000-0x0000000000439000-memory.dmp

                                      Filesize

                                      228KB

                                    • memory/1620-163-0x0000000000400000-0x0000000000439000-memory.dmp

                                      Filesize

                                      228KB

                                    • memory/2116-54-0x0000000000400000-0x0000000000439000-memory.dmp

                                      Filesize

                                      228KB

                                    • memory/2116-116-0x0000000000400000-0x0000000000439000-memory.dmp

                                      Filesize

                                      228KB

                                    • memory/2116-128-0x0000000000400000-0x0000000000439000-memory.dmp

                                      Filesize

                                      228KB

                                    • memory/2116-63-0x0000000000400000-0x0000000000439000-memory.dmp

                                      Filesize

                                      228KB

                                    • memory/2676-141-0x0000000000400000-0x0000000000439000-memory.dmp

                                      Filesize

                                      228KB

                                    • memory/2676-10-0x0000000000400000-0x0000000000439000-memory.dmp

                                      Filesize

                                      228KB

                                    • memory/2720-137-0x0000000000400000-0x0000000000439000-memory.dmp

                                      Filesize

                                      228KB

                                    • memory/2720-127-0x0000000000400000-0x0000000000439000-memory.dmp

                                      Filesize

                                      228KB

                                    • memory/2972-43-0x0000000000400000-0x0000000000439000-memory.dmp

                                      Filesize

                                      228KB

                                    • memory/2972-56-0x0000000000400000-0x0000000000439000-memory.dmp

                                      Filesize

                                      228KB

                                    • memory/3004-154-0x0000000000400000-0x0000000000439000-memory.dmp

                                      Filesize

                                      228KB

                                    • memory/3004-164-0x0000000000400000-0x0000000000439000-memory.dmp

                                      Filesize

                                      228KB

                                    • memory/3256-68-0x0000000000400000-0x0000000000439000-memory.dmp

                                      Filesize

                                      228KB

                                    • memory/3256-76-0x0000000000400000-0x0000000000439000-memory.dmp

                                      Filesize

                                      228KB

                                    • memory/3524-92-0x0000000000400000-0x0000000000439000-memory.dmp

                                      Filesize

                                      228KB

                                    • memory/3524-111-0x0000000000400000-0x0000000000439000-memory.dmp

                                      Filesize

                                      228KB

                                    • memory/3804-79-0x0000000000400000-0x0000000000439000-memory.dmp

                                      Filesize

                                      228KB

                                    • memory/3804-93-0x0000000000400000-0x0000000000439000-memory.dmp

                                      Filesize

                                      228KB

                                    • memory/3892-153-0x0000000000400000-0x0000000000439000-memory.dmp

                                      Filesize

                                      228KB

                                    • memory/3892-21-0x0000000000400000-0x0000000000439000-memory.dmp

                                      Filesize

                                      228KB

                                    • memory/3996-0-0x0000000000400000-0x0000000000439000-memory.dmp

                                      Filesize

                                      228KB

                                    • memory/3996-87-0x0000000000400000-0x0000000000439000-memory.dmp

                                      Filesize

                                      228KB

                                    • memory/4208-149-0x0000000000400000-0x0000000000439000-memory.dmp

                                      Filesize

                                      228KB

                                    • memory/4208-142-0x0000000000400000-0x0000000000439000-memory.dmp

                                      Filesize

                                      228KB

                                    • memory/4248-103-0x0000000000400000-0x0000000000439000-memory.dmp

                                      Filesize

                                      228KB

                                    • memory/4248-112-0x0000000000400000-0x0000000000439000-memory.dmp

                                      Filesize

                                      228KB