Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    128s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    23/01/2024, 19:51

General

  • Target

    706c22a98c902a6d006d04cfda47e163.exe

  • Size

    283KB

  • MD5

    706c22a98c902a6d006d04cfda47e163

  • SHA1

    0dc80ee20cefca3045abcc1342d960b8a3c49e9c

  • SHA256

    54151d24cac03c5d6be72f161faa00f794edaca0c090747dfadc91a867dbd7bf

  • SHA512

    5f237c32596c16c2cf41c70977c02a86133dc2bb77bf11abd2b9cbb45e3a173a6e4971aefe3b33845c2fc07b29d1b4a52afea96f19fd2308903f8e32bd63234d

  • SSDEEP

    3072:Bx6AHjYzaFXg+w17jsgS/jHagQg1dxiEVlV5998K3WQ8fjEXKgZfnhfxu4V5998l:BxzYzaFXi17jWlVG84jqfhdVG84jqfhQ

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • UAC bypass 3 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Drops file in Drivers directory 24 IoCs
  • Sets file execution options in registry 2 TTPs 64 IoCs
  • Executes dropped EXE 30 IoCs
  • Loads dropped DLL 61 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Drops desktop.ini file(s) 64 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 64 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 38 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 6 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies Control Panel 64 IoCs
  • Modifies Internet Explorer settings 1 TTPs 12 IoCs
  • Modifies registry class 48 IoCs
  • Runs ping.exe 1 TTPs 30 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 31 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\706c22a98c902a6d006d04cfda47e163.exe
    "C:\Users\Admin\AppData\Local\Temp\706c22a98c902a6d006d04cfda47e163.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • UAC bypass
    • Disables RegEdit via registry modification
    • Drops file in Drivers directory
    • Sets file execution options in registry
    • Loads dropped DLL
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2312
    • C:\Windows\Fonts\Admin 23 - 1 - 2024\smss.exe
      "C:\Windows\Fonts\Admin 23 - 1 - 2024\smss.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • UAC bypass
      • Disables RegEdit via registry modification
      • Drops file in Drivers directory
      • Sets file execution options in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Sets desktop wallpaper using registry
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2696
      • C:\Windows\Fonts\Admin 23 - 1 - 2024\smss.exe
        "C:\Windows\Fonts\Admin 23 - 1 - 2024\smss.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:3016
      • C:\Windows\Fonts\Admin 23 - 1 - 2024\Gaara.exe
        "C:\Windows\Fonts\Admin 23 - 1 - 2024\Gaara.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • UAC bypass
        • Disables RegEdit via registry modification
        • Drops file in Drivers directory
        • Sets file execution options in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops desktop.ini file(s)
        • Enumerates connected drives
        • Drops autorun.inf file
        • Drops file in System32 directory
        • Sets desktop wallpaper using registry
        • Drops file in Windows directory
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:2544
        • C:\Windows\Fonts\Admin 23 - 1 - 2024\smss.exe
          "C:\Windows\Fonts\Admin 23 - 1 - 2024\smss.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:2816
        • C:\Windows\Fonts\Admin 23 - 1 - 2024\Gaara.exe
          "C:\Windows\Fonts\Admin 23 - 1 - 2024\Gaara.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:2908
        • C:\Windows\Fonts\Admin 23 - 1 - 2024\csrss.exe
          "C:\Windows\Fonts\Admin 23 - 1 - 2024\csrss.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • UAC bypass
          • Disables RegEdit via registry modification
          • Drops file in Drivers directory
          • Sets file execution options in registry
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Drops desktop.ini file(s)
          • Enumerates connected drives
          • Drops autorun.inf file
          • Drops file in System32 directory
          • Sets desktop wallpaper using registry
          • Drops file in Windows directory
          • Modifies Control Panel
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:2152
          • C:\Windows\Fonts\Admin 23 - 1 - 2024\smss.exe
            "C:\Windows\Fonts\Admin 23 - 1 - 2024\smss.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:1912
          • C:\Windows\Fonts\Admin 23 - 1 - 2024\Gaara.exe
            "C:\Windows\Fonts\Admin 23 - 1 - 2024\Gaara.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:1768
          • C:\Windows\Fonts\Admin 23 - 1 - 2024\csrss.exe
            "C:\Windows\Fonts\Admin 23 - 1 - 2024\csrss.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:1956
          • C:\Windows\SysWOW64\drivers\Kazekage.exe
            C:\Windows\system32\drivers\Kazekage.exe
            5⤵
            • Modifies WinLogon for persistence
            • Modifies visibility of file extensions in Explorer
            • Modifies visiblity of hidden/system files in Explorer
            • UAC bypass
            • Disables RegEdit via registry modification
            • Drops file in Drivers directory
            • Sets file execution options in registry
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Checks whether UAC is enabled
            • Drops desktop.ini file(s)
            • Enumerates connected drives
            • Drops autorun.inf file
            • Drops file in System32 directory
            • Sets desktop wallpaper using registry
            • Drops file in Windows directory
            • Modifies Control Panel
            • Modifies Internet Explorer settings
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:2196
            • C:\Windows\Fonts\Admin 23 - 1 - 2024\smss.exe
              "C:\Windows\Fonts\Admin 23 - 1 - 2024\smss.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:2148
            • C:\Windows\Fonts\Admin 23 - 1 - 2024\Gaara.exe
              "C:\Windows\Fonts\Admin 23 - 1 - 2024\Gaara.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:2300
            • C:\Windows\Fonts\Admin 23 - 1 - 2024\csrss.exe
              "C:\Windows\Fonts\Admin 23 - 1 - 2024\csrss.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:2452
            • C:\Windows\SysWOW64\drivers\Kazekage.exe
              C:\Windows\system32\drivers\Kazekage.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:2952
            • C:\Windows\SysWOW64\drivers\system32.exe
              C:\Windows\system32\drivers\system32.exe
              6⤵
              • Modifies WinLogon for persistence
              • Modifies visibility of file extensions in Explorer
              • Modifies visiblity of hidden/system files in Explorer
              • UAC bypass
              • Disables RegEdit via registry modification
              • Drops file in Drivers directory
              • Sets file execution options in registry
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Checks whether UAC is enabled
              • Drops desktop.ini file(s)
              • Enumerates connected drives
              • Drops autorun.inf file
              • Drops file in System32 directory
              • Sets desktop wallpaper using registry
              • Drops file in Windows directory
              • Modifies Control Panel
              • Modifies Internet Explorer settings
              • Modifies registry class
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:2460
              • C:\Windows\Fonts\Admin 23 - 1 - 2024\smss.exe
                "C:\Windows\Fonts\Admin 23 - 1 - 2024\smss.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:1908
              • C:\Windows\Fonts\Admin 23 - 1 - 2024\Gaara.exe
                "C:\Windows\Fonts\Admin 23 - 1 - 2024\Gaara.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:840
              • C:\Windows\Fonts\Admin 23 - 1 - 2024\csrss.exe
                "C:\Windows\Fonts\Admin 23 - 1 - 2024\csrss.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:1520
              • C:\Windows\SysWOW64\drivers\Kazekage.exe
                C:\Windows\system32\drivers\Kazekage.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1800
              • C:\Windows\SysWOW64\drivers\system32.exe
                C:\Windows\system32\drivers\system32.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1504
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.rasasayang.com.my 65500
                7⤵
                • Runs ping.exe
                PID:2948
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.duniasex.com 65500
                7⤵
                • Runs ping.exe
                PID:2960
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.rasasayang.com.my 65500
                7⤵
                • Runs ping.exe
                PID:572
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.duniasex.com 65500
                7⤵
                • Runs ping.exe
                PID:1764
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.duniasex.com 65500
                7⤵
                • Runs ping.exe
                PID:2624
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.rasasayang.com.my 65500
                7⤵
                • Runs ping.exe
                PID:2128
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.rasasayang.com.my 65500
              6⤵
              • Runs ping.exe
              PID:1968
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.duniasex.com 65500
              6⤵
              • Runs ping.exe
              PID:1600
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.rasasayang.com.my 65500
              6⤵
              • Runs ping.exe
              PID:2500
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.duniasex.com 65500
              6⤵
              • Runs ping.exe
              PID:1300
          • C:\Windows\SysWOW64\drivers\system32.exe
            C:\Windows\system32\drivers\system32.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:1584
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.duniasex.com 65500
            5⤵
            • Runs ping.exe
            PID:1720
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.rasasayang.com.my 65500
            5⤵
            • Runs ping.exe
            PID:1512
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.rasasayang.com.my 65500
            5⤵
            • Runs ping.exe
            PID:788
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.duniasex.com 65500
            5⤵
            • Runs ping.exe
            PID:644
        • C:\Windows\SysWOW64\drivers\Kazekage.exe
          C:\Windows\system32\drivers\Kazekage.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:3048
        • C:\Windows\SysWOW64\drivers\system32.exe
          C:\Windows\system32\drivers\system32.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:932
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          4⤵
          • Runs ping.exe
          PID:2604
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          4⤵
          • Runs ping.exe
          PID:1220
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          4⤵
          • Runs ping.exe
          PID:2156
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          4⤵
          • Runs ping.exe
          PID:1436
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          4⤵
          • Runs ping.exe
          PID:2304
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          4⤵
          • Runs ping.exe
          PID:1608
      • C:\Windows\Fonts\Admin 23 - 1 - 2024\csrss.exe
        "C:\Windows\Fonts\Admin 23 - 1 - 2024\csrss.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:3060
      • C:\Windows\SysWOW64\drivers\Kazekage.exe
        C:\Windows\system32\drivers\Kazekage.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2500
      • C:\Windows\SysWOW64\drivers\system32.exe
        C:\Windows\system32\drivers\system32.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1748
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.rasasayang.com.my 65500
        3⤵
        • Runs ping.exe
        PID:2824
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.duniasex.com 65500
        3⤵
        • Runs ping.exe
        PID:2560
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.duniasex.com 65500
        3⤵
        • Runs ping.exe
        PID:2832
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.rasasayang.com.my 65500
        3⤵
        • Runs ping.exe
        PID:1544
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.rasasayang.com.my 65500
        3⤵
        • Runs ping.exe
        PID:2564
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.duniasex.com 65500
        3⤵
        • Runs ping.exe
        PID:2596
    • C:\Windows\Fonts\Admin 23 - 1 - 2024\Gaara.exe
      "C:\Windows\Fonts\Admin 23 - 1 - 2024\Gaara.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:2972
    • C:\Windows\Fonts\Admin 23 - 1 - 2024\csrss.exe
      "C:\Windows\Fonts\Admin 23 - 1 - 2024\csrss.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:292
    • C:\Windows\SysWOW64\drivers\Kazekage.exe
      C:\Windows\system32\drivers\Kazekage.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:888
    • C:\Windows\SysWOW64\drivers\system32.exe
      C:\Windows\system32\drivers\system32.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2008
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.rasasayang.com.my 65500
      2⤵
      • Runs ping.exe
      PID:1448
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.duniasex.com 65500
      2⤵
      • Runs ping.exe
      PID:704
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.rasasayang.com.my 65500
      2⤵
      • Runs ping.exe
      PID:548
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.duniasex.com 65500
      2⤵
      • Runs ping.exe
      PID:2000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Admin Games\Readme.txt

    Filesize

    736B

    MD5

    bb5d6abdf8d0948ac6895ce7fdfbc151

    SHA1

    9266b7a247a4685892197194d2b9b86c8f6dddbd

    SHA256

    5db2e0915b5464d32e83484f8ae5e3c73d2c78f238fde5f58f9b40dbb5322de8

    SHA512

    878444760e8df878d65bb62b4798177e168eb099def58ad3634f4348e96705c83f74324f9fa358f0eff389991976698a233ca53e9b72034ae11c86d42322a76c

  • C:\Autorun.inf

    Filesize

    196B

    MD5

    1564dfe69ffed40950e5cb644e0894d1

    SHA1

    201b6f7a01cc49bb698bea6d4945a082ed454ce4

    SHA256

    be114a2dbcc08540b314b01882aa836a772a883322a77b67aab31233e26dc184

    SHA512

    72df187e39674b657974392cfa268e71ef86dc101ebd2303896381ca56d3c05aa9db3f0ab7d0e428d7436e0108c8f19e94c2013814d30b0b95a23a6b9e341097

  • C:\Windows\Fonts\Admin 23 - 1 - 2024\Gaara.exe

    Filesize

    283KB

    MD5

    41d227aa29bc48bdfff6c281e94c5482

    SHA1

    97e9f04641cccc40213fe2bc0979970d0274f4ab

    SHA256

    34abe878633f992c6b94e3537d15fc1e00b18f80fe326c5648035e91cb612847

    SHA512

    73d4a4bafa18969fe7be7a6786a6594517dc2f7217916d15ef272a345ea2ec29b82f3c4d36be72d7e543bfac48a0a5d97ece65d94a6bfb223095b901ab2ace59

  • C:\Windows\Fonts\Admin 23 - 1 - 2024\csrss.exe

    Filesize

    283KB

    MD5

    706c22a98c902a6d006d04cfda47e163

    SHA1

    0dc80ee20cefca3045abcc1342d960b8a3c49e9c

    SHA256

    54151d24cac03c5d6be72f161faa00f794edaca0c090747dfadc91a867dbd7bf

    SHA512

    5f237c32596c16c2cf41c70977c02a86133dc2bb77bf11abd2b9cbb45e3a173a6e4971aefe3b33845c2fc07b29d1b4a52afea96f19fd2308903f8e32bd63234d

  • C:\Windows\Fonts\Admin 23 - 1 - 2024\csrss.exe

    Filesize

    283KB

    MD5

    74d1a5b3ff5ba84a11751ad95e922f25

    SHA1

    092678779585bf96098f1da044cfd3478a2284ac

    SHA256

    60791be9c75d21e853bc489a852ad1170544016126dce32966e858a19262cc48

    SHA512

    c60e93ccc9548d0534a11e89917015b119aadfec38deb269c4d8c16ef195bface382600f0f0bcf09c3feb7b7cc51597ab8296c66b4240f26652eff531dd3388f

  • C:\Windows\Fonts\The Kazekage.jpg

    Filesize

    256KB

    MD5

    3d11382bb9fd1ef88c3124e45938cf49

    SHA1

    9d706c474116dc010f850db5cd4873c1187cfbe1

    SHA256

    5c1344a7ccb2f3b9dc601ce283134b74b704b059377266f987c4f6dd652360cc

    SHA512

    c35816d8e6cfef3a6e2210e639f57f7d5a3bb22bb5bd292b9fa5f6003da41943d187d8fe33b73b367f66a5eb9bc266a1d7cac5c24805ca80858a4e45ae7fb55d

  • C:\Windows\Fonts\The Kazekage.jpg

    Filesize

    128KB

    MD5

    02770ec1a321e19ddd06cdb29d69ffe3

    SHA1

    d51b0b4d5de7a3c64dd320cfddd06614a2ab7af2

    SHA256

    72424cc8831eccd132639f5a2b6541c9bb2d638baf4397186a984bc353b7b579

    SHA512

    d816faa1abdee5c0879a4240b30abd156962a5dabb6d072bfcb84aae1d69d8c50ad8f8519db1db9a6fbdeee8a10c643f110800aed1c84957573501bcae178d4f

  • C:\Windows\Fonts\The Kazekage.jpg

    Filesize

    1.4MB

    MD5

    d6b05020d4a0ec2a3a8b687099e335df

    SHA1

    df239d830ebcd1cde5c68c46a7b76dad49d415f4

    SHA256

    9824b98dab6af65a9e84c2ea40e9df948f9766ce2096e81feecad7db8dd6080a

    SHA512

    78fd360faa4d34f5732056d6e9ad7b9930964441c69cf24535845d397de92179553b9377a25649c01eb5ac7d547c29cc964e69ede7f2af9fc677508a99251fff

  • C:\Windows\SysWOW64\23-1-2024.exe

    Filesize

    283KB

    MD5

    cec746d696cb4f757e98d90924583307

    SHA1

    084c5f3bf330a356304fa71778d1c5a177a00d43

    SHA256

    7a689ea913f22f7f4bc13ab1d1cf3aa60cdd9faf7292bfe9665fa80333c83f66

    SHA512

    0534f868fa60c61e673073c74a9c1b2e3326857f21d69d58b0f3f737e8b3faa74d6f470d02fc78cbf2051ed2076a82c142d43473bc3a110e7d8ac05da3b9747a

  • C:\Windows\SysWOW64\23-1-2024.exe

    Filesize

    283KB

    MD5

    ef1c075c6203a56a08336cd7b68a6321

    SHA1

    e51ac2f519f0bd1e45ec7d432e7bf0d91d86148a

    SHA256

    b6f3b6ef47e7914e77bb2e08ad8455580741f6231bf9296734344409d61f2e7c

    SHA512

    217790b8b365a969ba2cf78cf02ebdea8eb86f4363e42cb9d49144478e6a5477ec3676490e6139ab3cbc5a83cced1144352f1a8c9dadfcf9e63f9ac51d6537a6

  • C:\Windows\SysWOW64\23-1-2024.exe

    Filesize

    283KB

    MD5

    578428cb232435fd50e103cc60681945

    SHA1

    0784f28d2369a493f16f8b401b54afa392d2bbf3

    SHA256

    3ff558115775d38a27b7bc2002fa0bd982ab7b72e1b2ed8502486819c59baf60

    SHA512

    774fd2df00e7e5d50be06da6e7d47e58a3216c5f7c707ed6ce3589057c410208979c7947a5d696def603e9a0a78cc89c813736aeecab16816d71920e148c8818

  • C:\Windows\SysWOW64\Desktop.ini

    Filesize

    65B

    MD5

    64acfa7e03b01f48294cf30d201a0026

    SHA1

    10facd995b38a095f30b4a800fa454c0bcbf8438

    SHA256

    ba8159d865d106e7b4d0043007a63d1541e1de455dc8d7ff0edd3013bd425c62

    SHA512

    65a9b2e639de74a2a7faa83463a03f5f5b526495e3c793ec1e144c422ed0b842dd304cd5ff4f8aec3d76d826507030c5916f70a231429cea636ec2d8ab43931a

  • C:\Windows\SysWOW64\MSCOMCTL.OCX

    Filesize

    283KB

    MD5

    c242fa984403d8be4c0022a5be558e8a

    SHA1

    a7627d5387ded645814be6b040db773d680be4c2

    SHA256

    22aa46aa7ffd969e8bd0bce42420443887d90600215972136d9cc11169c4dfda

    SHA512

    c779d92408653906da49a546e89b0f8297eeb9bbd9b7d6f7153b24045a1d2108424631f5cfd9ab60fe4a22e9e0e6428bc894b80f89051dacbfb3a8254fe91d40

  • C:\Windows\SysWOW64\drivers\Kazekage.exe

    Filesize

    283KB

    MD5

    14731ca33c3f0179a6b526e9bf6f016d

    SHA1

    7fbc4c0512abcddffb791928af8ba0f9ffbf9867

    SHA256

    700f0fef481c267ba2ea53a924d5dc332a3770faadf1b35954e5d58e8b7bb1c1

    SHA512

    8d1fa98dc5636ba03b09dceee3a7f2f64976aae4f24e22edbcd2d7eb12732ccf27ba254cc4d85f6040b9c0e50a77ee05d56e372e1ae9de357f37fe46dcdf29ba

  • C:\Windows\SysWOW64\drivers\Kazekage.exe

    Filesize

    283KB

    MD5

    10a64cdeafd9525f6e792ed07af3fa0f

    SHA1

    1dfde168070ed994e978b53e900031da15cdbe00

    SHA256

    1b0dbf3eaccdcf87dfb9bb922bbfb3fbe3c64da28dd6b8f342e00287bd76dbf5

    SHA512

    2c75de9f360613d73db5c98b2de8c07528c24f3664c399f42ff09423409e34883670689fdfdcc95e8a78765f8562c47ee8ff8d74bd904a8eaaca3fbc44fe3119

  • C:\Windows\SysWOW64\drivers\Kazekage.exe

    Filesize

    283KB

    MD5

    658f8009030cf144c87a375799f8a61d

    SHA1

    e568164fd861d41fee8c69223aada966f48f2915

    SHA256

    da29644b5d67ffa593b7e4be923635009f2e885d9e14fd0b70ea9f65941ed370

    SHA512

    d1e9c2eba8d619f7d373104448b6c4270ca5c695c32388ed96e37ad65d8105ae4266eea4fb4cdca785eb5375e0d75987bf1506ead7fea2da5a20958c64fed376

  • C:\Windows\SysWOW64\drivers\system32.exe

    Filesize

    283KB

    MD5

    4c232fdc0911dd9d835d6b4bba02acb4

    SHA1

    403eb3f63340fc3aab7737ebde843c8879a2ef9a

    SHA256

    12d5825699921a32c5de37f768f89fc370ee341348775528784ec086afab46e6

    SHA512

    1d7493e21e032f15b1ae24d0a804ab9a209eb8b57733925b594a5a5226c25e988fb699497b55d3fc9b5175c797ea9745ea2a7fa9437dc7e0f1f36a7940641ad1

  • C:\Windows\SysWOW64\drivers\system32.exe

    Filesize

    283KB

    MD5

    60d43132d7aa4733e57694c6f3ca2d98

    SHA1

    f8590aa968ed8519a1c24e2d28259c6285a2bdb5

    SHA256

    9603bbc5954de44379362ffd392f41320f808201e589f83d634896e217eb5441

    SHA512

    f920117fa9b1fa814d011b1ec6a5610560eec8ebb6cea9213dea27deafe9dbbf3b33f88c99184bd2429069684c311b862f5434840bf77c873a2c19e4b410bfd9

  • C:\Windows\SysWOW64\drivers\system32.exe

    Filesize

    283KB

    MD5

    d4441296406929e11424dfef921cbe52

    SHA1

    417d1802639e6546ec968576bea8d7ffdf668ffe

    SHA256

    8fde2594404e53e848f94552088e74bce4c54b1aa580e6fa773e9dd2a161994c

    SHA512

    e15f341d3ed5db1a2b5a40e3543678c50ff664408e70b92e22625e62d43fbcdf1faf1efc2152c9d490462e41494ea7dd67bee96dc395f7b772dc3c846cba2882

  • C:\Windows\SysWOW64\drivers\system32.exe

    Filesize

    283KB

    MD5

    043808fb3a9211548e3502e04eebd256

    SHA1

    46d87a931f353881b7cb437c974c7f06d5b79fd7

    SHA256

    23bcc152d585bd33aa1a3db0cb4cdfebd2f960a17172a5f7c25598979c76ecf8

    SHA512

    12c61fbfba3914940d94db38d846111cdb2f9e06255eed85934a2f5b6d5e7d518d8bd73d29e370de485bb4f5249586c7407a76d9c24537b09d7b4b5f5bb8ab79

  • C:\Windows\mscomctl.ocx

    Filesize

    283KB

    MD5

    4defa3909cf965fb742e3e6b543bac2f

    SHA1

    b65c72c37a28e579c1beec28cb98beab84665b76

    SHA256

    eba64d6f7afb8915a6b919e68567a083ccf0dbcff16cf34f9d4e0e416d3f5c52

    SHA512

    92c8b83dcf19649b8cc674e5cce7bc9fd320ee8933787fd4236786d5b4fe2d06c195da0407188eb1f66f7ad18ebb2e7b42511f39ccb5054b1633853546789cc1

  • C:\Windows\system\msvbvm60.dll

    Filesize

    1.3MB

    MD5

    5343a19c618bc515ceb1695586c6c137

    SHA1

    4dedae8cbde066f31c8e6b52c0baa3f8b1117742

    SHA256

    2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

    SHA512

    708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

  • \Windows\Fonts\Admin 23 - 1 - 2024\csrss.exe

    Filesize

    283KB

    MD5

    b1c406094a434702180a0eb5aaf39222

    SHA1

    73f731b0f5b05ab72d59155220d7278079b084d4

    SHA256

    ced215856f3cf94ae61e7492b7a95de7a7c7dd34799b3f8655f8dc70817a5512

    SHA512

    4c13743a6d19adff759e5f643ac046060b5b61e2ef227d3cd2fd1ee8f16384591c8d01c0be5881e7c92000c1efeeb9f3fb82b84d8f8d5860757531a3f8717db2

  • \Windows\Fonts\Admin 23 - 1 - 2024\smss.exe

    Filesize

    283KB

    MD5

    c1453a7c950915bdba802797a64dd579

    SHA1

    5b59beb9823cda586c5d9c0ecb181951bdb95fc2

    SHA256

    192af599ae2f442970383cfc1b2c8d8b685c3e46eb36253f5d42d8af4195f22d

    SHA512

    a8556fac90ba252c1f3cbd1578fe41f64d810e8a8560fe3340a9be3625861a0e3668000def4c81e11c000893f33edbc619b1ee49ce1d37d280ad39f1cc61972f

  • memory/292-292-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/840-256-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/888-295-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/932-278-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1504-263-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1504-266-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1520-259-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1584-269-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1748-286-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1768-182-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1800-262-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1908-253-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1912-176-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1956-186-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1956-183-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2008-299-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2148-220-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2152-169-0x00000000002D0000-0x00000000002F5000-memory.dmp

    Filesize

    148KB

  • memory/2152-718-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2196-221-0x00000000023A0000-0x00000000023C5000-memory.dmp

    Filesize

    148KB

  • memory/2196-918-0x00000000023A0000-0x00000000023C5000-memory.dmp

    Filesize

    148KB

  • memory/2196-236-0x00000000023A0000-0x00000000023C5000-memory.dmp

    Filesize

    148KB

  • memory/2196-917-0x00000000023A0000-0x00000000023C5000-memory.dmp

    Filesize

    148KB

  • memory/2196-916-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2196-194-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2300-224-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2312-296-0x0000000000370000-0x0000000000395000-memory.dmp

    Filesize

    148KB

  • memory/2312-37-0x0000000000370000-0x0000000000395000-memory.dmp

    Filesize

    148KB

  • memory/2312-632-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2312-32-0x0000000000370000-0x0000000000395000-memory.dmp

    Filesize

    148KB

  • memory/2312-0-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2452-227-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2460-237-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2460-920-0x00000000006A0000-0x00000000006C5000-memory.dmp

    Filesize

    148KB

  • memory/2460-250-0x00000000006A0000-0x00000000006C5000-memory.dmp

    Filesize

    148KB

  • memory/2460-919-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2544-136-0x0000000000430000-0x0000000000455000-memory.dmp

    Filesize

    148KB

  • memory/2544-717-0x0000000000430000-0x0000000000455000-memory.dmp

    Filesize

    148KB

  • memory/2544-124-0x0000000000430000-0x0000000000455000-memory.dmp

    Filesize

    148KB

  • memory/2544-716-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2544-91-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2696-715-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2696-88-0x00000000004B0000-0x00000000004D5000-memory.dmp

    Filesize

    148KB

  • memory/2696-78-0x00000000004B0000-0x00000000004D5000-memory.dmp

    Filesize

    148KB

  • memory/2816-125-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2816-129-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2908-133-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2952-228-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2952-232-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2972-289-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/3016-80-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/3016-81-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/3048-275-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/3060-281-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB