Analysis

  • max time kernel
    86s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/05/2024, 21:42

General

  • Target

    0af008378c2571e67cc4ae7b903aa300_NeikiAnalytics.exe

  • Size

    148KB

  • MD5

    0af008378c2571e67cc4ae7b903aa300

  • SHA1

    357b7f5038366f44e3126fe518d9124b1a0d950d

  • SHA256

    fbe333bc3f5376af88a3e9c016f82c1430cd3028437130e455078a9a2870249f

  • SHA512

    05584ecfdb49b24719a82c3e21eb0bf0f71e452d1c45cdd96d5294e79dc7f0e8243da6acc9d68faf4a3f104bc2dca47c7a45166aa707ee214ab77dc8ea126c42

  • SSDEEP

    1536:XJo0IHgL2AHfb1mzaFXg+xsukl4Y17jsgS/jHagQNuXGpeVTV:5x6AHjYzaFXg+w17jsgS/jHagQg19V

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • UAC bypass 3 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Drops file in Drivers directory 24 IoCs
  • Sets file execution options in registry 2 TTPs 64 IoCs
  • Executes dropped EXE 30 IoCs
  • Loads dropped DLL 60 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Drops desktop.ini file(s) 64 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 64 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 38 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 6 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies Control Panel 64 IoCs
  • Modifies Internet Explorer settings 1 TTPs 12 IoCs
  • Modifies registry class 48 IoCs
  • Runs ping.exe 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 31 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0af008378c2571e67cc4ae7b903aa300_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0af008378c2571e67cc4ae7b903aa300_NeikiAnalytics.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • UAC bypass
    • Disables RegEdit via registry modification
    • Drops file in Drivers directory
    • Sets file execution options in registry
    • Loads dropped DLL
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3024
    • C:\Windows\Fonts\Admin 28 - 5 - 2024\smss.exe
      "C:\Windows\Fonts\Admin 28 - 5 - 2024\smss.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • UAC bypass
      • Disables RegEdit via registry modification
      • Drops file in Drivers directory
      • Sets file execution options in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Sets desktop wallpaper using registry
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2544
      • C:\Windows\Fonts\Admin 28 - 5 - 2024\smss.exe
        "C:\Windows\Fonts\Admin 28 - 5 - 2024\smss.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:2960
      • C:\Windows\Fonts\Admin 28 - 5 - 2024\Gaara.exe
        "C:\Windows\Fonts\Admin 28 - 5 - 2024\Gaara.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • UAC bypass
        • Disables RegEdit via registry modification
        • Drops file in Drivers directory
        • Sets file execution options in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops desktop.ini file(s)
        • Enumerates connected drives
        • Drops autorun.inf file
        • Drops file in System32 directory
        • Sets desktop wallpaper using registry
        • Drops file in Windows directory
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:2980
        • C:\Windows\Fonts\Admin 28 - 5 - 2024\smss.exe
          "C:\Windows\Fonts\Admin 28 - 5 - 2024\smss.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:2844
        • C:\Windows\Fonts\Admin 28 - 5 - 2024\Gaara.exe
          "C:\Windows\Fonts\Admin 28 - 5 - 2024\Gaara.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:2840
        • C:\Windows\Fonts\Admin 28 - 5 - 2024\csrss.exe
          "C:\Windows\Fonts\Admin 28 - 5 - 2024\csrss.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • UAC bypass
          • Disables RegEdit via registry modification
          • Drops file in Drivers directory
          • Sets file execution options in registry
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Drops desktop.ini file(s)
          • Enumerates connected drives
          • Drops autorun.inf file
          • Drops file in System32 directory
          • Sets desktop wallpaper using registry
          • Drops file in Windows directory
          • Modifies Control Panel
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:2100
          • C:\Windows\Fonts\Admin 28 - 5 - 2024\smss.exe
            "C:\Windows\Fonts\Admin 28 - 5 - 2024\smss.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:1720
          • C:\Windows\Fonts\Admin 28 - 5 - 2024\Gaara.exe
            "C:\Windows\Fonts\Admin 28 - 5 - 2024\Gaara.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:1916
          • C:\Windows\Fonts\Admin 28 - 5 - 2024\csrss.exe
            "C:\Windows\Fonts\Admin 28 - 5 - 2024\csrss.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:2324
          • C:\Windows\SysWOW64\drivers\Kazekage.exe
            C:\Windows\system32\drivers\Kazekage.exe
            5⤵
            • Modifies WinLogon for persistence
            • Modifies visibility of file extensions in Explorer
            • Modifies visiblity of hidden/system files in Explorer
            • UAC bypass
            • Disables RegEdit via registry modification
            • Drops file in Drivers directory
            • Sets file execution options in registry
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Checks whether UAC is enabled
            • Drops desktop.ini file(s)
            • Enumerates connected drives
            • Drops autorun.inf file
            • Drops file in System32 directory
            • Sets desktop wallpaper using registry
            • Drops file in Windows directory
            • Modifies Control Panel
            • Modifies Internet Explorer settings
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:1900
            • C:\Windows\Fonts\Admin 28 - 5 - 2024\smss.exe
              "C:\Windows\Fonts\Admin 28 - 5 - 2024\smss.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:2312
            • C:\Windows\Fonts\Admin 28 - 5 - 2024\Gaara.exe
              "C:\Windows\Fonts\Admin 28 - 5 - 2024\Gaara.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:1188
            • C:\Windows\Fonts\Admin 28 - 5 - 2024\csrss.exe
              "C:\Windows\Fonts\Admin 28 - 5 - 2024\csrss.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:2160
            • C:\Windows\SysWOW64\drivers\Kazekage.exe
              C:\Windows\system32\drivers\Kazekage.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:1784
            • C:\Windows\SysWOW64\drivers\system32.exe
              C:\Windows\system32\drivers\system32.exe
              6⤵
              • Modifies WinLogon for persistence
              • Modifies visibility of file extensions in Explorer
              • Modifies visiblity of hidden/system files in Explorer
              • UAC bypass
              • Disables RegEdit via registry modification
              • Drops file in Drivers directory
              • Sets file execution options in registry
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Checks whether UAC is enabled
              • Drops desktop.ini file(s)
              • Enumerates connected drives
              • Drops autorun.inf file
              • Drops file in System32 directory
              • Sets desktop wallpaper using registry
              • Drops file in Windows directory
              • Modifies Control Panel
              • Modifies Internet Explorer settings
              • Modifies registry class
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:1960
              • C:\Windows\Fonts\Admin 28 - 5 - 2024\smss.exe
                "C:\Windows\Fonts\Admin 28 - 5 - 2024\smss.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:1044
              • C:\Windows\Fonts\Admin 28 - 5 - 2024\Gaara.exe
                "C:\Windows\Fonts\Admin 28 - 5 - 2024\Gaara.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:1944
              • C:\Windows\Fonts\Admin 28 - 5 - 2024\csrss.exe
                "C:\Windows\Fonts\Admin 28 - 5 - 2024\csrss.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:1796
              • C:\Windows\SysWOW64\drivers\Kazekage.exe
                C:\Windows\system32\drivers\Kazekage.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1804
              • C:\Windows\SysWOW64\drivers\system32.exe
                C:\Windows\system32\drivers\system32.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1080
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.rasasayang.com.my 65500
                7⤵
                • Runs ping.exe
                PID:2224
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.duniasex.com 65500
                7⤵
                • Runs ping.exe
                PID:2940
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.rasasayang.com.my 65500
                7⤵
                • Runs ping.exe
                PID:2960
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.duniasex.com 65500
                7⤵
                • Runs ping.exe
                PID:524
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.rasasayang.com.my 65500
                7⤵
                • Runs ping.exe
                PID:1480
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.duniasex.com 65500
                7⤵
                • Runs ping.exe
                PID:2804
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.rasasayang.com.my 65500
              6⤵
              • Runs ping.exe
              PID:1056
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.duniasex.com 65500
              6⤵
              • Runs ping.exe
              PID:1036
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.rasasayang.com.my 65500
              6⤵
              • Runs ping.exe
              PID:1948
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.duniasex.com 65500
              6⤵
              • Runs ping.exe
              PID:1756
          • C:\Windows\SysWOW64\drivers\system32.exe
            C:\Windows\system32\drivers\system32.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:1160
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.rasasayang.com.my 65500
            5⤵
            • Runs ping.exe
            PID:1524
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.duniasex.com 65500
            5⤵
            • Runs ping.exe
            PID:824
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.rasasayang.com.my 65500
            5⤵
            • Runs ping.exe
            PID:1344
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.duniasex.com 65500
            5⤵
            • Runs ping.exe
            PID:2908
        • C:\Windows\SysWOW64\drivers\Kazekage.exe
          C:\Windows\system32\drivers\Kazekage.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:2204
        • C:\Windows\SysWOW64\drivers\system32.exe
          C:\Windows\system32\drivers\system32.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:2644
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          4⤵
          • Runs ping.exe
          PID:2664
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          4⤵
          • Runs ping.exe
          PID:2680
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          4⤵
          • Runs ping.exe
          PID:1964
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          4⤵
          • Runs ping.exe
          PID:2304
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          4⤵
          • Runs ping.exe
          PID:292
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          4⤵
          • Runs ping.exe
          PID:1684
      • C:\Windows\Fonts\Admin 28 - 5 - 2024\csrss.exe
        "C:\Windows\Fonts\Admin 28 - 5 - 2024\csrss.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:2372
      • C:\Windows\SysWOW64\drivers\Kazekage.exe
        C:\Windows\system32\drivers\Kazekage.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1724
      • C:\Windows\SysWOW64\drivers\system32.exe
        C:\Windows\system32\drivers\system32.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3000
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.rasasayang.com.my 65500
        3⤵
        • Runs ping.exe
        PID:2836
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.duniasex.com 65500
        3⤵
        • Runs ping.exe
        PID:2848
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.rasasayang.com.my 65500
        3⤵
        • Runs ping.exe
        PID:1968
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.duniasex.com 65500
        3⤵
        • Runs ping.exe
        PID:1188
    • C:\Windows\Fonts\Admin 28 - 5 - 2024\Gaara.exe
      "C:\Windows\Fonts\Admin 28 - 5 - 2024\Gaara.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:1700
    • C:\Windows\Fonts\Admin 28 - 5 - 2024\csrss.exe
      "C:\Windows\Fonts\Admin 28 - 5 - 2024\csrss.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:2892
    • C:\Windows\SysWOW64\drivers\Kazekage.exe
      C:\Windows\system32\drivers\Kazekage.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:864
    • C:\Windows\SysWOW64\drivers\system32.exe
      C:\Windows\system32\drivers\system32.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2496
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.rasasayang.com.my 65500
      2⤵
      • Runs ping.exe
      PID:2456
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.duniasex.com 65500
      2⤵
      • Runs ping.exe
      PID:1920
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.rasasayang.com.my 65500
      2⤵
      • Runs ping.exe
      PID:2860
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.duniasex.com 65500
      2⤵
      • Runs ping.exe
      PID:2588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Admin Games\Kazekage.exe

    Filesize

    148KB

    MD5

    101ae49119cf883afd7d4493f1a487fb

    SHA1

    e36be79ad43fc9051fc2554506204e59ec0096af

    SHA256

    27adc240bc402db94b217958bf2860b887e18a8c3dec2ef96dddf0104a6aa8b7

    SHA512

    3f43b148e81960226e33ee6aa5dd754ef9d30636b24291ab84a855ad27c8ba2a4ee0dfc619932af566ee5aa47718f8693a6274aeb28f5c1f138feea96d648a28

  • C:\Admin Games\Readme.txt

    Filesize

    736B

    MD5

    bb5d6abdf8d0948ac6895ce7fdfbc151

    SHA1

    9266b7a247a4685892197194d2b9b86c8f6dddbd

    SHA256

    5db2e0915b5464d32e83484f8ae5e3c73d2c78f238fde5f58f9b40dbb5322de8

    SHA512

    878444760e8df878d65bb62b4798177e168eb099def58ad3634f4348e96705c83f74324f9fa358f0eff389991976698a233ca53e9b72034ae11c86d42322a76c

  • C:\Autorun.inf

    Filesize

    196B

    MD5

    1564dfe69ffed40950e5cb644e0894d1

    SHA1

    201b6f7a01cc49bb698bea6d4945a082ed454ce4

    SHA256

    be114a2dbcc08540b314b01882aa836a772a883322a77b67aab31233e26dc184

    SHA512

    72df187e39674b657974392cfa268e71ef86dc101ebd2303896381ca56d3c05aa9db3f0ab7d0e428d7436e0108c8f19e94c2013814d30b0b95a23a6b9e341097

  • C:\Windows\Fonts\Admin 28 - 5 - 2024\csrss.exe

    Filesize

    148KB

    MD5

    0af008378c2571e67cc4ae7b903aa300

    SHA1

    357b7f5038366f44e3126fe518d9124b1a0d950d

    SHA256

    fbe333bc3f5376af88a3e9c016f82c1430cd3028437130e455078a9a2870249f

    SHA512

    05584ecfdb49b24719a82c3e21eb0bf0f71e452d1c45cdd96d5294e79dc7f0e8243da6acc9d68faf4a3f104bc2dca47c7a45166aa707ee214ab77dc8ea126c42

  • C:\Windows\Fonts\The Kazekage.jpg

    Filesize

    1.4MB

    MD5

    d6b05020d4a0ec2a3a8b687099e335df

    SHA1

    df239d830ebcd1cde5c68c46a7b76dad49d415f4

    SHA256

    9824b98dab6af65a9e84c2ea40e9df948f9766ce2096e81feecad7db8dd6080a

    SHA512

    78fd360faa4d34f5732056d6e9ad7b9930964441c69cf24535845d397de92179553b9377a25649c01eb5ac7d547c29cc964e69ede7f2af9fc677508a99251fff

  • C:\Windows\SysWOW64\28-5-2024.exe

    Filesize

    148KB

    MD5

    1adaa718990a6b08785286494dd2fbb9

    SHA1

    37be99b9897a2b89c9d13283c0f2e4d6fb58478a

    SHA256

    ef542b2d4f2339eb70cee6b90ea6fe992e40eb6d9da95d02bdfa25b0deea9c24

    SHA512

    232e01b0569379f25ef2080390b97fd1e9c65d36fd3d3b5de0a63594cd32ada595b7365fec78d6e6389b6d1998a5c53767cb05b23da6f8247dfa7993bc114c7a

  • C:\Windows\SysWOW64\28-5-2024.exe

    Filesize

    148KB

    MD5

    e23c36b6dd51052f31c1a025d44c981f

    SHA1

    64040901737e0f550215ef34b7fb520adc7afe5c

    SHA256

    91c55f0adc36a9621ab9ab87246b74529eccfa54a6efbfdb880f188220b00ff9

    SHA512

    e0c614343444d46e9370e5f18a73d95707dc1436fea6b3fd1ae9a97a5f66aca37813e9e1e91da08f24f276532e567ae3f3ef2a4ee61a052a04aba6a6ab3568b5

  • C:\Windows\SysWOW64\Desktop.ini

    Filesize

    65B

    MD5

    64acfa7e03b01f48294cf30d201a0026

    SHA1

    10facd995b38a095f30b4a800fa454c0bcbf8438

    SHA256

    ba8159d865d106e7b4d0043007a63d1541e1de455dc8d7ff0edd3013bd425c62

    SHA512

    65a9b2e639de74a2a7faa83463a03f5f5b526495e3c793ec1e144c422ed0b842dd304cd5ff4f8aec3d76d826507030c5916f70a231429cea636ec2d8ab43931a

  • C:\Windows\SysWOW64\MSCOMCTL.OCX

    Filesize

    148KB

    MD5

    3e13c1c34610bd114ef8c857ebdbc87c

    SHA1

    2c390a65938535cf86a18778bde64ab23eb4b04a

    SHA256

    3a071656c004c046934ec72a186edda0c9af5547b43964aed65478ff72268e33

    SHA512

    f1875f6aec5a271cf2aae503c6b2eadc84389dc82b9264a401896f9c867fdb3e5138bac16da68c31038d13906654463d597dc74de4de2516b2925328152f9a44

  • C:\Windows\SysWOW64\drivers\Kazekage.exe

    Filesize

    148KB

    MD5

    ac9a289cbab8017129d8f197e0d45365

    SHA1

    ff412b544457a882da194a9e6f43020bee9b025e

    SHA256

    2acb36366a02a31d68ccee5fb994a0e9d3e10e86277e263b5d73f3378e40ee34

    SHA512

    0ab27aa85bf794d946e81aae8c17a865ee9558a71746dc7abad828533d344026048b3c1132dc1e287fe2b9442b44820f6be241df61e59d0cf6ff0cb4bb24eba6

  • C:\Windows\SysWOW64\drivers\Kazekage.exe

    Filesize

    148KB

    MD5

    6284d7cc834c3650ce9d78f58fbe3665

    SHA1

    b46cf1033286837f701a6317a17a75e68e2a97ba

    SHA256

    43f8d333cad956e8009867ea425b902857ade24e9c7cbd957b2f949658def251

    SHA512

    d7e96626b53f025e725c3f7f269709ec7acdfe9b70dc59469b8e15cf18c023a1efb03ed3f16374156edcc87f0a0955e71b9852b448703f4225d4fa38ee1d85bb

  • C:\Windows\SysWOW64\drivers\Kazekage.exe

    Filesize

    148KB

    MD5

    a7fbecabcdf94508b903728262f7f707

    SHA1

    e5f84645a010d5a25299dffa231fd94f72ae7851

    SHA256

    83d3a8d7e0fced8c8601a681db7c4b298db8e0b3e3031c5fa224613fafa76c22

    SHA512

    4dfe4ea362b6a5e83b9a9201455426a0fa888ae643f233cc47ca4249f95f99e9d156b82928d90c695bcbaecdad5ab8b28395bf2ca39f66ed32ec45acbb9d6a87

  • C:\Windows\SysWOW64\drivers\system32.exe

    Filesize

    148KB

    MD5

    1bbed5e59822b1d04280c8f7869fcc55

    SHA1

    229473b4b31992d4b6ee8b2e3b03ff609e9ceafc

    SHA256

    4f353bdf05134b8b7fb3dbe4ba74398fa2a6c5cbfde313fd85d94a9ab3b31b7c

    SHA512

    39594288c001e924265233f13195b90bc22b4314d908b673301b73aba75b68d6bd46c5f0b7e0182f2ffd6f27912d8e0332c2c72cd03ce88bb864afa12a234207

  • C:\Windows\SysWOW64\drivers\system32.exe

    Filesize

    148KB

    MD5

    8d5aad34c6681fbd10663372978c0baf

    SHA1

    8dcd623c64f9b4d8c36781a6297f4e742c8c2d75

    SHA256

    9ca1ac481365b0eb698bdadd1d0d5cc8ab17daa96afe9ef9778fe7ecb5d39364

    SHA512

    950c150062a3e9e7cb2229d6dac0ac780839b6bdce816202d83cf2f6949c4d942a2ed9136572d7f10e02e061219d37835a1fc679ddbef3056c8823d31f2d2bbb

  • C:\Windows\SysWOW64\drivers\system32.exe

    Filesize

    148KB

    MD5

    41bcb0c197b154632a19c31a6a021b0e

    SHA1

    e3f32a3c4e304b80f4573908f441d3685b030232

    SHA256

    adaa5d47232f380c1d6be1590ac1e04fabdb0f352e94599b5e3b947ebaa89bff

    SHA512

    3724342f86f0226dedd057301c3bcd7f377821aa180c6851ace74c7e99166a4a4f25638f6c1a06e4f163cfff9fe64495c8b2eb5c576039fedf7ef09e055a66ee

  • C:\Windows\SysWOW64\drivers\system32.exe

    Filesize

    148KB

    MD5

    7022a7171245818b3736f96517108f27

    SHA1

    6b6a3fc2f17e99b23662afb1febee3f66e5d72e5

    SHA256

    49d7ba67a7406fd217429b5cacde0787f11de01cb998ab65fc40493da5e14a13

    SHA512

    05322319a2ff7b55c49290721f024ad065f6a080c5df9c47e68c749b2d51c73145f3eaa2f6eee0eb01f73975f286b0ff97f1e86418a502dce49ee01b105b97cc

  • C:\Windows\mscomctl.ocx

    Filesize

    148KB

    MD5

    e56eabc6f1b7668221cd60f8100ae845

    SHA1

    0e927b8cec6f7984be14a3a2bfd0d979d95e3839

    SHA256

    96333a390345bda5580c60c7a9ce4e4c7a16b9b73df22079d5f1151147bbf018

    SHA512

    f5341c98692722c14328fbc3374ffff6dc2c2a90a6bf78c692e8db2fc984adac0f0d8f7bc364762dcc302b877d7858e1b72e3cfbc12a48ea2a357a1021cc1443

  • C:\Windows\system\msvbvm60.dll

    Filesize

    1.3MB

    MD5

    5343a19c618bc515ceb1695586c6c137

    SHA1

    4dedae8cbde066f31c8e6b52c0baa3f8b1117742

    SHA256

    2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

    SHA512

    708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

  • F:\Admin Games\Kazekage VS Hokage.exe

    Filesize

    148KB

    MD5

    1176aad72eb9c71b6db4c714b6054e97

    SHA1

    e16464cf10e7f0018f23ed2a803a6d4cb6d1b6ab

    SHA256

    3bb2041d8fa7a2b1ec2973899a78be2cd9fef48bea5f2180799433c1a46fedc0

    SHA512

    51e73c830e93795b723ee53c83d8a6a044ccd114857661c81aab4a190113f2c43f720dfe36fc9d88b0e2435d4df9f097b88e524e4274c96591668394f0d183b9

  • F:\Admin Games\Kazekage.exe

    Filesize

    148KB

    MD5

    9069fade9fe5242286e6a0d68ec6ddfb

    SHA1

    abbe523cdf7a820e66797d95b9fb70c1bf522cda

    SHA256

    5ff6b27d105e66a96e94ff877079c12e8bd833391df04a3e41c28b59ca043bbc

    SHA512

    67f25bdf9fc63516c7a2cfb8eb211d9554f89f6cf3ed6dda2a5a2926fd2d2b1e959b01a72f99c3041346eba95eaa6ed2fc794883c1f5c39d1c8923343b10913a

  • \Windows\Fonts\Admin 28 - 5 - 2024\Gaara.exe

    Filesize

    148KB

    MD5

    a557903302b6b6ab46c5086c2cf4eb64

    SHA1

    9c12a70286aa40c2692933ceda9a34a26d3f0a9c

    SHA256

    3f2b631e995f41d7856562819f621bbdb491ec6c991d891b1c19412c87113de5

    SHA512

    e62655dded196dd2c34daa373dee0fc10c0cfcd2400b040e7d49f9d75131e315164aca5ceec1a0a575931647f66977ef54b924ce13970b774db755ba6232c476

  • \Windows\Fonts\Admin 28 - 5 - 2024\csrss.exe

    Filesize

    148KB

    MD5

    e66c4b273a01a31517bc5550420cc38d

    SHA1

    4e84babe10c1ead69791ecdab58acaff9271f055

    SHA256

    a86d6c4d67c2452d51052f12f4879ddfd6b1ed0d7572a0af1cd8a488ad4e8956

    SHA512

    df1b22a8e0d8eb32600857c51d2c905ccdfb4e2c8a95253463f3d1b3dfa656a89d332346e51b0cecef0c1316e4a46302e4bddbaea4548d1d27734d9a17445658

  • \Windows\Fonts\Admin 28 - 5 - 2024\smss.exe

    Filesize

    148KB

    MD5

    ddf2a12cd08a70d2040bac7436c1b943

    SHA1

    d8f3e9ee41273a431c297a7ed9e7248f10640c24

    SHA256

    6ed2c9742af62e6ca1834d1bdf744baa4f508330407495abddc6bd9b2015098e

    SHA512

    7d91f6b1e8c5e9f152110693fc4de660cd96ec9e15546576c3c4467c4e9d36020736951157e495327e968a7379706b0f736e67b52f5fb1ffcac3106d7cdcf1f6

  • memory/864-296-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1044-253-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1080-266-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1080-263-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1160-272-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1188-224-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1700-290-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1720-171-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1724-284-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1784-229-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1784-232-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1796-259-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1804-262-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1900-995-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1900-218-0x0000000000430000-0x0000000000455000-memory.dmp

    Filesize

    148KB

  • memory/1900-228-0x0000000000430000-0x0000000000455000-memory.dmp

    Filesize

    148KB

  • memory/1900-234-0x0000000000430000-0x0000000000455000-memory.dmp

    Filesize

    148KB

  • memory/1916-180-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1916-176-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1944-256-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1960-250-0x0000000000430000-0x0000000000455000-memory.dmp

    Filesize

    148KB

  • memory/1960-1037-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2100-188-0x00000000003B0000-0x00000000003D5000-memory.dmp

    Filesize

    148KB

  • memory/2100-174-0x00000000003B0000-0x00000000003D5000-memory.dmp

    Filesize

    148KB

  • memory/2100-167-0x00000000003B0000-0x00000000003D5000-memory.dmp

    Filesize

    148KB

  • memory/2100-793-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2160-227-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2204-275-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2312-221-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2324-182-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2324-185-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2372-281-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2496-299-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2544-788-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2544-38-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2544-790-0x0000000000430000-0x0000000000455000-memory.dmp

    Filesize

    148KB

  • memory/2544-88-0x0000000000430000-0x0000000000455000-memory.dmp

    Filesize

    148KB

  • memory/2544-791-0x0000000000430000-0x0000000000455000-memory.dmp

    Filesize

    148KB

  • memory/2644-278-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2840-129-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2844-126-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2892-293-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2960-76-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2960-79-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2980-137-0x00000000003B0000-0x00000000003D5000-memory.dmp

    Filesize

    148KB

  • memory/2980-792-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2980-90-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2980-132-0x00000000003B0000-0x00000000003D5000-memory.dmp

    Filesize

    148KB

  • memory/3000-287-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/3024-786-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/3024-787-0x00000000002C0000-0x00000000002E5000-memory.dmp

    Filesize

    148KB

  • memory/3024-789-0x00000000002C0000-0x00000000002E5000-memory.dmp

    Filesize

    148KB

  • memory/3024-0-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/3024-32-0x00000000002C0000-0x00000000002E5000-memory.dmp

    Filesize

    148KB