Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/11/2023, 10:18

General

  • Target

    NEAS.a4895431d04df31f6706bab29c13a3a0_JC.exe

  • Size

    208KB

  • MD5

    a4895431d04df31f6706bab29c13a3a0

  • SHA1

    fb3b62732d84d4daa1c948d86898265befbacaa8

  • SHA256

    496d0f5e3b2ea84ec2ab55371b4fdcd30a863c17247fe4e4fdc2595e5162135d

  • SHA512

    b48af0ca6c5110dbfe54b292553a0f595e8f97e9cad550c79206f9075d6cc3eb824fe0d045a546f52378d9cf57ffa633a2ede824d54462a96f403450b2c4ca31

  • SSDEEP

    6144:arYTgEMnRNL+I3YHB9/vMYRbbdfHKPQEj1:OBrIjU8IPQC

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 10 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Drops file in System32 directory 9 IoCs
  • Drops file in Windows directory 21 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 11 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of SetWindowsHookEx 22 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.a4895431d04df31f6706bab29c13a3a0_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.a4895431d04df31f6706bab29c13a3a0_JC.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3676
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\windows\system\BFAGQ.exe.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4224
      • C:\windows\system\BFAGQ.exe
        C:\windows\system\BFAGQ.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:948
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\windows\system32\FGDPHE.exe.bat" "
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1476
          • C:\windows\SysWOW64\FGDPHE.exe
            C:\windows\system32\FGDPHE.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3768
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\windows\AQLO.exe.bat" "
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:3096
              • C:\windows\AQLO.exe
                C:\windows\AQLO.exe
                7⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:4440
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c ""C:\windows\system32\VEQYFO.exe.bat" "
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4520
                  • C:\windows\SysWOW64\VEQYFO.exe
                    C:\windows\system32\VEQYFO.exe
                    9⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:768
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c ""C:\windows\system\LXHLS.exe.bat" "
                      10⤵
                      • Suspicious use of WriteProcessMemory
                      PID:400
                      • C:\windows\system\LXHLS.exe
                        C:\windows\system\LXHLS.exe
                        11⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:3012
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c ""C:\windows\system\PAG.exe.bat" "
                          12⤵
                          • Suspicious use of WriteProcessMemory
                          PID:884
                          • C:\windows\system\PAG.exe
                            C:\windows\system\PAG.exe
                            13⤵
                            • Checks computer location settings
                            • Executes dropped EXE
                            • Drops file in Windows directory
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of SetWindowsHookEx
                            • Suspicious use of WriteProcessMemory
                            PID:1724
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c ""C:\windows\TIMGF.exe.bat" "
                              14⤵
                              • Suspicious use of WriteProcessMemory
                              PID:2104
                              • C:\windows\TIMGF.exe
                                C:\windows\TIMGF.exe
                                15⤵
                                • Checks computer location settings
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of SetWindowsHookEx
                                • Suspicious use of WriteProcessMemory
                                PID:316
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c ""C:\windows\system32\MICZW.exe.bat" "
                                  16⤵
                                  • Suspicious use of WriteProcessMemory
                                  PID:4320
                                  • C:\windows\SysWOW64\MICZW.exe
                                    C:\windows\system32\MICZW.exe
                                    17⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • Drops file in Windows directory
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of SetWindowsHookEx
                                    • Suspicious use of WriteProcessMemory
                                    PID:4436
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /c ""C:\windows\system\UYDQ.exe.bat" "
                                      18⤵
                                      • Suspicious use of WriteProcessMemory
                                      PID:1448
                                      • C:\windows\system\UYDQ.exe
                                        C:\windows\system\UYDQ.exe
                                        19⤵
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • Drops file in Windows directory
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of SetWindowsHookEx
                                        • Suspicious use of WriteProcessMemory
                                        PID:1148
                                        • C:\Windows\SysWOW64\cmd.exe
                                          C:\Windows\system32\cmd.exe /c ""C:\windows\XKCBQP.exe.bat" "
                                          20⤵
                                          • Suspicious use of WriteProcessMemory
                                          PID:5016
                                          • C:\windows\XKCBQP.exe
                                            C:\windows\XKCBQP.exe
                                            21⤵
                                            • Executes dropped EXE
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2820
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 844
                                              22⤵
                                              • Program crash
                                              PID:4392
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 1256
                                          20⤵
                                          • Program crash
                                          PID:3664
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 4436 -s 960
                                      18⤵
                                      • Program crash
                                      PID:2404
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 316 -s 1328
                                  16⤵
                                  • Program crash
                                  PID:3108
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 984
                              14⤵
                              • Program crash
                              PID:2544
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 1336
                          12⤵
                          • Program crash
                          PID:3436
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 768 -s 960
                      10⤵
                      • Program crash
                      PID:1508
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4440 -s 1296
                  8⤵
                  • Program crash
                  PID:1304
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 988
              6⤵
              • Program crash
              PID:3728
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 948 -s 1328
          4⤵
          • Program crash
          PID:3508
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3676 -s 948
      2⤵
      • Program crash
      PID:880
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3676 -ip 3676
    1⤵
      PID:4288
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 948 -ip 948
      1⤵
        PID:4696
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3768 -ip 3768
        1⤵
          PID:1156
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4440 -ip 4440
          1⤵
            PID:1896
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 768 -ip 768
            1⤵
              PID:4360
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3012 -ip 3012
              1⤵
                PID:3820
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1724 -ip 1724
                1⤵
                  PID:2876
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 316 -ip 316
                  1⤵
                    PID:4356
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4436 -ip 4436
                    1⤵
                      PID:2620
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1148 -ip 1148
                      1⤵
                        PID:1380
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2820 -ip 2820
                        1⤵
                          PID:4244

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Windows\AQLO.exe

                          Filesize

                          208KB

                          MD5

                          99833c7bf70dd9b9aee2bd78b8ada5e4

                          SHA1

                          09700492ccdb2ca4dfa9476c2447954215728e57

                          SHA256

                          1bdd016280152ac347af00bddaf5a384834fb5a5130165944e5a45cf84127ed8

                          SHA512

                          94440fafda5763ae4994d11ff28efa4eb52e12c84aba14a79455334908a28ef7f38bcc2c1937d7220fd00baf9242ff48852a6fdace409a4801427d922dc49b28

                        • C:\Windows\SysWOW64\FGDPHE.exe

                          Filesize

                          208KB

                          MD5

                          a36cad84b5af8ef1dfeba504332f9d2d

                          SHA1

                          b8b9e14ec952d73c9ce2e10209f75d92122f7ce7

                          SHA256

                          d004a9d3d1034e8f427444a124f2c7f07703857182593c9e9213cf3987915747

                          SHA512

                          fbf6ffff5e6a068d5c6ee166ebd5c7b468858431d31465dcfdf8f4a9210affb98da0b840fcf97d83bf9f10bbbd036ffde1f72f755a6429237c74d76842e69c04

                        • C:\Windows\SysWOW64\FGDPHE.exe

                          Filesize

                          208KB

                          MD5

                          bbfc99915afb9febc0905fde40b3fd9f

                          SHA1

                          0d7a4d1e0291c0b583ffb55913beee95f4abce7a

                          SHA256

                          e88e1632457878d990c73aa22d217f2479146f83bbb7569c7e6bade50904569a

                          SHA512

                          de4de94302b138a548fcaa5500c3e21447b6af2920f1c714422a0fd08746a7d28947b3c97481163f151b4f4401f4461fb88a11ff65a68111ff3176d681a79682

                        • C:\Windows\SysWOW64\MICZW.exe

                          Filesize

                          208KB

                          MD5

                          e23b1fb7fa3fa1058dfe525b38d1e7c5

                          SHA1

                          d3b93711190f9fecdc9508b71a5ed62386d06de0

                          SHA256

                          d5761e2dd818f24df31f5359e1eae4467e7dd1f158ba6be5dfbf233e4e469c1e

                          SHA512

                          ed17c8364393561bcf151124da45258b5456703b76811c80d46db3677f0a10f6dfd50c18e3437e602d26d471e96ddbfc244a68f53973a96289618bb122914552

                        • C:\Windows\SysWOW64\VEQYFO.exe

                          Filesize

                          208KB

                          MD5

                          99833c7bf70dd9b9aee2bd78b8ada5e4

                          SHA1

                          09700492ccdb2ca4dfa9476c2447954215728e57

                          SHA256

                          1bdd016280152ac347af00bddaf5a384834fb5a5130165944e5a45cf84127ed8

                          SHA512

                          94440fafda5763ae4994d11ff28efa4eb52e12c84aba14a79455334908a28ef7f38bcc2c1937d7220fd00baf9242ff48852a6fdace409a4801427d922dc49b28

                        • C:\Windows\System\BFAGQ.exe

                          Filesize

                          208KB

                          MD5

                          4de9adad2a5ceaf27cf18af38d10eea2

                          SHA1

                          cd793605c74934fe19ce9c9af83f15fba343be63

                          SHA256

                          345df5d2866f83e5207dee716e8d2afe231f61fa32e3030268b920ca8343387b

                          SHA512

                          398f143a603b7f0ce9a6a05fdf1cb192ed46042a7f1e7af4fa78c140eac50079d873eea9cd0972db1dcc80617519c6c7ff508b0d35a89b325291b0b74ca12b15

                        • C:\Windows\System\LXHLS.exe

                          Filesize

                          208KB

                          MD5

                          dd3b1ef1146df1feb8959ba9719318d2

                          SHA1

                          317b233188331c6d2fb2308a52c5f620580f0615

                          SHA256

                          52431c42ba576ed4464ef87d730b64de3856c37f4d025e6fe85fb3b2684f3ac1

                          SHA512

                          d2255852d7f67a9c14d957b3f5fc431529814426dd66f1a3d8acdf9f7dd6bfcec15b3e76520f4c107334f9d568dd023a5f3bc2231c769acc5a351fda52aec030

                        • C:\Windows\System\PAG.exe

                          Filesize

                          208KB

                          MD5

                          90041fe2c663946d78c3bdd178b924b5

                          SHA1

                          45e90cdbabd53913d694da81635917a581529ea0

                          SHA256

                          0342fafd6bcf45c869cecb932550dc3241036750087f1b3614a7ac29f1be8f75

                          SHA512

                          16b9d16659c18ccd008c455b1ef75d889ddc75bee6c57bf78512aead89bb8974a061cd21d3f5db7e001b63c9fe6d4e5421fa5a9bf644560b5ff90d140cab4a9e

                        • C:\Windows\System\UYDQ.exe

                          Filesize

                          208KB

                          MD5

                          e23b1fb7fa3fa1058dfe525b38d1e7c5

                          SHA1

                          d3b93711190f9fecdc9508b71a5ed62386d06de0

                          SHA256

                          d5761e2dd818f24df31f5359e1eae4467e7dd1f158ba6be5dfbf233e4e469c1e

                          SHA512

                          ed17c8364393561bcf151124da45258b5456703b76811c80d46db3677f0a10f6dfd50c18e3437e602d26d471e96ddbfc244a68f53973a96289618bb122914552

                        • C:\Windows\TIMGF.exe

                          Filesize

                          208KB

                          MD5

                          d46e8e8e7266b94f099d9bcf56ff582a

                          SHA1

                          90884b6d1ffe031c90ff9c046cb2e289bdb4033b

                          SHA256

                          73ed1d48118ea1096f824444870b4570b039bd3259b0c5e82e088c8ece3c5f32

                          SHA512

                          ec57a172da1409fe01f2092921d14cf4be2c8169a4af73bdeaccd258d8b45bff7ada4572fe182e85865f7390b87314d954671c9237afaf716578e068099f6eba

                        • C:\Windows\XKCBQP.exe

                          Filesize

                          208KB

                          MD5

                          ca3ad7cac3b91de2a9d10feea379ed18

                          SHA1

                          aa346225043a4201a0c6e7ac1f8fabb5da006bc1

                          SHA256

                          79b46b5fcab3a0df08b8174aa1b4a4eaa3159538f38024efa8b459332d847745

                          SHA512

                          f775b3584f771b6d04121448412d868751f86fdcf45c68e84e71a8e8fc1f6825ff217baef488336f2207ea83043beb3a6d2229582151ae3c355f3dd04b778a96

                        • C:\windows\AQLO.exe

                          Filesize

                          208KB

                          MD5

                          99833c7bf70dd9b9aee2bd78b8ada5e4

                          SHA1

                          09700492ccdb2ca4dfa9476c2447954215728e57

                          SHA256

                          1bdd016280152ac347af00bddaf5a384834fb5a5130165944e5a45cf84127ed8

                          SHA512

                          94440fafda5763ae4994d11ff28efa4eb52e12c84aba14a79455334908a28ef7f38bcc2c1937d7220fd00baf9242ff48852a6fdace409a4801427d922dc49b28

                        • C:\windows\AQLO.exe.bat

                          Filesize

                          54B

                          MD5

                          972063c9c762ed71cc662b104512b8e1

                          SHA1

                          210d55aec272f554cb3a3bf92078023ade613990

                          SHA256

                          87a1bca95a43207380e9aec61590cf9317de60c9ac8060a1d8e86d163eba9fda

                          SHA512

                          b658d67bc4cc034b3fcb671ba8d14c55f0250f5a10069d74e207bd4251a7badc5b57fe3c9d5b9677979269d2ad979588af7255d2fafccdb5acc5a8b47f9ca146

                        • C:\windows\SysWOW64\FGDPHE.exe

                          Filesize

                          208KB

                          MD5

                          bbfc99915afb9febc0905fde40b3fd9f

                          SHA1

                          0d7a4d1e0291c0b583ffb55913beee95f4abce7a

                          SHA256

                          e88e1632457878d990c73aa22d217f2479146f83bbb7569c7e6bade50904569a

                          SHA512

                          de4de94302b138a548fcaa5500c3e21447b6af2920f1c714422a0fd08746a7d28947b3c97481163f151b4f4401f4461fb88a11ff65a68111ff3176d681a79682

                        • C:\windows\SysWOW64\FGDPHE.exe.bat

                          Filesize

                          76B

                          MD5

                          17620f908ad1f6d627f4aee997ecbd9c

                          SHA1

                          aa13ab25031e3da18cc98b29047fda87165a38d0

                          SHA256

                          7f5d250678af00ecde66fed32143bbbd67076204031cfdef7c5f5a9d1249539d

                          SHA512

                          1e01cb53843b0c7c598d810a5b919080c4ef93d4d698ed4a89d1b15161a2c6760966b1538a7786d86f962fb0ae0a71d71f2fcbdac21ef5ecb3f3582817820372

                        • C:\windows\SysWOW64\MICZW.exe

                          Filesize

                          208KB

                          MD5

                          e23b1fb7fa3fa1058dfe525b38d1e7c5

                          SHA1

                          d3b93711190f9fecdc9508b71a5ed62386d06de0

                          SHA256

                          d5761e2dd818f24df31f5359e1eae4467e7dd1f158ba6be5dfbf233e4e469c1e

                          SHA512

                          ed17c8364393561bcf151124da45258b5456703b76811c80d46db3677f0a10f6dfd50c18e3437e602d26d471e96ddbfc244a68f53973a96289618bb122914552

                        • C:\windows\SysWOW64\MICZW.exe.bat

                          Filesize

                          74B

                          MD5

                          0d93ce259c909788520f94f9ef88a5a2

                          SHA1

                          0204054ddce318ca1f29bd78699701ef03a008cf

                          SHA256

                          b3b0f84b6251f5e1debab08dd149491c7b3b3eb7756fc90a036e30a9d2d48c53

                          SHA512

                          957f28c683cb88f630bcfe5d144abc9fba57a7dedba772749255e568e4c299dd9e9df4433c44188dd027af4560dfa28fe2c86aed11b466df0915efbe15294f19

                        • C:\windows\SysWOW64\VEQYFO.exe

                          Filesize

                          208KB

                          MD5

                          99833c7bf70dd9b9aee2bd78b8ada5e4

                          SHA1

                          09700492ccdb2ca4dfa9476c2447954215728e57

                          SHA256

                          1bdd016280152ac347af00bddaf5a384834fb5a5130165944e5a45cf84127ed8

                          SHA512

                          94440fafda5763ae4994d11ff28efa4eb52e12c84aba14a79455334908a28ef7f38bcc2c1937d7220fd00baf9242ff48852a6fdace409a4801427d922dc49b28

                        • C:\windows\SysWOW64\VEQYFO.exe.bat

                          Filesize

                          76B

                          MD5

                          fa47d9541b76121345b640f2aa50a66f

                          SHA1

                          3687382e9b31233937f9881eaf8112b3e632998a

                          SHA256

                          d456bb957358c9e4c9abb0636b44e3dd3c369c0ed268da3d8800734a7bb3d1f8

                          SHA512

                          97589db16c4ef01cc4aa039be1c3a4905d438d7e058bf493bb7e49a51e3bb6ddc41c653f6dafe2c13b82d51e23a5a94ef773215c46d0a9364ba929b4fd085731

                        • C:\windows\TIMGF.exe

                          Filesize

                          208KB

                          MD5

                          d46e8e8e7266b94f099d9bcf56ff582a

                          SHA1

                          90884b6d1ffe031c90ff9c046cb2e289bdb4033b

                          SHA256

                          73ed1d48118ea1096f824444870b4570b039bd3259b0c5e82e088c8ece3c5f32

                          SHA512

                          ec57a172da1409fe01f2092921d14cf4be2c8169a4af73bdeaccd258d8b45bff7ada4572fe182e85865f7390b87314d954671c9237afaf716578e068099f6eba

                        • C:\windows\TIMGF.exe.bat

                          Filesize

                          56B

                          MD5

                          01fc3e8b7498496343cb38989ce9947f

                          SHA1

                          30b45d4ee4187d484d01913b03ec52f8e1658f36

                          SHA256

                          b2ca2f9e2fdd995f1060548cd6379e24f3cb05f349857fa3e8d209918fdf1763

                          SHA512

                          487dba56fcb3dd7eb5d692c4d36913742514ce5bbc0dc5304aeb05d5bb7dd47b651be4dd6b1f5fe590cf89d7caf8f44a7199bb535b83e64d9fd5c96407671750

                        • C:\windows\XKCBQP.exe

                          Filesize

                          208KB

                          MD5

                          ca3ad7cac3b91de2a9d10feea379ed18

                          SHA1

                          aa346225043a4201a0c6e7ac1f8fabb5da006bc1

                          SHA256

                          79b46b5fcab3a0df08b8174aa1b4a4eaa3159538f38024efa8b459332d847745

                          SHA512

                          f775b3584f771b6d04121448412d868751f86fdcf45c68e84e71a8e8fc1f6825ff217baef488336f2207ea83043beb3a6d2229582151ae3c355f3dd04b778a96

                        • C:\windows\XKCBQP.exe.bat

                          Filesize

                          58B

                          MD5

                          24cc7731d77006793b37df24ca6c24d8

                          SHA1

                          f26e568218f7acc4d6c7ea9a27341f9916da0cb3

                          SHA256

                          ff314efd152f11c351b6785e6da198ab8332132353967b59abe894e1edefaf7e

                          SHA512

                          3135feb8a699cef950e96eaa4bd591d88921eeae6628494424c093cda9e4e4d031aa1ed95d0104f2d460b01b0cabe18b36f48843a0c55676ad8473d80bbb2390

                        • C:\windows\system\BFAGQ.exe

                          Filesize

                          208KB

                          MD5

                          4de9adad2a5ceaf27cf18af38d10eea2

                          SHA1

                          cd793605c74934fe19ce9c9af83f15fba343be63

                          SHA256

                          345df5d2866f83e5207dee716e8d2afe231f61fa32e3030268b920ca8343387b

                          SHA512

                          398f143a603b7f0ce9a6a05fdf1cb192ed46042a7f1e7af4fa78c140eac50079d873eea9cd0972db1dcc80617519c6c7ff508b0d35a89b325291b0b74ca12b15

                        • C:\windows\system\BFAGQ.exe.bat

                          Filesize

                          70B

                          MD5

                          e0edc84f161c88b49086e5be1c98d8af

                          SHA1

                          8630dce764815f0c491741321d89df186c92f666

                          SHA256

                          410210c47f7d4c70dff3f98050ea6910100420a59e3ee38c8f3002309d63bfab

                          SHA512

                          1b0f5a407302eaa6bf0e6f05f66ae5bb9bd610965eb19eeedf974c760b1f79ee0463410048ed7a7bf63ca1609779b0c1e21859c9bb1b0092daee4d9eea65655b

                        • C:\windows\system\LXHLS.exe

                          Filesize

                          208KB

                          MD5

                          dd3b1ef1146df1feb8959ba9719318d2

                          SHA1

                          317b233188331c6d2fb2308a52c5f620580f0615

                          SHA256

                          52431c42ba576ed4464ef87d730b64de3856c37f4d025e6fe85fb3b2684f3ac1

                          SHA512

                          d2255852d7f67a9c14d957b3f5fc431529814426dd66f1a3d8acdf9f7dd6bfcec15b3e76520f4c107334f9d568dd023a5f3bc2231c769acc5a351fda52aec030

                        • C:\windows\system\LXHLS.exe.bat

                          Filesize

                          70B

                          MD5

                          a978f0f266a5e44a72380d7c2bff1dd4

                          SHA1

                          028788a0ffde22f1bbe5f0bbfca4c40cfb2c673b

                          SHA256

                          50a8704915c3d9a0325b5f3845c080fe83a3467f55cc51ca33706ccdde4d6744

                          SHA512

                          6a60ebaddae8aab6dd6791e11a68b92d6b0d291f6caee4ef483e040e96ad8a86c27b1b43a6bbea4a392a381b09b3e8a32dfc2745c792fc85d5224fc9b8ae07ac

                        • C:\windows\system\PAG.exe

                          Filesize

                          208KB

                          MD5

                          90041fe2c663946d78c3bdd178b924b5

                          SHA1

                          45e90cdbabd53913d694da81635917a581529ea0

                          SHA256

                          0342fafd6bcf45c869cecb932550dc3241036750087f1b3614a7ac29f1be8f75

                          SHA512

                          16b9d16659c18ccd008c455b1ef75d889ddc75bee6c57bf78512aead89bb8974a061cd21d3f5db7e001b63c9fe6d4e5421fa5a9bf644560b5ff90d140cab4a9e

                        • C:\windows\system\PAG.exe.bat

                          Filesize

                          66B

                          MD5

                          38d81ed4b016339622f14acc26f6e4f6

                          SHA1

                          43aae764c454cfb27f9eccf48c2339f72c9d7146

                          SHA256

                          28014c1e70aa05a0055496c0fc82540dd7df76120fd031e5794e19c8c5a52ba9

                          SHA512

                          68393755e18d8fcc3de13e857a8bf6ce9c8cc394ae7bce38672691e62b6e0562e3cea2b92f2097e5cd90d7d0b7942e060185aa0445f056ba78ba426bc8053a8a

                        • C:\windows\system\UYDQ.exe

                          Filesize

                          208KB

                          MD5

                          e23b1fb7fa3fa1058dfe525b38d1e7c5

                          SHA1

                          d3b93711190f9fecdc9508b71a5ed62386d06de0

                          SHA256

                          d5761e2dd818f24df31f5359e1eae4467e7dd1f158ba6be5dfbf233e4e469c1e

                          SHA512

                          ed17c8364393561bcf151124da45258b5456703b76811c80d46db3677f0a10f6dfd50c18e3437e602d26d471e96ddbfc244a68f53973a96289618bb122914552

                        • C:\windows\system\UYDQ.exe.bat

                          Filesize

                          68B

                          MD5

                          a8b312336e4b3ad88a776c944a263173

                          SHA1

                          2eb2d1448a14590355fa3987d5dfc5f888e14888

                          SHA256

                          54c9800f0bec7efbfd984e61fb4677a7968f78cbc4da25a3e94764284100c3a1

                          SHA512

                          b4832fe8437f512f6b87bc7d37a64af262d5890980ae3a0d52dedef94c0c11ed43ec3f50d17c9481d516022306f358bfd9b0d54f7af27171898e9f719ff37bf1

                        • memory/316-118-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/316-82-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/768-60-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/768-47-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/948-11-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/948-35-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/1148-106-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/1148-119-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/1724-90-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/1724-71-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/2820-121-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/2820-117-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/3012-58-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/3012-72-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/3676-30-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/3676-0-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/3768-36-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/3768-21-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/4436-95-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/4436-120-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/4440-48-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB

                        • memory/4440-34-0x0000000000400000-0x0000000000438000-memory.dmp

                          Filesize

                          224KB