Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    20/05/2024, 10:57

General

  • Target

    ee24f786714000111146a1a260147745_NeikiAnalytics.exe

  • Size

    145KB

  • MD5

    ee24f786714000111146a1a260147745

  • SHA1

    215aece16ee06eeac9ba46d39e6e23704c747fe2

  • SHA256

    3a253fb4fcd87497dd4d8d4b2aaba8560b6d8457a38165a1eabd77c47fb37eef

  • SHA512

    4e2d15e9998ab60cb835fd8bfb98ed56717c39c7c1455f5e9f3a393067513eded754cb2f0091c157c5f2be67d6e5848a4d37ee5d5b33df3beef1c9b6090ab57f

  • SSDEEP

    1536:GJo0IHgL2AHfb1mzaFXg+xsukl4Y17jsgS/jHagQNuXGpeVTV:mx6AHjYzaFXg+w17jsgS/jHagQg19V

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • UAC bypass 3 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Drops file in Drivers directory 24 IoCs
  • Sets file execution options in registry 2 TTPs 64 IoCs
  • Executes dropped EXE 30 IoCs
  • Loads dropped DLL 64 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Drops desktop.ini file(s) 64 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 64 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 38 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 6 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies Control Panel 64 IoCs
  • Modifies Internet Explorer settings 1 TTPs 12 IoCs
  • Modifies registry class 48 IoCs
  • Runs ping.exe 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 31 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee24f786714000111146a1a260147745_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\ee24f786714000111146a1a260147745_NeikiAnalytics.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • UAC bypass
    • Disables RegEdit via registry modification
    • Drops file in Drivers directory
    • Sets file execution options in registry
    • Loads dropped DLL
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2100
    • C:\Windows\Fonts\Admin 20 - 5 - 2024\smss.exe
      "C:\Windows\Fonts\Admin 20 - 5 - 2024\smss.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • UAC bypass
      • Disables RegEdit via registry modification
      • Drops file in Drivers directory
      • Sets file execution options in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Sets desktop wallpaper using registry
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2524
      • C:\Windows\Fonts\Admin 20 - 5 - 2024\smss.exe
        "C:\Windows\Fonts\Admin 20 - 5 - 2024\smss.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:2420
      • C:\Windows\Fonts\Admin 20 - 5 - 2024\Gaara.exe
        "C:\Windows\Fonts\Admin 20 - 5 - 2024\Gaara.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • UAC bypass
        • Disables RegEdit via registry modification
        • Drops file in Drivers directory
        • Sets file execution options in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops desktop.ini file(s)
        • Enumerates connected drives
        • Drops autorun.inf file
        • Drops file in System32 directory
        • Sets desktop wallpaper using registry
        • Drops file in Windows directory
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:2912
        • C:\Windows\Fonts\Admin 20 - 5 - 2024\smss.exe
          "C:\Windows\Fonts\Admin 20 - 5 - 2024\smss.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:348
        • C:\Windows\Fonts\Admin 20 - 5 - 2024\Gaara.exe
          "C:\Windows\Fonts\Admin 20 - 5 - 2024\Gaara.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:1996
        • C:\Windows\Fonts\Admin 20 - 5 - 2024\csrss.exe
          "C:\Windows\Fonts\Admin 20 - 5 - 2024\csrss.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • UAC bypass
          • Disables RegEdit via registry modification
          • Drops file in Drivers directory
          • Sets file execution options in registry
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Drops desktop.ini file(s)
          • Enumerates connected drives
          • Drops autorun.inf file
          • Drops file in System32 directory
          • Sets desktop wallpaper using registry
          • Drops file in Windows directory
          • Modifies Control Panel
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:2040
          • C:\Windows\Fonts\Admin 20 - 5 - 2024\smss.exe
            "C:\Windows\Fonts\Admin 20 - 5 - 2024\smss.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:1228
          • C:\Windows\Fonts\Admin 20 - 5 - 2024\Gaara.exe
            "C:\Windows\Fonts\Admin 20 - 5 - 2024\Gaara.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:296
          • C:\Windows\Fonts\Admin 20 - 5 - 2024\csrss.exe
            "C:\Windows\Fonts\Admin 20 - 5 - 2024\csrss.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:2628
          • C:\Windows\SysWOW64\drivers\Kazekage.exe
            C:\Windows\system32\drivers\Kazekage.exe
            5⤵
            • Modifies WinLogon for persistence
            • Modifies visibility of file extensions in Explorer
            • Modifies visiblity of hidden/system files in Explorer
            • UAC bypass
            • Disables RegEdit via registry modification
            • Drops file in Drivers directory
            • Sets file execution options in registry
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Checks whether UAC is enabled
            • Drops desktop.ini file(s)
            • Enumerates connected drives
            • Drops autorun.inf file
            • Drops file in System32 directory
            • Sets desktop wallpaper using registry
            • Drops file in Windows directory
            • Modifies Control Panel
            • Modifies Internet Explorer settings
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:2164
            • C:\Windows\Fonts\Admin 20 - 5 - 2024\smss.exe
              "C:\Windows\Fonts\Admin 20 - 5 - 2024\smss.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:1028
            • C:\Windows\Fonts\Admin 20 - 5 - 2024\Gaara.exe
              "C:\Windows\Fonts\Admin 20 - 5 - 2024\Gaara.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:592
            • C:\Windows\Fonts\Admin 20 - 5 - 2024\csrss.exe
              "C:\Windows\Fonts\Admin 20 - 5 - 2024\csrss.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:1484
            • C:\Windows\SysWOW64\drivers\Kazekage.exe
              C:\Windows\system32\drivers\Kazekage.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:1680
            • C:\Windows\SysWOW64\drivers\system32.exe
              C:\Windows\system32\drivers\system32.exe
              6⤵
              • Modifies WinLogon for persistence
              • Modifies visibility of file extensions in Explorer
              • Modifies visiblity of hidden/system files in Explorer
              • UAC bypass
              • Disables RegEdit via registry modification
              • Drops file in Drivers directory
              • Sets file execution options in registry
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Checks whether UAC is enabled
              • Drops desktop.ini file(s)
              • Enumerates connected drives
              • Drops autorun.inf file
              • Drops file in System32 directory
              • Sets desktop wallpaper using registry
              • Drops file in Windows directory
              • Modifies Control Panel
              • Modifies Internet Explorer settings
              • Modifies registry class
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:832
              • C:\Windows\Fonts\Admin 20 - 5 - 2024\smss.exe
                "C:\Windows\Fonts\Admin 20 - 5 - 2024\smss.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:2844
              • C:\Windows\Fonts\Admin 20 - 5 - 2024\Gaara.exe
                "C:\Windows\Fonts\Admin 20 - 5 - 2024\Gaara.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:1704
              • C:\Windows\Fonts\Admin 20 - 5 - 2024\csrss.exe
                "C:\Windows\Fonts\Admin 20 - 5 - 2024\csrss.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:1248
              • C:\Windows\SysWOW64\drivers\Kazekage.exe
                C:\Windows\system32\drivers\Kazekage.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1540
              • C:\Windows\SysWOW64\drivers\system32.exe
                C:\Windows\system32\drivers\system32.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1928
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.rasasayang.com.my 65500
                7⤵
                • Runs ping.exe
                PID:1648
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.duniasex.com 65500
                7⤵
                • Runs ping.exe
                PID:2148
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.rasasayang.com.my 65500
                7⤵
                • Runs ping.exe
                PID:1048
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.duniasex.com 65500
                7⤵
                • Runs ping.exe
                PID:2944
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.rasasayang.com.my 65500
              6⤵
              • Runs ping.exe
              PID:540
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.duniasex.com 65500
              6⤵
              • Runs ping.exe
              PID:488
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.rasasayang.com.my 65500
              6⤵
              • Runs ping.exe
              PID:2372
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.duniasex.com 65500
              6⤵
              • Runs ping.exe
              PID:2444
          • C:\Windows\SysWOW64\drivers\system32.exe
            C:\Windows\system32\drivers\system32.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:1916
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.rasasayang.com.my 65500
            5⤵
            • Runs ping.exe
            PID:1520
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.duniasex.com 65500
            5⤵
            • Runs ping.exe
            PID:1572
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.rasasayang.com.my 65500
            5⤵
            • Runs ping.exe
            PID:628
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.duniasex.com 65500
            5⤵
            • Runs ping.exe
            PID:2660
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.rasasayang.com.my 65500
            5⤵
            • Runs ping.exe
            PID:2488
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.duniasex.com 65500
            5⤵
            • Runs ping.exe
            PID:2280
        • C:\Windows\SysWOW64\drivers\Kazekage.exe
          C:\Windows\system32\drivers\Kazekage.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1888
        • C:\Windows\SysWOW64\drivers\system32.exe
          C:\Windows\system32\drivers\system32.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1452
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          4⤵
          • Runs ping.exe
          PID:2888
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          4⤵
          • Runs ping.exe
          PID:2460
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          4⤵
          • Runs ping.exe
          PID:2976
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          4⤵
          • Runs ping.exe
          PID:608
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          4⤵
          • Runs ping.exe
          PID:2924
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          4⤵
          • Runs ping.exe
          PID:2492
      • C:\Windows\Fonts\Admin 20 - 5 - 2024\csrss.exe
        "C:\Windows\Fonts\Admin 20 - 5 - 2024\csrss.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:1148
      • C:\Windows\SysWOW64\drivers\Kazekage.exe
        C:\Windows\system32\drivers\Kazekage.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:628
      • C:\Windows\SysWOW64\drivers\system32.exe
        C:\Windows\system32\drivers\system32.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1420
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.rasasayang.com.my 65500
        3⤵
        • Runs ping.exe
        PID:1948
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.duniasex.com 65500
        3⤵
        • Runs ping.exe
        PID:2004
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.rasasayang.com.my 65500
        3⤵
        • Runs ping.exe
        PID:1756
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.duniasex.com 65500
        3⤵
        • Runs ping.exe
        PID:2360
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.rasasayang.com.my 65500
        3⤵
        • Runs ping.exe
        PID:592
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.duniasex.com 65500
        3⤵
        • Runs ping.exe
        PID:1904
    • C:\Windows\Fonts\Admin 20 - 5 - 2024\Gaara.exe
      "C:\Windows\Fonts\Admin 20 - 5 - 2024\Gaara.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:332
    • C:\Windows\Fonts\Admin 20 - 5 - 2024\csrss.exe
      "C:\Windows\Fonts\Admin 20 - 5 - 2024\csrss.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2700
    • C:\Windows\SysWOW64\drivers\Kazekage.exe
      C:\Windows\system32\drivers\Kazekage.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1944
    • C:\Windows\SysWOW64\drivers\system32.exe
      C:\Windows\system32\drivers\system32.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1732
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.rasasayang.com.my 65500
      2⤵
      • Runs ping.exe
      PID:2332
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.duniasex.com 65500
      2⤵
      • Runs ping.exe
      PID:2544
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.rasasayang.com.my 65500
      2⤵
      • Runs ping.exe
      PID:1600
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.duniasex.com 65500
      2⤵
      • Runs ping.exe
      PID:2256
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.rasasayang.com.my 65500
      2⤵
      • Runs ping.exe
      PID:1720
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.duniasex.com 65500
      2⤵
      • Runs ping.exe
      PID:2800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Admin Games\Readme.txt

    Filesize

    736B

    MD5

    bb5d6abdf8d0948ac6895ce7fdfbc151

    SHA1

    9266b7a247a4685892197194d2b9b86c8f6dddbd

    SHA256

    5db2e0915b5464d32e83484f8ae5e3c73d2c78f238fde5f58f9b40dbb5322de8

    SHA512

    878444760e8df878d65bb62b4798177e168eb099def58ad3634f4348e96705c83f74324f9fa358f0eff389991976698a233ca53e9b72034ae11c86d42322a76c

  • C:\Autorun.inf

    Filesize

    196B

    MD5

    1564dfe69ffed40950e5cb644e0894d1

    SHA1

    201b6f7a01cc49bb698bea6d4945a082ed454ce4

    SHA256

    be114a2dbcc08540b314b01882aa836a772a883322a77b67aab31233e26dc184

    SHA512

    72df187e39674b657974392cfa268e71ef86dc101ebd2303896381ca56d3c05aa9db3f0ab7d0e428d7436e0108c8f19e94c2013814d30b0b95a23a6b9e341097

  • C:\Windows\Fonts\Admin 20 - 5 - 2024\csrss.exe

    Filesize

    145KB

    MD5

    ee24f786714000111146a1a260147745

    SHA1

    215aece16ee06eeac9ba46d39e6e23704c747fe2

    SHA256

    3a253fb4fcd87497dd4d8d4b2aaba8560b6d8457a38165a1eabd77c47fb37eef

    SHA512

    4e2d15e9998ab60cb835fd8bfb98ed56717c39c7c1455f5e9f3a393067513eded754cb2f0091c157c5f2be67d6e5848a4d37ee5d5b33df3beef1c9b6090ab57f

  • C:\Windows\Fonts\Admin 20 - 5 - 2024\csrss.exe

    Filesize

    145KB

    MD5

    b8821b96a5da875c86905baba7f0a9e7

    SHA1

    952af6c4562048c04326feda2aecb24c149af3bf

    SHA256

    712c9dc7dba6f69e22a9bda9eb93d7a25a531d2884da88fcef36699d36d0744b

    SHA512

    c991822a6f59ffda0123fead8ed658e09121caf1e5ba271e5fce7b3fe6ae13f2e8abf006ead7a59917e00b2380f2d92af2998c614c48cf0f860dc04bfff3b228

  • C:\Windows\Fonts\The Kazekage.jpg

    Filesize

    1.4MB

    MD5

    d6b05020d4a0ec2a3a8b687099e335df

    SHA1

    df239d830ebcd1cde5c68c46a7b76dad49d415f4

    SHA256

    9824b98dab6af65a9e84c2ea40e9df948f9766ce2096e81feecad7db8dd6080a

    SHA512

    78fd360faa4d34f5732056d6e9ad7b9930964441c69cf24535845d397de92179553b9377a25649c01eb5ac7d547c29cc964e69ede7f2af9fc677508a99251fff

  • C:\Windows\SysWOW64\20-5-2024.exe

    Filesize

    145KB

    MD5

    7ea5a31b819013f6e600ed874b6d78f4

    SHA1

    abb0bfae23e548db90031f8ae014d0b2f2534b9b

    SHA256

    bab0306de1472efc4453fa17a3a434c35043edab0d02553ae458d8281a1e0d3e

    SHA512

    5d6e30e9cf12d002b86178a1bd1862475d17086261458ffd45f8cc71c3a8f9f50aa79d134c5399de5ecaf5d1c2d04148e50309e988459ff4895e828b98598325

  • C:\Windows\SysWOW64\20-5-2024.exe

    Filesize

    145KB

    MD5

    f90b543b6918c35beabbac542e3642f4

    SHA1

    4e650e63741c2d159eda2c26cbfdf298126b3143

    SHA256

    e3117cd212463afb27c207c674fa5dcdb140dbe1fc078f3f2ee6679a8993eede

    SHA512

    f087aeeb010b3ef9eb202c608dda708dac1100695db6c4490e6d40122c7943c7460f5775c34836fdbbd64111042a3fbc334fe90694472ccbec67104156815a4b

  • C:\Windows\SysWOW64\20-5-2024.exe

    Filesize

    145KB

    MD5

    a3af9230160fc7a91df09e89df9f30c0

    SHA1

    6c82f740a8ff003eb9688ff5c94eb77fbd9f287c

    SHA256

    d081deb97d719d66aed82730b097f3341af25642f7db0703a61189f90a86965f

    SHA512

    61f8743e7e20b4cef9ea30c7d04e4a884fe06c2b9cd48b1c53e59f502465d1bb665a93c6425b011656e3869f17a0b20fad21753368640dd6903b54572e1fc791

  • C:\Windows\SysWOW64\Desktop.ini

    Filesize

    65B

    MD5

    64acfa7e03b01f48294cf30d201a0026

    SHA1

    10facd995b38a095f30b4a800fa454c0bcbf8438

    SHA256

    ba8159d865d106e7b4d0043007a63d1541e1de455dc8d7ff0edd3013bd425c62

    SHA512

    65a9b2e639de74a2a7faa83463a03f5f5b526495e3c793ec1e144c422ed0b842dd304cd5ff4f8aec3d76d826507030c5916f70a231429cea636ec2d8ab43931a

  • C:\Windows\SysWOW64\drivers\Kazekage.exe

    Filesize

    145KB

    MD5

    ccb2c0dc36fffc5f46251e693d08600d

    SHA1

    ebceec5fc1cc2f2b20b731de31583e77fd6f0fba

    SHA256

    e15e5d1c9a5a8ada66f445d0977a9b1dd457a87b51252f640a9f0faf50f7de96

    SHA512

    d53e939a2c17e9920f6398ef1f4d5fcd40667137b21e332c857a8a443ddbea759667243b22e58b97f0a0a1b3a69c0c05419924295fe91e4f468dd7a70e805a41

  • C:\Windows\SysWOW64\drivers\Kazekage.exe

    Filesize

    145KB

    MD5

    4ae08a8490db06d1d138a2bb42315c14

    SHA1

    f1dd81f88a00d73b4528041d256fae3beb18cc4c

    SHA256

    56e94596c943dce19a5b4181344671ece71c79d8f36ac6ad1b24cb368768ece2

    SHA512

    09e22234b91590b321092ef7da51645ad6575bd5871f0be79d5f5a53b7505001012e0cd58374f6f06cd95bea2d900e5084b1ce23872c1f96cb34cc547edc9ed6

  • C:\Windows\SysWOW64\drivers\Kazekage.exe

    Filesize

    145KB

    MD5

    0989e77a3af74f39c14e2c918ef9d768

    SHA1

    50b9d176cdfa0a3cf0b3cb902dc86ae7a8c8e373

    SHA256

    cd47ed80f1701926af0ff01adb44e9eba19ef3a8a7e9f3cc4706f12b6dba4072

    SHA512

    33e89d0f7b9d24f2372448193c52c52d4f007d77ca20622682cae8c1b4afbba70ee4ac549a3735665c3aab901c074e1b10689b29ab279ee6d4f1b8a3f0ebe14f

  • C:\Windows\SysWOW64\drivers\system32.exe

    Filesize

    145KB

    MD5

    96b0491ee4f1b569ed9ba00251e85400

    SHA1

    b59d54f51b003c73da482115dcaade5ef02f23c5

    SHA256

    808fd887d6832b3aa3482da14c2d2ead1ad228b643868c3e6ceb3bed8d5684d1

    SHA512

    9e62bfd70b25a5c1bf4a1c698cac9b87bc5923e4f8a2003468c2923a9104258778ed1a81c90fc1849534cd17e970ff8ef190c3471ca391c1b9f709facfb5c487

  • C:\Windows\SysWOW64\drivers\system32.exe

    Filesize

    145KB

    MD5

    dbf97b8968dace49f2eee560929bb6d4

    SHA1

    09d995950bc8920ca0a44144b65995a04c4f8516

    SHA256

    40c7589ef2eadf9109bc685df431b417db365a672dbb75b1f2a6aac453367955

    SHA512

    df042592dd08efc8b7ef322a8239a546ac2d2b28af988d115e882f65dff4d929397e38a6e1d89f60b79af14859a2e2c93076cda7c0270fdad7c709f13d4d6e21

  • C:\Windows\SysWOW64\drivers\system32.exe

    Filesize

    145KB

    MD5

    53ead2b8e76ca1771dabdcff2b8861ac

    SHA1

    13dadd2a01cc6f4bb18ea6c5b4ab6c56529fca2c

    SHA256

    d162e7382537469c3f56dbd54387422bce5ee3beb8b0c137543f5749b37f70a3

    SHA512

    f1fcbcb34d08059fb06612716eec275f37f644c6c1ecd35194c42ec96dc6759873a369c1a51074201d88c427fe9567af288394d82410680bc1a965147ba72d72

  • C:\Windows\SysWOW64\drivers\system32.exe

    Filesize

    145KB

    MD5

    d1a70130429628e7ad9c7cd96389d0cf

    SHA1

    57c7b83173ec0bec536a47b043eaed46d5842561

    SHA256

    4bc701caaf89f955af5eafd1d17ccbcc4a0b5bbefbc1a4b0c2da512c0fd596b0

    SHA512

    0e6f1342c520297c1ddfd18c24ba87cbe8a93538ca280615bdb8287477a0102b5db8415ce9c44a6e4e35b778d6ad093647e745c405665cf1547c3147f2f4a7a6

  • C:\Windows\system\msvbvm60.dll

    Filesize

    1.3MB

    MD5

    5343a19c618bc515ceb1695586c6c137

    SHA1

    4dedae8cbde066f31c8e6b52c0baa3f8b1117742

    SHA256

    2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

    SHA512

    708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

  • \Windows\Fonts\Admin 20 - 5 - 2024\Gaara.exe

    Filesize

    145KB

    MD5

    5b9b1a5b616fee3a491159670c3e247f

    SHA1

    30ceb5cb4b8b99d8d0991f6d99deb76cc3cb8e8d

    SHA256

    ae853f9ec8fb6ab3b9f532badc3e9dd8071dc3b1e3df000896d941a102906fa6

    SHA512

    0fc41ee68f92547751b42c0d652456a6c4eab1f4ad946f42a90f8c0b638f43513e03a8ec4c2937f4afe5a901ab037632f293d5e768d64f0093e40fdb7426fd48

  • \Windows\Fonts\Admin 20 - 5 - 2024\smss.exe

    Filesize

    145KB

    MD5

    835a747b0b664a1c25ba21a290a26c2c

    SHA1

    da6b4ceb37f35f4f1ca401e29c7b0117194e0ac9

    SHA256

    c51887c8b7fd9b1f44964156e0f2121321ba8a306010bc440867e64937cfcb73

    SHA512

    0f49cb95b77d86f5cf9676e571bc6e8e35d203191bc8cf698c9f4e1579fffd7d90683e3a0a2f3b6f87605bb5b647828589dbeaceeca46568a657b0855f2c6351

  • memory/296-189-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/332-296-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/332-295-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/348-131-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/592-230-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/628-283-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/628-286-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/832-242-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/832-1005-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1028-226-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1028-227-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1148-282-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1228-180-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1228-178-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1248-263-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1420-292-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1452-276-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1452-279-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1484-233-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1540-266-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1680-237-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1704-260-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1732-306-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1888-275-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1916-272-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1928-269-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1944-303-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1944-302-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1996-135-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1996-132-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2040-143-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2040-172-0x0000000000450000-0x0000000000475000-memory.dmp

    Filesize

    148KB

  • memory/2040-173-0x0000000000450000-0x0000000000475000-memory.dmp

    Filesize

    148KB

  • memory/2040-181-0x0000000000450000-0x0000000000475000-memory.dmp

    Filesize

    148KB

  • memory/2040-199-0x0000000000450000-0x0000000000475000-memory.dmp

    Filesize

    148KB

  • memory/2040-190-0x0000000000450000-0x0000000000475000-memory.dmp

    Filesize

    148KB

  • memory/2040-185-0x0000000000450000-0x0000000000475000-memory.dmp

    Filesize

    148KB

  • memory/2040-797-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2100-747-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2100-0-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2100-31-0x00000000002C0000-0x00000000002E5000-memory.dmp

    Filesize

    148KB

  • memory/2100-39-0x00000000002C0000-0x00000000002E5000-memory.dmp

    Filesize

    148KB

  • memory/2100-789-0x00000000002C0000-0x00000000002E5000-memory.dmp

    Filesize

    148KB

  • memory/2164-223-0x0000000000320000-0x0000000000345000-memory.dmp

    Filesize

    148KB

  • memory/2164-978-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2164-1004-0x0000000000320000-0x0000000000345000-memory.dmp

    Filesize

    148KB

  • memory/2164-234-0x0000000000320000-0x0000000000345000-memory.dmp

    Filesize

    148KB

  • memory/2420-79-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2524-792-0x0000000000430000-0x0000000000455000-memory.dmp

    Filesize

    148KB

  • memory/2524-791-0x0000000000430000-0x0000000000455000-memory.dmp

    Filesize

    148KB

  • memory/2524-91-0x0000000000430000-0x0000000000455000-memory.dmp

    Filesize

    148KB

  • memory/2524-790-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2524-88-0x0000000000430000-0x0000000000455000-memory.dmp

    Filesize

    148KB

  • memory/2628-196-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2628-193-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2700-299-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2844-257-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2912-794-0x00000000003B0000-0x00000000003D5000-memory.dmp

    Filesize

    148KB

  • memory/2912-795-0x00000000003B0000-0x00000000003D5000-memory.dmp

    Filesize

    148KB

  • memory/2912-796-0x00000000003B0000-0x00000000003D5000-memory.dmp

    Filesize

    148KB

  • memory/2912-793-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2912-121-0x00000000003B0000-0x00000000003D5000-memory.dmp

    Filesize

    148KB

  • memory/2912-124-0x00000000003B0000-0x00000000003D5000-memory.dmp

    Filesize

    148KB

  • memory/2912-92-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB