Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16/05/2024, 18:25

General

  • Target

    0d09ae37e89a6005804515dac49b5d70_NeikiAnalytics.exe

  • Size

    148KB

  • MD5

    0d09ae37e89a6005804515dac49b5d70

  • SHA1

    b6cb8848086f586d95a8774f92307f577360c525

  • SHA256

    2b1fcd17243f1bbb85e245c64eb729494b29f5b0de95d29c91283515b3ff8732

  • SHA512

    c6f34d776404416dab09d0219da78fd31d15b715b210c14da4733c7370db0e985048cf10eb9b80dee44e1c47213028f5154d2a15e957254c2a855050d182a418

  • SSDEEP

    1536:wJo0IHgL2AHfb1mzaFXg+xsukl4Y17jsgS/jHagQNuXGpeVTV:Ex6AHjYzaFXg+w17jsgS/jHagQg19V

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • UAC bypass 3 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Drops file in Drivers directory 24 IoCs
  • Sets file execution options in registry 2 TTPs 64 IoCs
  • Executes dropped EXE 30 IoCs
  • Loads dropped DLL 62 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Drops desktop.ini file(s) 64 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 64 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 39 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 6 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies Control Panel 64 IoCs
  • Modifies Internet Explorer settings 1 TTPs 12 IoCs
  • Modifies registry class 48 IoCs
  • Runs ping.exe 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 31 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d09ae37e89a6005804515dac49b5d70_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0d09ae37e89a6005804515dac49b5d70_NeikiAnalytics.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • UAC bypass
    • Disables RegEdit via registry modification
    • Drops file in Drivers directory
    • Sets file execution options in registry
    • Loads dropped DLL
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2352
    • C:\Windows\Fonts\Admin 16 - 5 - 2024\smss.exe
      "C:\Windows\Fonts\Admin 16 - 5 - 2024\smss.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • UAC bypass
      • Disables RegEdit via registry modification
      • Drops file in Drivers directory
      • Sets file execution options in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Sets desktop wallpaper using registry
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2540
      • C:\Windows\Fonts\Admin 16 - 5 - 2024\smss.exe
        "C:\Windows\Fonts\Admin 16 - 5 - 2024\smss.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:308
      • C:\Windows\Fonts\Admin 16 - 5 - 2024\Gaara.exe
        "C:\Windows\Fonts\Admin 16 - 5 - 2024\Gaara.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • UAC bypass
        • Disables RegEdit via registry modification
        • Drops file in Drivers directory
        • Sets file execution options in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops desktop.ini file(s)
        • Enumerates connected drives
        • Drops autorun.inf file
        • Drops file in System32 directory
        • Sets desktop wallpaper using registry
        • Drops file in Windows directory
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:1952
        • C:\Windows\Fonts\Admin 16 - 5 - 2024\smss.exe
          "C:\Windows\Fonts\Admin 16 - 5 - 2024\smss.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:2948
        • C:\Windows\Fonts\Admin 16 - 5 - 2024\Gaara.exe
          "C:\Windows\Fonts\Admin 16 - 5 - 2024\Gaara.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:2660
        • C:\Windows\Fonts\Admin 16 - 5 - 2024\csrss.exe
          "C:\Windows\Fonts\Admin 16 - 5 - 2024\csrss.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • UAC bypass
          • Disables RegEdit via registry modification
          • Drops file in Drivers directory
          • Sets file execution options in registry
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Drops desktop.ini file(s)
          • Enumerates connected drives
          • Drops autorun.inf file
          • Drops file in System32 directory
          • Sets desktop wallpaper using registry
          • Drops file in Windows directory
          • Modifies Control Panel
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:2472
          • C:\Windows\Fonts\Admin 16 - 5 - 2024\smss.exe
            "C:\Windows\Fonts\Admin 16 - 5 - 2024\smss.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:2788
          • C:\Windows\Fonts\Admin 16 - 5 - 2024\Gaara.exe
            "C:\Windows\Fonts\Admin 16 - 5 - 2024\Gaara.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:1920
          • C:\Windows\Fonts\Admin 16 - 5 - 2024\csrss.exe
            "C:\Windows\Fonts\Admin 16 - 5 - 2024\csrss.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:1484
          • C:\Windows\SysWOW64\drivers\Kazekage.exe
            C:\Windows\system32\drivers\Kazekage.exe
            5⤵
            • Modifies WinLogon for persistence
            • Modifies visibility of file extensions in Explorer
            • Modifies visiblity of hidden/system files in Explorer
            • UAC bypass
            • Disables RegEdit via registry modification
            • Drops file in Drivers directory
            • Sets file execution options in registry
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Checks whether UAC is enabled
            • Drops desktop.ini file(s)
            • Enumerates connected drives
            • Drops autorun.inf file
            • Drops file in System32 directory
            • Sets desktop wallpaper using registry
            • Drops file in Windows directory
            • Modifies Control Panel
            • Modifies Internet Explorer settings
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:1392
            • C:\Windows\Fonts\Admin 16 - 5 - 2024\smss.exe
              "C:\Windows\Fonts\Admin 16 - 5 - 2024\smss.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:2412
            • C:\Windows\Fonts\Admin 16 - 5 - 2024\Gaara.exe
              "C:\Windows\Fonts\Admin 16 - 5 - 2024\Gaara.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:1792
            • C:\Windows\Fonts\Admin 16 - 5 - 2024\csrss.exe
              "C:\Windows\Fonts\Admin 16 - 5 - 2024\csrss.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:268
            • C:\Windows\SysWOW64\drivers\Kazekage.exe
              C:\Windows\system32\drivers\Kazekage.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:336
            • C:\Windows\SysWOW64\drivers\system32.exe
              C:\Windows\system32\drivers\system32.exe
              6⤵
              • Modifies WinLogon for persistence
              • Modifies visibility of file extensions in Explorer
              • Modifies visiblity of hidden/system files in Explorer
              • UAC bypass
              • Disables RegEdit via registry modification
              • Drops file in Drivers directory
              • Sets file execution options in registry
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Checks whether UAC is enabled
              • Drops desktop.ini file(s)
              • Enumerates connected drives
              • Drops autorun.inf file
              • Drops file in System32 directory
              • Sets desktop wallpaper using registry
              • Drops file in Windows directory
              • Modifies Control Panel
              • Modifies Internet Explorer settings
              • Modifies registry class
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:956
              • C:\Windows\Fonts\Admin 16 - 5 - 2024\smss.exe
                "C:\Windows\Fonts\Admin 16 - 5 - 2024\smss.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:300
              • C:\Windows\Fonts\Admin 16 - 5 - 2024\Gaara.exe
                "C:\Windows\Fonts\Admin 16 - 5 - 2024\Gaara.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:556
              • C:\Windows\Fonts\Admin 16 - 5 - 2024\csrss.exe
                "C:\Windows\Fonts\Admin 16 - 5 - 2024\csrss.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:412
              • C:\Windows\SysWOW64\drivers\Kazekage.exe
                C:\Windows\system32\drivers\Kazekage.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1096
              • C:\Windows\SysWOW64\drivers\system32.exe
                C:\Windows\system32\drivers\system32.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:2304
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.rasasayang.com.my 65500
                7⤵
                • Runs ping.exe
                PID:1056
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.duniasex.com 65500
                7⤵
                • Runs ping.exe
                PID:1848
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.rasasayang.com.my 65500
                7⤵
                • Runs ping.exe
                PID:2564
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.duniasex.com 65500
                7⤵
                • Runs ping.exe
                PID:2064
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.rasasayang.com.my 65500
                7⤵
                • Runs ping.exe
                PID:1956
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.duniasex.com 65500
                7⤵
                • Runs ping.exe
                PID:2816
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.rasasayang.com.my 65500
              6⤵
              • Runs ping.exe
              PID:2340
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.duniasex.com 65500
              6⤵
              • Runs ping.exe
              PID:1880
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.rasasayang.com.my 65500
              6⤵
              • Runs ping.exe
              PID:2464
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.duniasex.com 65500
              6⤵
              • Runs ping.exe
              PID:2952
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.rasasayang.com.my 65500
              6⤵
              • Runs ping.exe
              PID:2828
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.duniasex.com 65500
              6⤵
              • Runs ping.exe
              PID:2400
          • C:\Windows\SysWOW64\drivers\system32.exe
            C:\Windows\system32\drivers\system32.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:2208
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.rasasayang.com.my 65500
            5⤵
            • Runs ping.exe
            PID:2800
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.duniasex.com 65500
            5⤵
            • Runs ping.exe
            PID:556
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.rasasayang.com.my 65500
            5⤵
            • Runs ping.exe
            PID:1708
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.duniasex.com 65500
            5⤵
            • Runs ping.exe
            PID:816
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.rasasayang.com.my 65500
            5⤵
            • Runs ping.exe
            PID:2404
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.duniasex.com 65500
            5⤵
            • Runs ping.exe
            PID:2340
        • C:\Windows\SysWOW64\drivers\Kazekage.exe
          C:\Windows\system32\drivers\Kazekage.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1508
        • C:\Windows\SysWOW64\drivers\system32.exe
          C:\Windows\system32\drivers\system32.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1760
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          4⤵
          • Runs ping.exe
          PID:2652
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          4⤵
          • Runs ping.exe
          PID:2840
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          4⤵
          • Runs ping.exe
          PID:2416
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          4⤵
          • Runs ping.exe
          PID:1512
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          4⤵
          • Runs ping.exe
          PID:564
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          4⤵
          • Runs ping.exe
          PID:2940
      • C:\Windows\Fonts\Admin 16 - 5 - 2024\csrss.exe
        "C:\Windows\Fonts\Admin 16 - 5 - 2024\csrss.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:2884
      • C:\Windows\SysWOW64\drivers\Kazekage.exe
        C:\Windows\system32\drivers\Kazekage.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1356
      • C:\Windows\SysWOW64\drivers\system32.exe
        C:\Windows\system32\drivers\system32.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3044
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.rasasayang.com.my 65500
        3⤵
        • Runs ping.exe
        PID:2476
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.duniasex.com 65500
        3⤵
        • Runs ping.exe
        PID:2488
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.rasasayang.com.my 65500
        3⤵
        • Runs ping.exe
        PID:2816
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.duniasex.com 65500
        3⤵
        • Runs ping.exe
        PID:540
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.rasasayang.com.my 65500
        3⤵
        • Runs ping.exe
        PID:2896
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.duniasex.com 65500
        3⤵
        • Runs ping.exe
        PID:784
    • C:\Windows\Fonts\Admin 16 - 5 - 2024\Gaara.exe
      "C:\Windows\Fonts\Admin 16 - 5 - 2024\Gaara.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:820
    • C:\Windows\Fonts\Admin 16 - 5 - 2024\csrss.exe
      "C:\Windows\Fonts\Admin 16 - 5 - 2024\csrss.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:1784
    • C:\Windows\SysWOW64\drivers\Kazekage.exe
      C:\Windows\system32\drivers\Kazekage.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:884
    • C:\Windows\SysWOW64\drivers\system32.exe
      C:\Windows\system32\drivers\system32.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2256
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.rasasayang.com.my 65500
      2⤵
      • Runs ping.exe
      PID:2376
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.duniasex.com 65500
      2⤵
      • Runs ping.exe
      PID:2168
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.rasasayang.com.my 65500
      2⤵
      • Runs ping.exe
      PID:2788
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.duniasex.com 65500
      2⤵
      • Runs ping.exe
      PID:2632
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.rasasayang.com.my 65500
      2⤵
      • Runs ping.exe
      PID:2792
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.duniasex.com 65500
      2⤵
      • Runs ping.exe
      PID:2964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Admin Games\Kazekage VS Hokage.exe

    Filesize

    148KB

    MD5

    36d22e867d84e93ce345c4e6ac108744

    SHA1

    ba34ed7f8c9f978d40c18f16f8133354ffe8b847

    SHA256

    bfc747e31bcf46f67d24830103e029f73b79acacf80558390ef43858bead2a8d

    SHA512

    e22e0862b64d22cdf55c936941bff83c7448c445a8d1185a941df008b5530705a6a8aea20d2a3b1c9185c05deeebfc78ca20f8323712ccc917d337e5638798f1

  • C:\Admin Games\Readme.txt

    Filesize

    736B

    MD5

    bb5d6abdf8d0948ac6895ce7fdfbc151

    SHA1

    9266b7a247a4685892197194d2b9b86c8f6dddbd

    SHA256

    5db2e0915b5464d32e83484f8ae5e3c73d2c78f238fde5f58f9b40dbb5322de8

    SHA512

    878444760e8df878d65bb62b4798177e168eb099def58ad3634f4348e96705c83f74324f9fa358f0eff389991976698a233ca53e9b72034ae11c86d42322a76c

  • C:\Autorun.inf

    Filesize

    196B

    MD5

    1564dfe69ffed40950e5cb644e0894d1

    SHA1

    201b6f7a01cc49bb698bea6d4945a082ed454ce4

    SHA256

    be114a2dbcc08540b314b01882aa836a772a883322a77b67aab31233e26dc184

    SHA512

    72df187e39674b657974392cfa268e71ef86dc101ebd2303896381ca56d3c05aa9db3f0ab7d0e428d7436e0108c8f19e94c2013814d30b0b95a23a6b9e341097

  • C:\Windows\Fonts\Admin 16 - 5 - 2024\Gaara.exe

    Filesize

    148KB

    MD5

    425b7202ca32b09afeb13683bdf637ff

    SHA1

    6d959b5cfee4f9dd44d9af1c52b1c53a9c579d5a

    SHA256

    163bf0f3c98a67a9211993856bafe06b2e38ad63ec3cd90dc4a07e45a677cac6

    SHA512

    424f3a7ddc0ae89fb1392e64440051c52bbc9f158c7dc9c4b87c9a5a3a810af377df0bb5eeeb3216bd2ad08580399828894f237dd53ad4301cb72bd43626a324

  • C:\Windows\Fonts\Admin 16 - 5 - 2024\csrss.exe

    Filesize

    148KB

    MD5

    7e97f17dbcb00783083be20902baa747

    SHA1

    5a4e8597733bf6b1a98cf2d6f0c328117e64c64d

    SHA256

    8ece36c9f0704fcd852b3f0c1952b4c1c12c89631eb5873562d38040f7e02d57

    SHA512

    317d759e4c86bca92813caa1b8166faebe71e85d224661b7537293014c81d5d362f6c60150015e92a8dd5310fb6aea9cac20de45622f8ee714504e1f7a86cf81

  • C:\Windows\Fonts\Admin 16 - 5 - 2024\csrss.exe

    Filesize

    148KB

    MD5

    baf71282d48f84645ccafd899493918a

    SHA1

    4f41f21da51a4f9c003172079ab2b2029ab811f7

    SHA256

    0887c583308ab731df5be155e0df4d2b4b7801bbeced4bd6d596f1d477a30c74

    SHA512

    738bb0653ec0333fbb74b637038131eac0c85868911626a68b7779871ea3c0bc54a5900c5588da493ae115dd76644ae69b04b3dbdf88aef1bf655afa11af8fa2

  • C:\Windows\Fonts\The Kazekage.jpg

    Filesize

    1.4MB

    MD5

    d6b05020d4a0ec2a3a8b687099e335df

    SHA1

    df239d830ebcd1cde5c68c46a7b76dad49d415f4

    SHA256

    9824b98dab6af65a9e84c2ea40e9df948f9766ce2096e81feecad7db8dd6080a

    SHA512

    78fd360faa4d34f5732056d6e9ad7b9930964441c69cf24535845d397de92179553b9377a25649c01eb5ac7d547c29cc964e69ede7f2af9fc677508a99251fff

  • C:\Windows\SysWOW64\16-5-2024.exe

    Filesize

    148KB

    MD5

    a8077bcf7faf3bc500fbc911faeba848

    SHA1

    01dd07e1c54f466e812ce9cb3d68fdffeba4102c

    SHA256

    9e871aac492de38d2cecd8b701936c54934bcf9781f7c7acfc6a2506c9d9a09e

    SHA512

    05f223a9d1f2e64bc1ee2a58bdf77fdbc3fbee7d09778381d0aaac11541c955f320715219aef73cb2e8d02264a69ee25164682be97b694a9fd6fed3f81f6683a

  • C:\Windows\SysWOW64\16-5-2024.exe

    Filesize

    148KB

    MD5

    0d09ae37e89a6005804515dac49b5d70

    SHA1

    b6cb8848086f586d95a8774f92307f577360c525

    SHA256

    2b1fcd17243f1bbb85e245c64eb729494b29f5b0de95d29c91283515b3ff8732

    SHA512

    c6f34d776404416dab09d0219da78fd31d15b715b210c14da4733c7370db0e985048cf10eb9b80dee44e1c47213028f5154d2a15e957254c2a855050d182a418

  • C:\Windows\SysWOW64\16-5-2024.exe

    Filesize

    148KB

    MD5

    8f505165a5a2fbbfacd6ffb99bb9d45d

    SHA1

    a07617fe62b65e93633983ddfc924f03e2a014b8

    SHA256

    1d4a97f7e6f8a7c19e644159ee29f8449eb5ef54d58d9f249a7bc2bdb631bf75

    SHA512

    a02ef9b6333f99e31523cd9c146513cc6bcf659b3ef3ff2173628333a66b8f24a91c3cb7a645d827f212c8b22755495ba4ad97fd7c2138b2473e7570d6813319

  • C:\Windows\SysWOW64\16-5-2024.exe

    Filesize

    148KB

    MD5

    c54b8dcfdf1b84b9ad70d2ec0da328bb

    SHA1

    6415469a37b7cb2b1e29762259fc1030b23ebfcc

    SHA256

    e24828c05cb5f8c6589d191799a9be7de662cb639eaf1f3782c38a83d6b764cf

    SHA512

    245ab691c8d8a9a8cd420c610de6ae4337b060f0d0c6fa5c2f67058922179eefbce2772bfc6a8dd164a05ea4b43fd02c54d45c9d332e3921733f21970fe178fe

  • C:\Windows\SysWOW64\16-5-2024.exe

    Filesize

    148KB

    MD5

    332a385d8e38533279ac8054634e6820

    SHA1

    e11964c6aae3633cd2c0901e98f7196b2b32aeb3

    SHA256

    0823c0958f4b7fb74f527a8cadb4115c0ad88896736403e1bcb649bef3e9719e

    SHA512

    08bf8064f76dcd5f4081ec6f0e49879a7d7bbac7c2ad140a52eeb33acbb81e40d809d4472fe317cdacca4b87949aee20ab8ca8e8dd84eafcbef781954345317e

  • C:\Windows\SysWOW64\16-5-2024.exe

    Filesize

    148KB

    MD5

    57fd8beddc5c8d5543fe9d190c0b1f61

    SHA1

    3327da330dfbb18f72404c5da3db9413c76cebed

    SHA256

    1b949d1ff09359ef805b5d6a3f19662f9026922709cd9f804a87826db3d9ff78

    SHA512

    71b6f5e3a526e99c87e8d450662668399bc4d1ae6b04f0fdd8a1c8ff482612fa21a524805da5616a3c176758a0db881be9b7a303ba3aae89f1650fef37eb42f9

  • C:\Windows\SysWOW64\Desktop.ini

    Filesize

    65B

    MD5

    64acfa7e03b01f48294cf30d201a0026

    SHA1

    10facd995b38a095f30b4a800fa454c0bcbf8438

    SHA256

    ba8159d865d106e7b4d0043007a63d1541e1de455dc8d7ff0edd3013bd425c62

    SHA512

    65a9b2e639de74a2a7faa83463a03f5f5b526495e3c793ec1e144c422ed0b842dd304cd5ff4f8aec3d76d826507030c5916f70a231429cea636ec2d8ab43931a

  • C:\Windows\SysWOW64\drivers\Kazekage.exe

    Filesize

    148KB

    MD5

    b9a998b7277734d6e99fe46b9a34800c

    SHA1

    a7c9b5e8a4bc989bbed339d64aa9daa4ac4a53fb

    SHA256

    05fb146e2ae87b8ef4ae9acb28808b1fd8508b47bdf3870537ab575c4883fb6c

    SHA512

    9195f6c20bb091d69f0a6062af6cbeed0e3fd4c534a378ccfd3328c3523d06bebaf849c289a5ddeb97d016b412d125f8f913cd5a692e3b3893670c359b5577d5

  • C:\Windows\SysWOW64\drivers\Kazekage.exe

    Filesize

    148KB

    MD5

    9c10e710a8fecd6db430b9672cab8950

    SHA1

    7ac49a64f8c0219866e24a8a235ff434055037cb

    SHA256

    0ef4b8277674b88ed3a1d1602392e8e877d2313c69f4c777d6d5e8614a467dda

    SHA512

    4647f9a45b805d3e71bbec446bfe2996f82cd78bf6b54a506f25a55986da6ebad31df0e77b0c39b9a9150186fde139141fb83f7bd3f1c229d87164120fc3187a

  • C:\Windows\SysWOW64\drivers\Kazekage.exe

    Filesize

    148KB

    MD5

    31089ac6f9ae4fed245b9cfe08e3f3a9

    SHA1

    cb9ce5ac09cb8f2a2496e803fae7d950a684974e

    SHA256

    131b0adae7075207ddc1f417517c2e7a8a1bd94268e53d36c96371791eebd0cb

    SHA512

    160d6837049a49df939fa03ca7cee88d3afd11bf2625c754940267246048c255e3cb34033c9ff7e468d2767faf6ace75777867007003109700c7ebf4ea392d40

  • C:\Windows\SysWOW64\drivers\system32.exe

    Filesize

    148KB

    MD5

    ec3e6f4662381b7689245440f6223380

    SHA1

    dd22de55ea6668f5e9fa7f3617fb6db038a8ee0d

    SHA256

    3f3e3c51cbf941eaa4a2ab40177a94ff6ac657925ec0031ca3586cacaf0508ff

    SHA512

    f409b9d17a449dadf0bb679d3c695625bb4e1e33e2b2cbab2d15654e91aa516b86bb4e4d2466fabb12011f653c51d93473a948b536ede885d2f696d03f65d3b2

  • C:\Windows\SysWOW64\drivers\system32.exe

    Filesize

    148KB

    MD5

    c320f67c963271c0eb81f5de015e69ca

    SHA1

    d500e32502eaf0200b206707f82613b42b907548

    SHA256

    5c0ec841c68c9b22b8563c171c8d4f86b1fe4dd0253f087aacb4e149263acdae

    SHA512

    f27d8c779e28970ae7a927b5bd2782e800cd19565b60808c95dc11b9340d1fc7690a8a39338d3e19196459872caea05f80edb18456da393251cccdd5acd73ab8

  • C:\Windows\SysWOW64\drivers\system32.exe

    Filesize

    148KB

    MD5

    844ead4bdf43127c2b1f1e9bb3c6a7ac

    SHA1

    a75856b48e98a20b9c8b3bf79f3e52f6f228d612

    SHA256

    2cf6786db93e6dadad411df2389dc39047d859bb720ea1963b0aaa0641aa778f

    SHA512

    332bae98b2ed263d225772e9b415de8aa5436f57bd4c0586c121d9f8a721c3872a2ac03a51b1ced736773a7fe9f070cce9ceb7c617e55953497638bd413a1377

  • C:\Windows\SysWOW64\drivers\system32.exe

    Filesize

    148KB

    MD5

    e2a2d0a31943fd502823f1d9d2c78589

    SHA1

    d13ec1cfae22f632aa3f1436b55850ea10e7a643

    SHA256

    58759eeff535f384f3d1a0f1305bdc1ee8071e69950b26e49087f9f4769b85d8

    SHA512

    bf359a1871ae9ad2989d660ee95423975c754957a38daadde40ebade70cd96ed3bda22532a7860589b0b4e0239ee6e12b0d60c1f81f9b6a5b2be0bbe2f389b63

  • C:\Windows\system\msvbvm60.dll

    Filesize

    1.3MB

    MD5

    5343a19c618bc515ceb1695586c6c137

    SHA1

    4dedae8cbde066f31c8e6b52c0baa3f8b1117742

    SHA256

    2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

    SHA512

    708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

  • \Windows\Fonts\Admin 16 - 5 - 2024\smss.exe

    Filesize

    148KB

    MD5

    0b2e4e52894da9461b1a8a80acfa38ec

    SHA1

    376b72107d359e69176ef328cb7fe5defdc38e66

    SHA256

    3ffe92936055e8bca2053ec4db1cb2e37018683d09426ad0580470143d656c24

    SHA512

    52902c4d863d3b87bd16926332a6131c27c59cb4b5acd5ebf7ae969a09e538df84cb3fb47ffea14a5da670daf9cd560881649d231736a0c95987c248bba561fb

  • memory/268-219-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/300-241-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/308-79-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/336-222-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/412-247-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/556-244-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/820-273-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/884-278-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/956-288-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1096-250-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1356-268-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1392-287-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1484-181-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1508-259-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1760-262-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1792-216-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1920-176-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1952-285-0x00000000004B0000-0x00000000004D5000-memory.dmp

    Filesize

    148KB

  • memory/1952-89-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2208-256-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2256-281-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2304-253-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2352-0-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2352-32-0x0000000000380000-0x00000000003A5000-memory.dmp

    Filesize

    148KB

  • memory/2412-213-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2472-286-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2540-74-0x0000000000510000-0x0000000000535000-memory.dmp

    Filesize

    148KB

  • memory/2540-87-0x0000000000510000-0x0000000000535000-memory.dmp

    Filesize

    148KB

  • memory/2540-88-0x0000000000510000-0x0000000000535000-memory.dmp

    Filesize

    148KB

  • memory/2660-131-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2788-170-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2884-265-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2948-126-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB