Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/05/2024, 18:25

General

  • Target

    0d09ae37e89a6005804515dac49b5d70_NeikiAnalytics.exe

  • Size

    148KB

  • MD5

    0d09ae37e89a6005804515dac49b5d70

  • SHA1

    b6cb8848086f586d95a8774f92307f577360c525

  • SHA256

    2b1fcd17243f1bbb85e245c64eb729494b29f5b0de95d29c91283515b3ff8732

  • SHA512

    c6f34d776404416dab09d0219da78fd31d15b715b210c14da4733c7370db0e985048cf10eb9b80dee44e1c47213028f5154d2a15e957254c2a855050d182a418

  • SSDEEP

    1536:wJo0IHgL2AHfb1mzaFXg+xsukl4Y17jsgS/jHagQNuXGpeVTV:Ex6AHjYzaFXg+w17jsgS/jHagQg19V

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • UAC bypass 3 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Drops file in Drivers directory 24 IoCs
  • Sets file execution options in registry 2 TTPs 64 IoCs
  • Executes dropped EXE 30 IoCs
  • Loads dropped DLL 18 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Drops desktop.ini file(s) 64 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 64 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 39 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 6 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies Control Panel 64 IoCs
  • Modifies Internet Explorer settings 1 TTPs 12 IoCs
  • Modifies registry class 51 IoCs
  • Runs ping.exe 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 31 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d09ae37e89a6005804515dac49b5d70_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0d09ae37e89a6005804515dac49b5d70_NeikiAnalytics.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • UAC bypass
    • Disables RegEdit via registry modification
    • Drops file in Drivers directory
    • Sets file execution options in registry
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1820
    • C:\Windows\Fonts\Admin 16 - 5 - 2024\smss.exe
      "C:\Windows\Fonts\Admin 16 - 5 - 2024\smss.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • UAC bypass
      • Disables RegEdit via registry modification
      • Drops file in Drivers directory
      • Sets file execution options in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Sets desktop wallpaper using registry
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4156
      • C:\Windows\Fonts\Admin 16 - 5 - 2024\smss.exe
        "C:\Windows\Fonts\Admin 16 - 5 - 2024\smss.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:4916
      • C:\Windows\Fonts\Admin 16 - 5 - 2024\Gaara.exe
        "C:\Windows\Fonts\Admin 16 - 5 - 2024\Gaara.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • UAC bypass
        • Disables RegEdit via registry modification
        • Drops file in Drivers directory
        • Sets file execution options in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops desktop.ini file(s)
        • Enumerates connected drives
        • Drops autorun.inf file
        • Drops file in System32 directory
        • Sets desktop wallpaper using registry
        • Drops file in Windows directory
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:3984
        • C:\Windows\Fonts\Admin 16 - 5 - 2024\smss.exe
          "C:\Windows\Fonts\Admin 16 - 5 - 2024\smss.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:2768
        • C:\Windows\Fonts\Admin 16 - 5 - 2024\Gaara.exe
          "C:\Windows\Fonts\Admin 16 - 5 - 2024\Gaara.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:3664
        • C:\Windows\Fonts\Admin 16 - 5 - 2024\csrss.exe
          "C:\Windows\Fonts\Admin 16 - 5 - 2024\csrss.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • UAC bypass
          • Disables RegEdit via registry modification
          • Drops file in Drivers directory
          • Sets file execution options in registry
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Drops desktop.ini file(s)
          • Enumerates connected drives
          • Drops autorun.inf file
          • Drops file in System32 directory
          • Sets desktop wallpaper using registry
          • Drops file in Windows directory
          • Modifies Control Panel
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:4788
          • C:\Windows\Fonts\Admin 16 - 5 - 2024\smss.exe
            "C:\Windows\Fonts\Admin 16 - 5 - 2024\smss.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:3100
          • C:\Windows\Fonts\Admin 16 - 5 - 2024\Gaara.exe
            "C:\Windows\Fonts\Admin 16 - 5 - 2024\Gaara.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:3640
          • C:\Windows\Fonts\Admin 16 - 5 - 2024\csrss.exe
            "C:\Windows\Fonts\Admin 16 - 5 - 2024\csrss.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:3868
          • C:\Windows\SysWOW64\drivers\Kazekage.exe
            C:\Windows\system32\drivers\Kazekage.exe
            5⤵
            • Modifies WinLogon for persistence
            • Modifies visibility of file extensions in Explorer
            • Modifies visiblity of hidden/system files in Explorer
            • UAC bypass
            • Disables RegEdit via registry modification
            • Drops file in Drivers directory
            • Sets file execution options in registry
            • Executes dropped EXE
            • Adds Run key to start application
            • Checks whether UAC is enabled
            • Drops desktop.ini file(s)
            • Enumerates connected drives
            • Drops autorun.inf file
            • Drops file in System32 directory
            • Sets desktop wallpaper using registry
            • Drops file in Windows directory
            • Modifies Control Panel
            • Modifies Internet Explorer settings
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:3372
            • C:\Windows\Fonts\Admin 16 - 5 - 2024\smss.exe
              "C:\Windows\Fonts\Admin 16 - 5 - 2024\smss.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:4544
            • C:\Windows\Fonts\Admin 16 - 5 - 2024\Gaara.exe
              "C:\Windows\Fonts\Admin 16 - 5 - 2024\Gaara.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:3052
            • C:\Windows\Fonts\Admin 16 - 5 - 2024\csrss.exe
              "C:\Windows\Fonts\Admin 16 - 5 - 2024\csrss.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:1784
            • C:\Windows\SysWOW64\drivers\Kazekage.exe
              C:\Windows\system32\drivers\Kazekage.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:4704
            • C:\Windows\SysWOW64\drivers\system32.exe
              C:\Windows\system32\drivers\system32.exe
              6⤵
              • Modifies WinLogon for persistence
              • Modifies visibility of file extensions in Explorer
              • Modifies visiblity of hidden/system files in Explorer
              • UAC bypass
              • Disables RegEdit via registry modification
              • Drops file in Drivers directory
              • Sets file execution options in registry
              • Executes dropped EXE
              • Adds Run key to start application
              • Checks whether UAC is enabled
              • Drops desktop.ini file(s)
              • Enumerates connected drives
              • Drops autorun.inf file
              • Drops file in System32 directory
              • Sets desktop wallpaper using registry
              • Drops file in Windows directory
              • Modifies Control Panel
              • Modifies Internet Explorer settings
              • Modifies registry class
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:4472
              • C:\Windows\Fonts\Admin 16 - 5 - 2024\smss.exe
                "C:\Windows\Fonts\Admin 16 - 5 - 2024\smss.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:2088
              • C:\Windows\Fonts\Admin 16 - 5 - 2024\Gaara.exe
                "C:\Windows\Fonts\Admin 16 - 5 - 2024\Gaara.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:3188
              • C:\Windows\Fonts\Admin 16 - 5 - 2024\csrss.exe
                "C:\Windows\Fonts\Admin 16 - 5 - 2024\csrss.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:2832
              • C:\Windows\SysWOW64\drivers\Kazekage.exe
                C:\Windows\system32\drivers\Kazekage.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1596
              • C:\Windows\SysWOW64\drivers\system32.exe
                C:\Windows\system32\drivers\system32.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:768
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.rasasayang.com.my 65500
                7⤵
                • Runs ping.exe
                PID:2416
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.duniasex.com 65500
                7⤵
                • Runs ping.exe
                PID:2456
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.rasasayang.com.my 65500
                7⤵
                • Runs ping.exe
                PID:2104
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.duniasex.com 65500
                7⤵
                • Runs ping.exe
                PID:1200
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.rasasayang.com.my 65500
                7⤵
                • Runs ping.exe
                PID:4392
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.duniasex.com 65500
                7⤵
                • Runs ping.exe
                PID:2592
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.rasasayang.com.my 65500
              6⤵
              • Runs ping.exe
              PID:4892
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.duniasex.com 65500
              6⤵
              • Runs ping.exe
              PID:2028
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.rasasayang.com.my 65500
              6⤵
              • Runs ping.exe
              PID:3144
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.duniasex.com 65500
              6⤵
              • Runs ping.exe
              PID:2644
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.rasasayang.com.my 65500
              6⤵
              • Runs ping.exe
              PID:2028
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.duniasex.com 65500
              6⤵
              • Runs ping.exe
              PID:540
          • C:\Windows\SysWOW64\drivers\system32.exe
            C:\Windows\system32\drivers\system32.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:2228
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.rasasayang.com.my 65500
            5⤵
            • Runs ping.exe
            PID:2524
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.duniasex.com 65500
            5⤵
            • Runs ping.exe
            PID:904
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.rasasayang.com.my 65500
            5⤵
            • Runs ping.exe
            PID:1196
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.duniasex.com 65500
            5⤵
            • Runs ping.exe
            PID:1184
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.rasasayang.com.my 65500
            5⤵
            • Runs ping.exe
            PID:2448
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.duniasex.com 65500
            5⤵
            • Runs ping.exe
            PID:4872
        • C:\Windows\SysWOW64\drivers\Kazekage.exe
          C:\Windows\system32\drivers\Kazekage.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:4556
        • C:\Windows\SysWOW64\drivers\system32.exe
          C:\Windows\system32\drivers\system32.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1956
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          4⤵
          • Runs ping.exe
          PID:2760
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          4⤵
          • Runs ping.exe
          PID:2088
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          4⤵
          • Runs ping.exe
          PID:4596
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          4⤵
          • Runs ping.exe
          PID:1772
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          4⤵
          • Runs ping.exe
          PID:4920
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          4⤵
          • Runs ping.exe
          PID:2988
      • C:\Windows\Fonts\Admin 16 - 5 - 2024\csrss.exe
        "C:\Windows\Fonts\Admin 16 - 5 - 2024\csrss.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:3152
      • C:\Windows\SysWOW64\drivers\Kazekage.exe
        C:\Windows\system32\drivers\Kazekage.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:364
      • C:\Windows\SysWOW64\drivers\system32.exe
        C:\Windows\system32\drivers\system32.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2128
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.rasasayang.com.my 65500
        3⤵
        • Runs ping.exe
        PID:2060
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.duniasex.com 65500
        3⤵
        • Runs ping.exe
        PID:1748
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.rasasayang.com.my 65500
        3⤵
        • Runs ping.exe
        PID:5064
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.duniasex.com 65500
        3⤵
        • Runs ping.exe
        PID:1864
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.rasasayang.com.my 65500
        3⤵
        • Runs ping.exe
        PID:4556
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.duniasex.com 65500
        3⤵
        • Runs ping.exe
        PID:4888
    • C:\Windows\Fonts\Admin 16 - 5 - 2024\Gaara.exe
      "C:\Windows\Fonts\Admin 16 - 5 - 2024\Gaara.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:2632
    • C:\Windows\Fonts\Admin 16 - 5 - 2024\csrss.exe
      "C:\Windows\Fonts\Admin 16 - 5 - 2024\csrss.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:1208
    • C:\Windows\SysWOW64\drivers\Kazekage.exe
      C:\Windows\system32\drivers\Kazekage.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3908
    • C:\Windows\SysWOW64\drivers\system32.exe
      C:\Windows\system32\drivers\system32.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4440
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.rasasayang.com.my 65500
      2⤵
      • Runs ping.exe
      PID:3868
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.duniasex.com 65500
      2⤵
      • Runs ping.exe
      PID:1544
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.rasasayang.com.my 65500
      2⤵
      • Runs ping.exe
      PID:2652
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.duniasex.com 65500
      2⤵
      • Runs ping.exe
      PID:3068
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.rasasayang.com.my 65500
      2⤵
      • Runs ping.exe
      PID:4532
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.duniasex.com 65500
      2⤵
      • Runs ping.exe
      PID:2408

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Admin Games\Readme.txt

    Filesize

    736B

    MD5

    bb5d6abdf8d0948ac6895ce7fdfbc151

    SHA1

    9266b7a247a4685892197194d2b9b86c8f6dddbd

    SHA256

    5db2e0915b5464d32e83484f8ae5e3c73d2c78f238fde5f58f9b40dbb5322de8

    SHA512

    878444760e8df878d65bb62b4798177e168eb099def58ad3634f4348e96705c83f74324f9fa358f0eff389991976698a233ca53e9b72034ae11c86d42322a76c

  • C:\Autorun.inf

    Filesize

    196B

    MD5

    1564dfe69ffed40950e5cb644e0894d1

    SHA1

    201b6f7a01cc49bb698bea6d4945a082ed454ce4

    SHA256

    be114a2dbcc08540b314b01882aa836a772a883322a77b67aab31233e26dc184

    SHA512

    72df187e39674b657974392cfa268e71ef86dc101ebd2303896381ca56d3c05aa9db3f0ab7d0e428d7436e0108c8f19e94c2013814d30b0b95a23a6b9e341097

  • C:\Windows\Fonts\Admin 16 - 5 - 2024\Gaara.exe

    Filesize

    148KB

    MD5

    5cc251626c8399a007283c7eac6f9407

    SHA1

    ea48db11d3f083bb40a78e1dd503fca5b8608580

    SHA256

    c503d348bcf9ba36afa533ea5396bcfddb98890bd42b2e3985974490fe4c0fc7

    SHA512

    485f8c7d78c7c0512576d3e87491f0e86bdf5bd293813b4d304c358f11c50627159fc88d132bbc1f8b0a7e3cc0e07a1b8898b9a9ab6bd97a56a11c63b5d142e8

  • C:\Windows\Fonts\Admin 16 - 5 - 2024\csrss.exe

    Filesize

    148KB

    MD5

    14592fda8d4f7b68cfbfa6e4dc993657

    SHA1

    ab732aeed5700c53474bea7ab7f9f6c86c183372

    SHA256

    4cc96c74f888777611c8ac13a826699531a9facb7ecc513e927b61b8d89c387b

    SHA512

    38bd436559c3bd8b7dc9170bb2256d97bade7baf03385ce20afd8577ed3b5a375c45063ccc55de9e1fe5461a9b44397ecc5a285c3071818b935e466e74444256

  • C:\Windows\Fonts\Admin 16 - 5 - 2024\csrss.exe

    Filesize

    148KB

    MD5

    4d7b211b280f726e1b140f429ef29ae2

    SHA1

    e74ec50d2562ec62af8164df01fb87ba87dc2bef

    SHA256

    dd2de1d9133415399248a4f0dd36826a005cdd602375f93823807cbd4e6dcaec

    SHA512

    e232a0edc429382e3bab2a81fb82d0e57671d182b8ae30f1aa40cf933ec6c915dfe6abdbb49b7d7e2f3f37f2ecc00b89915e5bceaadb3403aea2e1cafbb72163

  • C:\Windows\Fonts\Admin 16 - 5 - 2024\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\Fonts\Admin 16 - 5 - 2024\smss.exe

    Filesize

    148KB

    MD5

    b8b78a87574ed1c5bf5fa699f159e284

    SHA1

    0993a6b7ac075532b0d33d0c634ebcd11cb134b5

    SHA256

    3fa4bb648fcff1b7553f72fde9b6c8a6b0c42e9971756848aa7ac990ec456b3e

    SHA512

    2a42315ea30e9960dfe41cae2fff3c3d97474d783e765c79f9e3a4a7940e026fde0ac4c63ef57e1305965766764cfcc3eaff9229d5d2031c3df358e5db3a7a56

  • C:\Windows\Fonts\The Kazekage.jpg

    Filesize

    1.4MB

    MD5

    d6b05020d4a0ec2a3a8b687099e335df

    SHA1

    df239d830ebcd1cde5c68c46a7b76dad49d415f4

    SHA256

    9824b98dab6af65a9e84c2ea40e9df948f9766ce2096e81feecad7db8dd6080a

    SHA512

    78fd360faa4d34f5732056d6e9ad7b9930964441c69cf24535845d397de92179553b9377a25649c01eb5ac7d547c29cc964e69ede7f2af9fc677508a99251fff

  • C:\Windows\Fonts\The Kazekage.jpg

    Filesize

    1.1MB

    MD5

    4c11fe4fac79b0b47fd44a85bda4633b

    SHA1

    9ee62c2f99ea75da171b0d95c2100ba341d82fe4

    SHA256

    c7b92824fce021a63d13b8bee0a2c9f05dc50387fc5af8d6f019ac48fe960c41

    SHA512

    9a0bca7096c40d6bad9d0fb33e990306e16c3991454dec0031e18f435da88ce7f2d46c0754707da788d3d01712021afaaf37293bd3d6fd2f2bcbc3aef7d776ab

  • C:\Windows\Fonts\The Kazekage.jpg

    Filesize

    1.2MB

    MD5

    cf797c1c8d6924150a9952b875fc06f4

    SHA1

    1a8ae4881144bd6a4ac4572749646ad677ccef48

    SHA256

    595081af12897aa9e142301d135724a2eb82532e6a1553350bb0528b64cd68ff

    SHA512

    19e4bdf64459a900e5d78951d75139d2c08988c5a86ca62039c96310555848a04cddcb4422f0e3da9d601aa9f5b8d9ccdc9616966b328be600fd2a403d229d5e

  • C:\Windows\SysWOW64\16-5-2024.exe

    Filesize

    148KB

    MD5

    0d09ae37e89a6005804515dac49b5d70

    SHA1

    b6cb8848086f586d95a8774f92307f577360c525

    SHA256

    2b1fcd17243f1bbb85e245c64eb729494b29f5b0de95d29c91283515b3ff8732

    SHA512

    c6f34d776404416dab09d0219da78fd31d15b715b210c14da4733c7370db0e985048cf10eb9b80dee44e1c47213028f5154d2a15e957254c2a855050d182a418

  • C:\Windows\SysWOW64\16-5-2024.exe

    Filesize

    148KB

    MD5

    356063492f47232553bcf52257036f12

    SHA1

    8de1609a5004458cab290d47cb9ffa5b1ab1a8b1

    SHA256

    f9c2f38dd2c416aa64e03e4b864f667a1c1d24e1cd537700d87b68f496ad413e

    SHA512

    0f4c84c0299cbd96ffe316f8dd11e10a05947b095fab32cf06dec61086054e5fb712abeb600eddd0357d74670d46fac9e1e560b88565cad7bb8f32a11c73515e

  • C:\Windows\SysWOW64\16-5-2024.exe

    Filesize

    148KB

    MD5

    b07e9317e7d2f04a98ac6c9f693d0c11

    SHA1

    d8b2048b597b38a21b59675abbf226c0f8b5a30b

    SHA256

    e04c0615b3bb1fc02f4e5b41a8866954e42a4b1d284277cf78424c80d94549ff

    SHA512

    58ff93b591e3e9f2884db6955046a8159052965a37d2bd2bc5144ed1fa2d72e8df890a575666f3ee341179c9893f14858d155ea41afab2919dcfd5c8143b3a15

  • C:\Windows\SysWOW64\16-5-2024.exe

    Filesize

    148KB

    MD5

    c54b8dcfdf1b84b9ad70d2ec0da328bb

    SHA1

    6415469a37b7cb2b1e29762259fc1030b23ebfcc

    SHA256

    e24828c05cb5f8c6589d191799a9be7de662cb639eaf1f3782c38a83d6b764cf

    SHA512

    245ab691c8d8a9a8cd420c610de6ae4337b060f0d0c6fa5c2f67058922179eefbce2772bfc6a8dd164a05ea4b43fd02c54d45c9d332e3921733f21970fe178fe

  • C:\Windows\SysWOW64\16-5-2024.exe

    Filesize

    148KB

    MD5

    ce6f2b1c3c48ed7e540eec2ed3f79921

    SHA1

    ab93c7a442b752c7dea1b33b18102a9d1ada0ebb

    SHA256

    ce3498303ae4e53ab27d8af2c51c53f54feb41db0e9e085edd63c274ad629783

    SHA512

    8980d51a424c158cd043674c41b94e8854d9a852a3a64da92505ac0d3c9bc1ea49bb9fe6a1032551ac3b9e644d3f64d089def9c7581ad2a3a132b515d37fe79c

  • C:\Windows\SysWOW64\Desktop.ini

    Filesize

    65B

    MD5

    64acfa7e03b01f48294cf30d201a0026

    SHA1

    10facd995b38a095f30b4a800fa454c0bcbf8438

    SHA256

    ba8159d865d106e7b4d0043007a63d1541e1de455dc8d7ff0edd3013bd425c62

    SHA512

    65a9b2e639de74a2a7faa83463a03f5f5b526495e3c793ec1e144c422ed0b842dd304cd5ff4f8aec3d76d826507030c5916f70a231429cea636ec2d8ab43931a

  • C:\Windows\SysWOW64\drivers\Kazekage.exe

    Filesize

    148KB

    MD5

    dc01cf994a26499611681abb0579d533

    SHA1

    b26a57cc582ef468ff08353a3aef51644767a168

    SHA256

    2fb3d930268adce2a06c37145d86a11ae81e683ab275ad5dc475ae216f5f1545

    SHA512

    53fcacac94c71ec8a41242bd9880b1223c47dde96a72496142458f89a15da57020898f22b877a8799090026bcc6b918270377b7b8125c41a0dcab9f8f1bc46ad

  • C:\Windows\SysWOW64\drivers\Kazekage.exe

    Filesize

    148KB

    MD5

    9c10e710a8fecd6db430b9672cab8950

    SHA1

    7ac49a64f8c0219866e24a8a235ff434055037cb

    SHA256

    0ef4b8277674b88ed3a1d1602392e8e877d2313c69f4c777d6d5e8614a467dda

    SHA512

    4647f9a45b805d3e71bbec446bfe2996f82cd78bf6b54a506f25a55986da6ebad31df0e77b0c39b9a9150186fde139141fb83f7bd3f1c229d87164120fc3187a

  • C:\Windows\SysWOW64\drivers\Kazekage.exe

    Filesize

    148KB

    MD5

    ad210588fa64971c996a465ebb1cedbd

    SHA1

    ffae9faf4f9b6136237191fb81204f8dca8d9ccd

    SHA256

    b0deca04378d40529e19c0e49c60edc88e96cf274924625ede1ba819761d2249

    SHA512

    edd25c4771af79ca0db4ae0af4e63ef0ab1403b82bbcaeed745208bc593b727c2c284d0d643201f5f7d149efbcb629e5021b6dc2d0f766d9055a703053dc0dd8

  • C:\Windows\SysWOW64\drivers\system32.exe

    Filesize

    148KB

    MD5

    d43c463b28848b04392a18e44f4fdfb0

    SHA1

    81f7415b85896bf86bea747f078587ce50d7056c

    SHA256

    da66435676faef3e6fe99efa8f90fffd263370eae1c710322c32911562557dff

    SHA512

    f4f5aac0b5575fe2c67bfab05fbcbf605204ddc7615f21a437d2331f6231e9560eadf08ec5f19358e67100d9a082aed6c75e058ea7dac44c263d282a9417e198

  • C:\Windows\SysWOW64\drivers\system32.exe

    Filesize

    148KB

    MD5

    6d2531a535460702e3c75f043417f42f

    SHA1

    5403bf8c5b419c1d19056e26bda3c1cca056ec15

    SHA256

    d95b78552038696f6edec1082d1d68092ce07007f4951c61e11fcba5104db27f

    SHA512

    ea7f9c84ba49b5c07237b7117f9ea5b12cd21d5daeccc7dfd7436c8a0e39ccc01c720df9e50263b313c842511ed8c51adcdf629c974fde9769d903b645e13b8a

  • C:\Windows\SysWOW64\drivers\system32.exe

    Filesize

    148KB

    MD5

    c320f67c963271c0eb81f5de015e69ca

    SHA1

    d500e32502eaf0200b206707f82613b42b907548

    SHA256

    5c0ec841c68c9b22b8563c171c8d4f86b1fe4dd0253f087aacb4e149263acdae

    SHA512

    f27d8c779e28970ae7a927b5bd2782e800cd19565b60808c95dc11b9340d1fc7690a8a39338d3e19196459872caea05f80edb18456da393251cccdd5acd73ab8

  • C:\Windows\SysWOW64\drivers\system32.exe

    Filesize

    148KB

    MD5

    040818ca00f130ef9455d10365beef7b

    SHA1

    6efed4bf6cb0e9f71802530e21d586d15a360ecb

    SHA256

    9c5414c7d20ff4654e1f3ec599d515e5c9f0baf67a1e775d6e406fde0a0b6f5d

    SHA512

    34cc699cbffce9a25c860e00f05c7459a3364102e466bccfe662177eb1ace371ad8c5cb7e59beed8edf8de62f9878415ffc5de1f216954f3baecd58d04db9415

  • F:\Admin Games\Gaara games - Naruto.exe

    Filesize

    148KB

    MD5

    d136d07a7e5a026a071310456c6718a6

    SHA1

    6d8e89de9f62056c114a13baf32e5a537d5bfd42

    SHA256

    cd9162820a06281c2067a3efc6608e548e415444ddbfb9533b62eadf930ba3a9

    SHA512

    f039042e12596cb3de6733bcb1d940031abc7f74a849843f49504a4a339303e63adf6f0783dc210d53a7309bad88ba0fae1ae61d83efbf8257128badb12d7d37

  • memory/364-260-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/768-240-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1208-267-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1208-271-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1596-237-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1596-235-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1784-201-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1820-0-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1820-942-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1956-251-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1956-250-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2128-263-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2128-264-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2228-244-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2228-243-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2632-268-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2768-114-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2832-233-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/3052-198-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/3100-153-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/3152-257-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/3188-230-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/3372-165-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/3372-1028-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/3640-156-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/3664-118-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/3664-113-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/3868-162-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/3908-274-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/3984-1026-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/3984-75-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/4156-34-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/4156-1025-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/4440-277-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/4472-208-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/4544-192-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/4556-247-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/4704-206-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/4788-122-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/4788-1027-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/4916-70-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/4916-76-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB