Analysis

  • max time kernel
    150s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2024, 22:25

General

  • Target

    0ff036ee4306066aa80d8bd4cdc917a0_NeikiAnalytics.exe

  • Size

    145KB

  • MD5

    0ff036ee4306066aa80d8bd4cdc917a0

  • SHA1

    0a52f53550f038954163f7b78806d13ee23b4033

  • SHA256

    ae0b9eddb3e2ca5a60825f7ecf8b0719082d78fba96b81bcf91cb37cf08b5fc3

  • SHA512

    684145ea4363ec603f1767f13523cb82834843b8e5fb1ae787486ac29d19b301c589d844c70f6828b5bb4169062dbe5f0652e57e8323cefd554fbfa8974a8d82

  • SSDEEP

    1536:FJo0IHgL2AHfb1mzaFXg+xsukl4Y17jsgS/jHagQNuXGpeVTV:Dx6AHjYzaFXg+w17jsgS/jHagQg19V

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • UAC bypass 3 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Drops file in Drivers directory 24 IoCs
  • Sets file execution options in registry 2 TTPs 64 IoCs
  • Executes dropped EXE 30 IoCs
  • Loads dropped DLL 18 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Drops desktop.ini file(s) 64 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 64 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 39 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 6 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies Control Panel 64 IoCs
  • Modifies Internet Explorer settings 1 TTPs 12 IoCs
  • Modifies registry class 51 IoCs
  • Runs ping.exe 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 31 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ff036ee4306066aa80d8bd4cdc917a0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0ff036ee4306066aa80d8bd4cdc917a0_NeikiAnalytics.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • UAC bypass
    • Disables RegEdit via registry modification
    • Drops file in Drivers directory
    • Sets file execution options in registry
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3684
    • C:\Windows\Fonts\Admin 9 - 5 - 2024\smss.exe
      "C:\Windows\Fonts\Admin 9 - 5 - 2024\smss.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • UAC bypass
      • Disables RegEdit via registry modification
      • Drops file in Drivers directory
      • Sets file execution options in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Sets desktop wallpaper using registry
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2736
      • C:\Windows\Fonts\Admin 9 - 5 - 2024\smss.exe
        "C:\Windows\Fonts\Admin 9 - 5 - 2024\smss.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:212
      • C:\Windows\Fonts\Admin 9 - 5 - 2024\Gaara.exe
        "C:\Windows\Fonts\Admin 9 - 5 - 2024\Gaara.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • UAC bypass
        • Disables RegEdit via registry modification
        • Drops file in Drivers directory
        • Sets file execution options in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops desktop.ini file(s)
        • Enumerates connected drives
        • Drops autorun.inf file
        • Drops file in System32 directory
        • Sets desktop wallpaper using registry
        • Drops file in Windows directory
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:3704
        • C:\Windows\Fonts\Admin 9 - 5 - 2024\smss.exe
          "C:\Windows\Fonts\Admin 9 - 5 - 2024\smss.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:4924
        • C:\Windows\Fonts\Admin 9 - 5 - 2024\Gaara.exe
          "C:\Windows\Fonts\Admin 9 - 5 - 2024\Gaara.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:2760
        • C:\Windows\Fonts\Admin 9 - 5 - 2024\csrss.exe
          "C:\Windows\Fonts\Admin 9 - 5 - 2024\csrss.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • UAC bypass
          • Disables RegEdit via registry modification
          • Drops file in Drivers directory
          • Sets file execution options in registry
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Drops desktop.ini file(s)
          • Enumerates connected drives
          • Drops autorun.inf file
          • Drops file in System32 directory
          • Sets desktop wallpaper using registry
          • Drops file in Windows directory
          • Modifies Control Panel
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:3384
          • C:\Windows\Fonts\Admin 9 - 5 - 2024\smss.exe
            "C:\Windows\Fonts\Admin 9 - 5 - 2024\smss.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:1532
          • C:\Windows\Fonts\Admin 9 - 5 - 2024\Gaara.exe
            "C:\Windows\Fonts\Admin 9 - 5 - 2024\Gaara.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:2288
          • C:\Windows\Fonts\Admin 9 - 5 - 2024\csrss.exe
            "C:\Windows\Fonts\Admin 9 - 5 - 2024\csrss.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:1340
          • C:\Windows\SysWOW64\drivers\Kazekage.exe
            C:\Windows\system32\drivers\Kazekage.exe
            5⤵
            • Modifies WinLogon for persistence
            • Modifies visibility of file extensions in Explorer
            • Modifies visiblity of hidden/system files in Explorer
            • UAC bypass
            • Disables RegEdit via registry modification
            • Drops file in Drivers directory
            • Sets file execution options in registry
            • Executes dropped EXE
            • Adds Run key to start application
            • Checks whether UAC is enabled
            • Drops desktop.ini file(s)
            • Enumerates connected drives
            • Drops autorun.inf file
            • Drops file in System32 directory
            • Sets desktop wallpaper using registry
            • Drops file in Windows directory
            • Modifies Control Panel
            • Modifies Internet Explorer settings
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:2212
            • C:\Windows\Fonts\Admin 9 - 5 - 2024\smss.exe
              "C:\Windows\Fonts\Admin 9 - 5 - 2024\smss.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:4460
            • C:\Windows\Fonts\Admin 9 - 5 - 2024\Gaara.exe
              "C:\Windows\Fonts\Admin 9 - 5 - 2024\Gaara.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:4240
            • C:\Windows\Fonts\Admin 9 - 5 - 2024\csrss.exe
              "C:\Windows\Fonts\Admin 9 - 5 - 2024\csrss.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:1708
            • C:\Windows\SysWOW64\drivers\Kazekage.exe
              C:\Windows\system32\drivers\Kazekage.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:4808
            • C:\Windows\SysWOW64\drivers\system32.exe
              C:\Windows\system32\drivers\system32.exe
              6⤵
              • Modifies WinLogon for persistence
              • Modifies visibility of file extensions in Explorer
              • Modifies visiblity of hidden/system files in Explorer
              • UAC bypass
              • Disables RegEdit via registry modification
              • Drops file in Drivers directory
              • Sets file execution options in registry
              • Executes dropped EXE
              • Adds Run key to start application
              • Checks whether UAC is enabled
              • Drops desktop.ini file(s)
              • Enumerates connected drives
              • Drops autorun.inf file
              • Drops file in System32 directory
              • Sets desktop wallpaper using registry
              • Drops file in Windows directory
              • Modifies Control Panel
              • Modifies Internet Explorer settings
              • Modifies registry class
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:1764
              • C:\Windows\Fonts\Admin 9 - 5 - 2024\smss.exe
                "C:\Windows\Fonts\Admin 9 - 5 - 2024\smss.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:228
              • C:\Windows\Fonts\Admin 9 - 5 - 2024\Gaara.exe
                "C:\Windows\Fonts\Admin 9 - 5 - 2024\Gaara.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:3340
              • C:\Windows\Fonts\Admin 9 - 5 - 2024\csrss.exe
                "C:\Windows\Fonts\Admin 9 - 5 - 2024\csrss.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:2928
              • C:\Windows\SysWOW64\drivers\Kazekage.exe
                C:\Windows\system32\drivers\Kazekage.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:2508
              • C:\Windows\SysWOW64\drivers\system32.exe
                C:\Windows\system32\drivers\system32.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:2752
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.rasasayang.com.my 65500
                7⤵
                • Runs ping.exe
                PID:5032
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.duniasex.com 65500
                7⤵
                • Runs ping.exe
                PID:2940
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.rasasayang.com.my 65500
                7⤵
                • Runs ping.exe
                PID:2924
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.duniasex.com 65500
                7⤵
                • Runs ping.exe
                PID:1436
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.rasasayang.com.my 65500
              6⤵
              • Runs ping.exe
              PID:1532
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.duniasex.com 65500
              6⤵
              • Runs ping.exe
              PID:2788
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.rasasayang.com.my 65500
              6⤵
              • Runs ping.exe
              PID:3424
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.duniasex.com 65500
              6⤵
              • Runs ping.exe
              PID:4784
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.rasasayang.com.my 65500
              6⤵
              • Runs ping.exe
              PID:4556
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.duniasex.com 65500
              6⤵
              • Runs ping.exe
              PID:212
          • C:\Windows\SysWOW64\drivers\system32.exe
            C:\Windows\system32\drivers\system32.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:2748
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.rasasayang.com.my 65500
            5⤵
            • Runs ping.exe
            PID:2096
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.duniasex.com 65500
            5⤵
            • Runs ping.exe
            PID:1196
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.rasasayang.com.my 65500
            5⤵
            • Runs ping.exe
            PID:2284
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.duniasex.com 65500
            5⤵
            • Runs ping.exe
            PID:5096
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.rasasayang.com.my 65500
            5⤵
            • Runs ping.exe
            PID:3664
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.duniasex.com 65500
            5⤵
            • Runs ping.exe
            PID:1928
        • C:\Windows\SysWOW64\drivers\Kazekage.exe
          C:\Windows\system32\drivers\Kazekage.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:4680
        • C:\Windows\SysWOW64\drivers\system32.exe
          C:\Windows\system32\drivers\system32.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1524
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          4⤵
          • Runs ping.exe
          PID:2684
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          4⤵
          • Runs ping.exe
          PID:1932
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          4⤵
          • Runs ping.exe
          PID:2804
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          4⤵
          • Runs ping.exe
          PID:4508
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          4⤵
          • Runs ping.exe
          PID:3512
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          4⤵
          • Runs ping.exe
          PID:1456
      • C:\Windows\Fonts\Admin 9 - 5 - 2024\csrss.exe
        "C:\Windows\Fonts\Admin 9 - 5 - 2024\csrss.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:876
      • C:\Windows\SysWOW64\drivers\Kazekage.exe
        C:\Windows\system32\drivers\Kazekage.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2560
      • C:\Windows\SysWOW64\drivers\system32.exe
        C:\Windows\system32\drivers\system32.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:456
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.rasasayang.com.my 65500
        3⤵
        • Runs ping.exe
        PID:1348
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.duniasex.com 65500
        3⤵
        • Runs ping.exe
        PID:1232
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.rasasayang.com.my 65500
        3⤵
        • Runs ping.exe
        PID:2800
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.duniasex.com 65500
        3⤵
        • Runs ping.exe
        PID:4860
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.rasasayang.com.my 65500
        3⤵
        • Runs ping.exe
        PID:4180
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.duniasex.com 65500
        3⤵
        • Runs ping.exe
        PID:2056
    • C:\Windows\Fonts\Admin 9 - 5 - 2024\Gaara.exe
      "C:\Windows\Fonts\Admin 9 - 5 - 2024\Gaara.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:4944
    • C:\Windows\Fonts\Admin 9 - 5 - 2024\csrss.exe
      "C:\Windows\Fonts\Admin 9 - 5 - 2024\csrss.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:2904
    • C:\Windows\SysWOW64\drivers\Kazekage.exe
      C:\Windows\system32\drivers\Kazekage.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1340
    • C:\Windows\SysWOW64\drivers\system32.exe
      C:\Windows\system32\drivers\system32.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:5072
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.rasasayang.com.my 65500
      2⤵
      • Runs ping.exe
      PID:4648
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.duniasex.com 65500
      2⤵
      • Runs ping.exe
      PID:2928
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.rasasayang.com.my 65500
      2⤵
      • Runs ping.exe
      PID:4388
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.duniasex.com 65500
      2⤵
      • Runs ping.exe
      PID:2140
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.rasasayang.com.my 65500
      2⤵
      • Runs ping.exe
      PID:2136
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.duniasex.com 65500
      2⤵
      • Runs ping.exe
      PID:1940
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4332,i,15721081447618313297,6839074028983272033,262144 --variations-seed-version --mojo-platform-channel-handle=1336 /prefetch:8
    1⤵
      PID:2232

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Admin Games\Readme.txt

      Filesize

      736B

      MD5

      bb5d6abdf8d0948ac6895ce7fdfbc151

      SHA1

      9266b7a247a4685892197194d2b9b86c8f6dddbd

      SHA256

      5db2e0915b5464d32e83484f8ae5e3c73d2c78f238fde5f58f9b40dbb5322de8

      SHA512

      878444760e8df878d65bb62b4798177e168eb099def58ad3634f4348e96705c83f74324f9fa358f0eff389991976698a233ca53e9b72034ae11c86d42322a76c

    • C:\Autorun.inf

      Filesize

      196B

      MD5

      1564dfe69ffed40950e5cb644e0894d1

      SHA1

      201b6f7a01cc49bb698bea6d4945a082ed454ce4

      SHA256

      be114a2dbcc08540b314b01882aa836a772a883322a77b67aab31233e26dc184

      SHA512

      72df187e39674b657974392cfa268e71ef86dc101ebd2303896381ca56d3c05aa9db3f0ab7d0e428d7436e0108c8f19e94c2013814d30b0b95a23a6b9e341097

    • C:\Windows\Fonts\Admin 9 - 5 - 2024\Gaara.exe

      Filesize

      145KB

      MD5

      dd8baf386f8fdb468d13b37fcbe6ddc8

      SHA1

      19e107d939f50bbda53d51b4f3f3c741008604ac

      SHA256

      7fba845a2e7ab9befbf02197ac81cd30014d51bac1a31ce879ab9ffb84040505

      SHA512

      4fafcecc72e74f5347f533ab41cff6fe8f5a3aa681b2d441bf73d36da5e586de269215a4250c81fa2e888a94f88d1f7210240f0e989c11aa7abf9713dff34790

    • C:\Windows\Fonts\Admin 9 - 5 - 2024\csrss.exe

      Filesize

      145KB

      MD5

      4a2ac123db824fa573eec8775a23c5f2

      SHA1

      19eb14fa7c0537bfb3c787d0c9ce7b748a12811e

      SHA256

      d992e238016c78ae8d7ebafa388c01d84e5ca4e498b39c9796c10d7653a40438

      SHA512

      4d2a90f479647f225ea0be3378dbeddfc0c2469404eb9b1f069e48aa20e7d84a6b9730ffd228c3ae6fe03e5515a1277017aa1b0cbfed6c420f5c7ccd84894646

    • C:\Windows\Fonts\Admin 9 - 5 - 2024\csrss.exe

      Filesize

      145KB

      MD5

      913e15da655c10f8cec177cda05e549f

      SHA1

      9075a05da13926f9e36945f05668a3753cf80d72

      SHA256

      fe5aa97beb313b1a5b18b3700ea21b09898535760e466af288fc2bcf990a42d3

      SHA512

      c59442fb6dcccf078e620b80edeb4e060661d40314f25d91593c1b37be4645296c58bfe503485498328da159c2160b7146dfd3bbea1dbb259e878a24d55b69cc

    • C:\Windows\Fonts\Admin 9 - 5 - 2024\smss.exe

      Filesize

      145KB

      MD5

      1120b2f82fadc9fc5aa1bb973a9ad703

      SHA1

      a064343d2be5146fdb907891b8dae20dee70fdf3

      SHA256

      4611ba7d606011ca7bf6fba160d586ab5792997e29203749ca94efbf29fab4e4

      SHA512

      1bbe03872ed08fad5719267929ff3e25079a0d7f67b3e2912a3f31fcdc5bc6057ffc7e7540e3666e6f17bc7e5ae85e3b1f9c110613943a59f131142e7fa03aa5

    • C:\Windows\Fonts\The Kazekage.jpg

      Filesize

      1.4MB

      MD5

      d6b05020d4a0ec2a3a8b687099e335df

      SHA1

      df239d830ebcd1cde5c68c46a7b76dad49d415f4

      SHA256

      9824b98dab6af65a9e84c2ea40e9df948f9766ce2096e81feecad7db8dd6080a

      SHA512

      78fd360faa4d34f5732056d6e9ad7b9930964441c69cf24535845d397de92179553b9377a25649c01eb5ac7d547c29cc964e69ede7f2af9fc677508a99251fff

    • C:\Windows\SysWOW64\9-5-2024.exe

      Filesize

      145KB

      MD5

      79af3f344ba9cd0c31feef957ba2c917

      SHA1

      e9f2b5462c121892cac634e7b68a304956ad209e

      SHA256

      050513508d06db94b70722684ce177d8bf1e61ac5e1e0418dda1b177c337e1f8

      SHA512

      aa5bf6b19783f4f1a6a3608ae1524f01970c019f1e84b04c68b516c81330b81f56b6e60b4eb8db086fddceb4fa7cfa8b79b2c783f051dda8d3d1ec604b2ed9f9

    • C:\Windows\SysWOW64\9-5-2024.exe

      Filesize

      145KB

      MD5

      0ff036ee4306066aa80d8bd4cdc917a0

      SHA1

      0a52f53550f038954163f7b78806d13ee23b4033

      SHA256

      ae0b9eddb3e2ca5a60825f7ecf8b0719082d78fba96b81bcf91cb37cf08b5fc3

      SHA512

      684145ea4363ec603f1767f13523cb82834843b8e5fb1ae787486ac29d19b301c589d844c70f6828b5bb4169062dbe5f0652e57e8323cefd554fbfa8974a8d82

    • C:\Windows\SysWOW64\9-5-2024.exe

      Filesize

      145KB

      MD5

      9b4764eaacd65d9f744a59a196fe8a6f

      SHA1

      a62e9afd2d16df11d451a552522af81a374418f3

      SHA256

      f6c4f16bf66f551aadc8056879059026f2e3c091f79c46720e8b567eef3dfabc

      SHA512

      287d94a2e826b5650073ca57426d4385af151bfbbb303f03064ecde078dd83d064f37115e08ba15972b9d9fedc7bb5e85d3cb6dc9139ff46460c3f7271268928

    • C:\Windows\SysWOW64\9-5-2024.exe

      Filesize

      145KB

      MD5

      fb3c0d34471aa0f6939e8e3e069baafd

      SHA1

      9d07558c2262b2cc21358f8caf292930181d2338

      SHA256

      dc07e7dcd85acdf00f1c005fb61b38fb01ee158593063e9d8d0cf72c16f9e858

      SHA512

      e6b1ffc02351d7f4f8fc7e0c0be3b7ee39fb5cb8d7059aa5a3701429845fe9bdb81f0bf129a526c823b6db065b3b4ae4e488036d882b365a14ff99debc149651

    • C:\Windows\SysWOW64\9-5-2024.exe

      Filesize

      145KB

      MD5

      3d297425fa47f3eae1829bdde6951fb6

      SHA1

      d675539329abecfd2b56146f82782a6ab390ccf0

      SHA256

      c33b1fa1c21524a404f729c997b37dd014dd9ec817e8cd58b9788baabc27e5ff

      SHA512

      fa0ac69e89d948da29a952e9d3ee7ee6997cdb604f3d7c4da6e99daf6b62ddc58dec793d9ade74fd73f4609b26f13cbb7036aa97361c9e879aa6eea04ba2c866

    • C:\Windows\SysWOW64\9-5-2024.exe

      Filesize

      145KB

      MD5

      2486d486d11966352263c43854e06875

      SHA1

      67a0b074fb14bc7d062b44bab2709a8fa28c672f

      SHA256

      e69421b2c0dfee48b6cbaec937339e266756e5cb4f904568b31e15cde6dd84b0

      SHA512

      2e290f13fcf1d59b404dbd6f7f6926bc552fe6f76e54f177985ee7e81cb7023e6f63b79b44c9bf8a783b71b5c4b7c33701c5805a3defc7600a7349b288493cfb

    • C:\Windows\SysWOW64\Desktop.ini

      Filesize

      65B

      MD5

      64acfa7e03b01f48294cf30d201a0026

      SHA1

      10facd995b38a095f30b4a800fa454c0bcbf8438

      SHA256

      ba8159d865d106e7b4d0043007a63d1541e1de455dc8d7ff0edd3013bd425c62

      SHA512

      65a9b2e639de74a2a7faa83463a03f5f5b526495e3c793ec1e144c422ed0b842dd304cd5ff4f8aec3d76d826507030c5916f70a231429cea636ec2d8ab43931a

    • C:\Windows\SysWOW64\drivers\Kazekage.exe

      Filesize

      145KB

      MD5

      45ba1d65d99bb546beb488b1eb603bc5

      SHA1

      e240743e713aae1bc4a3ff50468a62d99393c8c4

      SHA256

      99638c4fa277ff819c0aa5fb821876862f6e8fbfa98fd9f447e542a8c0ae8a7c

      SHA512

      52d283b0602991c8d850fd593b918ebe0e0b9bf56d9f76431c466388621bba9580db24a9747132282586ae524d37cd8aef1a5a91e7ffa85c7a19d8f9701c379d

    • C:\Windows\SysWOW64\drivers\Kazekage.exe

      Filesize

      145KB

      MD5

      cd8374bd963f4aad7b726c0568399ba8

      SHA1

      df1f28d1bb0a002e9d2374b8d44408df834ac944

      SHA256

      1bd123316406676c7165791cb2d724a16bcaa88f629fd0309b11ae759d81df93

      SHA512

      cb57cf28abbad408d56811acd056266c7bd91734ccc48558fc414014ba9202e0c8a65f4db3e2aa66ddffd4a8c21cf488c02be244811f97668f5ea46ff17714d2

    • C:\Windows\SysWOW64\drivers\Kazekage.exe

      Filesize

      145KB

      MD5

      2faab1f830f5b101949126e658fd701b

      SHA1

      2445f3c8487dbe5f602b6b3f34458413056172db

      SHA256

      4e248d6606b9b3128e482ac957cf302a70af7bc9119a789ac7bcd9a6ebcb3401

      SHA512

      99496c3b2703e6983f13df41e83124ed9275019b765c2545968e0b288ea26ff5c33137aa315a0a1d2d1e09fa2ae518c2df2f55cca616129f830537ddff08c2cd

    • C:\Windows\SysWOW64\drivers\system32.exe

      Filesize

      145KB

      MD5

      46ff17a2a58e558f106f932079b4fa3a

      SHA1

      98e79e591dce2462dca2bbbe6a4cde8686daaa17

      SHA256

      f24e2d78f02cc7540d1c480c411038a932903db1088b3844826dad902ee5aa99

      SHA512

      0eed8c89b373d7af01531e837b404351d8caa0c54ff2dc6be60433fe42f40950fb4c3ee4bb5f5ef369da3f4f293e45cdb74751714f0fbae06b5a1b4e6a98dde7

    • C:\Windows\SysWOW64\drivers\system32.exe

      Filesize

      145KB

      MD5

      cbbf740bbfe23d7e48f7eb1dd0fd506f

      SHA1

      59331b38649da9ca4cc29dc8cc996d3d9ae17fae

      SHA256

      e90712a553d013a9090ff3ce0932ac9e3bf2980e018a51fe9ae7de72ef0ee9ac

      SHA512

      246e4c1aa924759d5270d6b50d26957497aa5893cee6cb3b30d18ff72bce4de97f4f72e4d1c2a36cca977f8d18161c7d52265e86e2cb400e88f8a4022cb33f9b

    • C:\Windows\SysWOW64\drivers\system32.exe

      Filesize

      145KB

      MD5

      b3f20dfeb7f1a1562db404cdb3d15fdb

      SHA1

      f262d7002c6d09f2743491c86a26baee65633c91

      SHA256

      8a41beefa07586108c192ee92961bc1912ad96300edf811520fa3d3068c3592d

      SHA512

      f75e12c7255143b87f17cce7daa1978bfcb8f3bd3d8abd728a74b72f4211ebdf1cccd6d7d927191c07674e8c12a9d9b66871ba445267a30ab48a7163feac37f1

    • C:\Windows\SysWOW64\drivers\system32.exe

      Filesize

      145KB

      MD5

      f8fc506d56075abd774047fa811dc63b

      SHA1

      944ea47984db6f632a5e9e330ce0f92830bb041a

      SHA256

      f8f92ef25f3654463132f6262455d18877fe336328ff320c9dff7910943ae70d

      SHA512

      a9eb2955b858058c95e7e5cc31c894426639c86082ddfe28b1972ef6d6b5220c385e9fa59d2606b1d9f3e286958dc2e4373a6eb2df85710c008961e3601df91c

    • C:\Windows\System\msvbvm60.dll

      Filesize

      1.4MB

      MD5

      25f62c02619174b35851b0e0455b3d94

      SHA1

      4e8ee85157f1769f6e3f61c0acbe59072209da71

      SHA256

      898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

      SHA512

      f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

    • C:\Windows\system\msvbvm60.dll

      Filesize

      127KB

      MD5

      798463db5e72245eb6bfcd0d6e73e963

      SHA1

      160142781ee3ae994f0e5816e825501c807c7fd7

      SHA256

      0e13311342b03f886c1d8dedcaadb039986b88aae6bc9426d727072de82839bd

      SHA512

      5e3e08d959b28ab6f61a64a15e1495aaaf23a038535141e622617895d1460454434300b0c174ae8a849790d1aad4bddc88f9f9e9a46910686d37fb89cb28774b

    • memory/212-75-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/228-231-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/456-263-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/1340-272-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/1340-163-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/1524-255-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/1532-153-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/1532-148-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/1708-197-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/1708-203-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/1764-211-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/2212-165-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/2212-1026-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/2288-158-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/2508-240-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/2560-260-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/2736-1023-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/2736-33-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/2748-246-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/2752-239-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/2752-243-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/2760-121-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/2904-269-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/3340-234-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/3384-1025-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/3384-120-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/3684-0-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/3684-988-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/3704-1024-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/3704-77-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/4240-199-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/4240-192-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/4460-193-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/4680-252-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/4808-204-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/4808-210-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/4924-113-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/4924-110-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/4944-266-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/5072-275-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB