Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    27/03/2024, 23:57

General

  • Target

    c2381fc7edb515d63e5da3ba6f503d79581ecb16bf7ba0e5c3e7724e2ed6b24a.exe

  • Size

    54KB

  • MD5

    33ae7df5fe25355ef97e68fe977480dd

  • SHA1

    3fc1713750d36117b4eed3c23787723154354dec

  • SHA256

    c2381fc7edb515d63e5da3ba6f503d79581ecb16bf7ba0e5c3e7724e2ed6b24a

  • SHA512

    659585fdc24b3e44ca5959757c1b7bf5f24b99fcc0baff95f167d94484238160241abf76c14064e7d9777a4250e4ebd00a42a5c00a3e219145c04dbf1cc45018

  • SSDEEP

    1536:A7TJopblB4dqyyUiZ06pX3I6/qxiSEGNJFV:A7TQlatyYePxiFV

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • UAC bypass 3 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Drops file in Drivers directory 24 IoCs
  • Sets file execution options in registry 2 TTPs 64 IoCs
  • Executes dropped EXE 30 IoCs
  • Loads dropped DLL 64 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Drops desktop.ini file(s) 64 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 64 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 38 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 6 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies Control Panel 64 IoCs
  • Modifies Internet Explorer settings 1 TTPs 12 IoCs
  • Modifies registry class 48 IoCs
  • Runs ping.exe 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 31 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c2381fc7edb515d63e5da3ba6f503d79581ecb16bf7ba0e5c3e7724e2ed6b24a.exe
    "C:\Users\Admin\AppData\Local\Temp\c2381fc7edb515d63e5da3ba6f503d79581ecb16bf7ba0e5c3e7724e2ed6b24a.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • UAC bypass
    • Disables RegEdit via registry modification
    • Drops file in Drivers directory
    • Sets file execution options in registry
    • Loads dropped DLL
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2392
    • C:\Windows\Fonts\Admin 27 - 3 - 2024\smss.exe
      "C:\Windows\Fonts\Admin 27 - 3 - 2024\smss.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • UAC bypass
      • Disables RegEdit via registry modification
      • Drops file in Drivers directory
      • Sets file execution options in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Sets desktop wallpaper using registry
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2280
      • C:\Windows\Fonts\Admin 27 - 3 - 2024\smss.exe
        "C:\Windows\Fonts\Admin 27 - 3 - 2024\smss.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:2044
      • C:\Windows\Fonts\Admin 27 - 3 - 2024\Gaara.exe
        "C:\Windows\Fonts\Admin 27 - 3 - 2024\Gaara.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • UAC bypass
        • Disables RegEdit via registry modification
        • Drops file in Drivers directory
        • Sets file execution options in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops desktop.ini file(s)
        • Enumerates connected drives
        • Drops autorun.inf file
        • Drops file in System32 directory
        • Sets desktop wallpaper using registry
        • Drops file in Windows directory
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:2436
        • C:\Windows\Fonts\Admin 27 - 3 - 2024\smss.exe
          "C:\Windows\Fonts\Admin 27 - 3 - 2024\smss.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:2524
        • C:\Windows\Fonts\Admin 27 - 3 - 2024\Gaara.exe
          "C:\Windows\Fonts\Admin 27 - 3 - 2024\Gaara.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:2040
        • C:\Windows\Fonts\Admin 27 - 3 - 2024\csrss.exe
          "C:\Windows\Fonts\Admin 27 - 3 - 2024\csrss.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • UAC bypass
          • Disables RegEdit via registry modification
          • Drops file in Drivers directory
          • Sets file execution options in registry
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Drops desktop.ini file(s)
          • Enumerates connected drives
          • Drops autorun.inf file
          • Drops file in System32 directory
          • Sets desktop wallpaper using registry
          • Drops file in Windows directory
          • Modifies Control Panel
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:2732
          • C:\Windows\Fonts\Admin 27 - 3 - 2024\smss.exe
            "C:\Windows\Fonts\Admin 27 - 3 - 2024\smss.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:556
          • C:\Windows\Fonts\Admin 27 - 3 - 2024\Gaara.exe
            "C:\Windows\Fonts\Admin 27 - 3 - 2024\Gaara.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:764
          • C:\Windows\Fonts\Admin 27 - 3 - 2024\csrss.exe
            "C:\Windows\Fonts\Admin 27 - 3 - 2024\csrss.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:2284
          • C:\Windows\SysWOW64\drivers\Kazekage.exe
            C:\Windows\system32\drivers\Kazekage.exe
            5⤵
            • Modifies WinLogon for persistence
            • Modifies visibility of file extensions in Explorer
            • Modifies visiblity of hidden/system files in Explorer
            • UAC bypass
            • Disables RegEdit via registry modification
            • Drops file in Drivers directory
            • Sets file execution options in registry
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Checks whether UAC is enabled
            • Drops desktop.ini file(s)
            • Enumerates connected drives
            • Drops autorun.inf file
            • Drops file in System32 directory
            • Sets desktop wallpaper using registry
            • Drops file in Windows directory
            • Modifies Control Panel
            • Modifies Internet Explorer settings
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:1736
            • C:\Windows\Fonts\Admin 27 - 3 - 2024\smss.exe
              "C:\Windows\Fonts\Admin 27 - 3 - 2024\smss.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:2344
            • C:\Windows\Fonts\Admin 27 - 3 - 2024\Gaara.exe
              "C:\Windows\Fonts\Admin 27 - 3 - 2024\Gaara.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:1168
            • C:\Windows\Fonts\Admin 27 - 3 - 2024\csrss.exe
              "C:\Windows\Fonts\Admin 27 - 3 - 2024\csrss.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:648
            • C:\Windows\SysWOW64\drivers\Kazekage.exe
              C:\Windows\system32\drivers\Kazekage.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:572
            • C:\Windows\SysWOW64\drivers\system32.exe
              C:\Windows\system32\drivers\system32.exe
              6⤵
              • Modifies WinLogon for persistence
              • Modifies visibility of file extensions in Explorer
              • Modifies visiblity of hidden/system files in Explorer
              • UAC bypass
              • Disables RegEdit via registry modification
              • Drops file in Drivers directory
              • Sets file execution options in registry
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Checks whether UAC is enabled
              • Drops desktop.ini file(s)
              • Enumerates connected drives
              • Drops autorun.inf file
              • Drops file in System32 directory
              • Sets desktop wallpaper using registry
              • Drops file in Windows directory
              • Modifies Control Panel
              • Modifies Internet Explorer settings
              • Modifies registry class
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:532
              • C:\Windows\Fonts\Admin 27 - 3 - 2024\smss.exe
                "C:\Windows\Fonts\Admin 27 - 3 - 2024\smss.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:1400
              • C:\Windows\Fonts\Admin 27 - 3 - 2024\Gaara.exe
                "C:\Windows\Fonts\Admin 27 - 3 - 2024\Gaara.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:980
              • C:\Windows\Fonts\Admin 27 - 3 - 2024\csrss.exe
                "C:\Windows\Fonts\Admin 27 - 3 - 2024\csrss.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:1164
              • C:\Windows\SysWOW64\drivers\Kazekage.exe
                C:\Windows\system32\drivers\Kazekage.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1636
              • C:\Windows\SysWOW64\drivers\system32.exe
                C:\Windows\system32\drivers\system32.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:2268
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.rasasayang.com.my 65500
                7⤵
                • Runs ping.exe
                PID:2168
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.duniasex.com 65500
                7⤵
                • Runs ping.exe
                PID:2304
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.rasasayang.com.my 65500
                7⤵
                • Runs ping.exe
                PID:2296
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.duniasex.com 65500
                7⤵
                • Runs ping.exe
                PID:2172
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.rasasayang.com.my 65500
                7⤵
                • Runs ping.exe
                PID:1980
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.duniasex.com 65500
                7⤵
                • Runs ping.exe
                PID:1664
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.rasasayang.com.my 65500
              6⤵
              • Runs ping.exe
              PID:1052
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.duniasex.com 65500
              6⤵
              • Runs ping.exe
              PID:1916
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.rasasayang.com.my 65500
              6⤵
              • Runs ping.exe
              PID:1136
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.duniasex.com 65500
              6⤵
              • Runs ping.exe
              PID:1684
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.rasasayang.com.my 65500
              6⤵
              • Runs ping.exe
              PID:2604
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.duniasex.com 65500
              6⤵
              • Runs ping.exe
              PID:1084
          • C:\Windows\SysWOW64\drivers\system32.exe
            C:\Windows\system32\drivers\system32.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:976
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.rasasayang.com.my 65500
            5⤵
            • Runs ping.exe
            PID:108
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.duniasex.com 65500
            5⤵
            • Runs ping.exe
            PID:1992
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.rasasayang.com.my 65500
            5⤵
            • Runs ping.exe
            PID:888
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.duniasex.com 65500
            5⤵
            • Runs ping.exe
            PID:2960
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.rasasayang.com.my 65500
            5⤵
            • Runs ping.exe
            PID:1648
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.duniasex.com 65500
            5⤵
            • Runs ping.exe
            PID:1972
        • C:\Windows\SysWOW64\drivers\Kazekage.exe
          C:\Windows\system32\drivers\Kazekage.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1216
        • C:\Windows\SysWOW64\drivers\system32.exe
          C:\Windows\system32\drivers\system32.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1912
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          4⤵
          • Runs ping.exe
          PID:2284
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          4⤵
          • Runs ping.exe
          PID:1552
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          4⤵
          • Runs ping.exe
          PID:1992
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          4⤵
          • Runs ping.exe
          PID:884
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          4⤵
          • Runs ping.exe
          PID:2404
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          4⤵
          • Runs ping.exe
          PID:1536
      • C:\Windows\Fonts\Admin 27 - 3 - 2024\csrss.exe
        "C:\Windows\Fonts\Admin 27 - 3 - 2024\csrss.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:1532
      • C:\Windows\SysWOW64\drivers\Kazekage.exe
        C:\Windows\system32\drivers\Kazekage.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1236
      • C:\Windows\SysWOW64\drivers\system32.exe
        C:\Windows\system32\drivers\system32.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2420
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.rasasayang.com.my 65500
        3⤵
        • Runs ping.exe
        PID:2620
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.duniasex.com 65500
        3⤵
        • Runs ping.exe
        PID:1652
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.rasasayang.com.my 65500
        3⤵
        • Runs ping.exe
        PID:112
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.duniasex.com 65500
        3⤵
        • Runs ping.exe
        PID:1488
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.rasasayang.com.my 65500
        3⤵
        • Runs ping.exe
        PID:2800
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.duniasex.com 65500
        3⤵
        • Runs ping.exe
        PID:2108
    • C:\Windows\Fonts\Admin 27 - 3 - 2024\Gaara.exe
      "C:\Windows\Fonts\Admin 27 - 3 - 2024\Gaara.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:2300
    • C:\Windows\Fonts\Admin 27 - 3 - 2024\csrss.exe
      "C:\Windows\Fonts\Admin 27 - 3 - 2024\csrss.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2892
    • C:\Windows\SysWOW64\drivers\Kazekage.exe
      C:\Windows\system32\drivers\Kazekage.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2864
    • C:\Windows\SysWOW64\drivers\system32.exe
      C:\Windows\system32\drivers\system32.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2848
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.rasasayang.com.my 65500
      2⤵
      • Runs ping.exe
      PID:2464
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.duniasex.com 65500
      2⤵
      • Runs ping.exe
      PID:2500
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.rasasayang.com.my 65500
      2⤵
      • Runs ping.exe
      PID:1500
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.duniasex.com 65500
      2⤵
      • Runs ping.exe
      PID:1508
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.rasasayang.com.my 65500
      2⤵
      • Runs ping.exe
      PID:2156
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.duniasex.com 65500
      2⤵
      • Runs ping.exe
      PID:1368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Admin Games\Anbu Team Sampit (Nothing).exe

    Filesize

    54KB

    MD5

    2cc6c8259fa669ebf1c25a9713eef1f4

    SHA1

    eca28c01e2426c3cb88d746a9f6b0b3dbafe4a7e

    SHA256

    467214eb861a078e28b808c74fae6a41c7e91cdd0a90c01f991c93301beb1c81

    SHA512

    94956eea0b60de30bc0cb557a5039fd58b214a6b314296125f1c838e66179f51a3cc5d31a23ad5dc51fa5c6d4331d00eb78acd71708ca6491614a8a396592ba9

  • C:\Admin Games\Readme.txt

    Filesize

    736B

    MD5

    bb5d6abdf8d0948ac6895ce7fdfbc151

    SHA1

    9266b7a247a4685892197194d2b9b86c8f6dddbd

    SHA256

    5db2e0915b5464d32e83484f8ae5e3c73d2c78f238fde5f58f9b40dbb5322de8

    SHA512

    878444760e8df878d65bb62b4798177e168eb099def58ad3634f4348e96705c83f74324f9fa358f0eff389991976698a233ca53e9b72034ae11c86d42322a76c

  • C:\Autorun.inf

    Filesize

    196B

    MD5

    1564dfe69ffed40950e5cb644e0894d1

    SHA1

    201b6f7a01cc49bb698bea6d4945a082ed454ce4

    SHA256

    be114a2dbcc08540b314b01882aa836a772a883322a77b67aab31233e26dc184

    SHA512

    72df187e39674b657974392cfa268e71ef86dc101ebd2303896381ca56d3c05aa9db3f0ab7d0e428d7436e0108c8f19e94c2013814d30b0b95a23a6b9e341097

  • C:\Windows\Fonts\Admin 27 - 3 - 2024\Gaara.exe

    Filesize

    54KB

    MD5

    00414f2f993cbb2fd0dd6b3d2594b78f

    SHA1

    28022cebb4bcca831767e6e0d4f11d6d2b9bf1c0

    SHA256

    ad271f4a8dd54b08bc44a2c9beb9e2745c227c9f3495ae666c3e2516fb401f4d

    SHA512

    15c2e6633b35f929e25cefc524db47e2c9d1a6f6c2f280397b712df399a06d08cdd5cd975c5eb557d4041dbceb5faf36873c69567fa12d8c40082191333df581

  • C:\Windows\Fonts\Admin 27 - 3 - 2024\csrss.exe

    Filesize

    54KB

    MD5

    b3c95bda441be4f8bd5f4683597d7ab1

    SHA1

    3275db951b2b3b5c084e48c5db436a6cd0651572

    SHA256

    4b78a47cb22c60fd733a6ab0c0c5d67545ee472c90d52a9c62b0966e2f89e4b8

    SHA512

    6cae43cfcff2cdfffece61232a9612efc868b1391ed7a2a23faf1bfc4473a7bdc6f1ea2f0ccd4847e66a5041430c9bb1a371efcbff7d537042247a0614a2d331

  • C:\Windows\Fonts\Admin 27 - 3 - 2024\csrss.exe

    Filesize

    54KB

    MD5

    33ae7df5fe25355ef97e68fe977480dd

    SHA1

    3fc1713750d36117b4eed3c23787723154354dec

    SHA256

    c2381fc7edb515d63e5da3ba6f503d79581ecb16bf7ba0e5c3e7724e2ed6b24a

    SHA512

    659585fdc24b3e44ca5959757c1b7bf5f24b99fcc0baff95f167d94484238160241abf76c14064e7d9777a4250e4ebd00a42a5c00a3e219145c04dbf1cc45018

  • C:\Windows\Fonts\The Kazekage.jpg

    Filesize

    128KB

    MD5

    02770ec1a321e19ddd06cdb29d69ffe3

    SHA1

    d51b0b4d5de7a3c64dd320cfddd06614a2ab7af2

    SHA256

    72424cc8831eccd132639f5a2b6541c9bb2d638baf4397186a984bc353b7b579

    SHA512

    d816faa1abdee5c0879a4240b30abd156962a5dabb6d072bfcb84aae1d69d8c50ad8f8519db1db9a6fbdeee8a10c643f110800aed1c84957573501bcae178d4f

  • C:\Windows\Fonts\The Kazekage.jpg

    Filesize

    1.4MB

    MD5

    d6b05020d4a0ec2a3a8b687099e335df

    SHA1

    df239d830ebcd1cde5c68c46a7b76dad49d415f4

    SHA256

    9824b98dab6af65a9e84c2ea40e9df948f9766ce2096e81feecad7db8dd6080a

    SHA512

    78fd360faa4d34f5732056d6e9ad7b9930964441c69cf24535845d397de92179553b9377a25649c01eb5ac7d547c29cc964e69ede7f2af9fc677508a99251fff

  • C:\Windows\SysWOW64\27-3-2024.exe

    Filesize

    54KB

    MD5

    af6d0b435af55361d08e52ad5948ce2c

    SHA1

    2dd4b3aac320a2e0c0647bbad26a503241c19ff6

    SHA256

    9e504a2a52880eb0c8efb7b025ed5db63e3a8820c1a388d0594d04bafe35b040

    SHA512

    b11638093534a61e66fb3f58fc6adccb2f095c19a512fdb2c107551e22dc30a4670fcfa4032e2dcbefd109a3080278209fc5878c00f701c6dac04798438e6125

  • C:\Windows\SysWOW64\27-3-2024.exe

    Filesize

    54KB

    MD5

    e1320e182e072417d1604c2f1b66fafd

    SHA1

    0066138596c82e30acdafcaa434de95cf583ca78

    SHA256

    2b2b5b0f517f45b3b8023d76923c978bf79302959e055e72ab97c0cc041f5557

    SHA512

    5181b65637afb611fbfd933e3e2c8f0b1873152c7bc07e95ca28d02c22fe41b726f517e64b0e69ef106b04d3d788b046a035880332fc0558b8320d4c3246828d

  • C:\Windows\SysWOW64\27-3-2024.exe

    Filesize

    54KB

    MD5

    4fd8fb3387da7b04d5c494c005205e93

    SHA1

    054661154c458077dee9cfeb9cb72a0cf2d8ac1e

    SHA256

    2e16eefaa6568e6ebcc4a22d0d5b36b53db6d2d0c34397c01199d7d4fd496df7

    SHA512

    e967ed963d44c3f0ee184c663f165aa29cfa0c5b187a87add649c6b6a9287c0d8c6ead4e60cd16be1304367aacd7023b567a879ebf925ea58216f98652b3ae9d

  • C:\Windows\SysWOW64\27-3-2024.exe

    Filesize

    54KB

    MD5

    dcaa09e6ae1e39085ff56778bf8d25cb

    SHA1

    1e5ef210c028ef57c80e1d01a562939c3af8cc27

    SHA256

    2c666f9580dbea0619841c70cc840bb859f0812f421e0d1d3c164347948dd866

    SHA512

    8ac07bcd6c06f8ba6aa00bffe6c829ef41058a955b9a7b4d018b075d5bde78e77fc2bd54f611b37bc97475c5956b23973d8cfa674389f07435289a9c3c04ee81

  • C:\Windows\SysWOW64\27-3-2024.exe

    Filesize

    54KB

    MD5

    aa79176caf7160dd345054dd32647b85

    SHA1

    3cbb69693d454ad51b5fd2489c6be6ff517d57f5

    SHA256

    5bfc3a9abaa7f73f3f6a5e7242b26cb16fbd750e4ad6b17d5cfec91ea59e71f8

    SHA512

    dd395fd2574fe4c4e520a535036f1a1ab98d3372fa8d0b7c2322f016f78067062dbd6fd8301ecc18d6df95f8f75b625a6ad62e25065cfccd386a132521061ab4

  • C:\Windows\SysWOW64\Desktop.ini

    Filesize

    65B

    MD5

    64acfa7e03b01f48294cf30d201a0026

    SHA1

    10facd995b38a095f30b4a800fa454c0bcbf8438

    SHA256

    ba8159d865d106e7b4d0043007a63d1541e1de455dc8d7ff0edd3013bd425c62

    SHA512

    65a9b2e639de74a2a7faa83463a03f5f5b526495e3c793ec1e144c422ed0b842dd304cd5ff4f8aec3d76d826507030c5916f70a231429cea636ec2d8ab43931a

  • C:\Windows\SysWOW64\MSCOMCTL.OCX

    Filesize

    54KB

    MD5

    d219628f9f0798f6ec66d3f2faa0956e

    SHA1

    b79288ea4f47e939fd912d9abd864178eb45b1e4

    SHA256

    56e036431f2b53795ec3ad969d0f31716574cf5c360271c1283295704866601b

    SHA512

    21e0b5ffb0ee3063c7d775518f1d1aedd617d5c85a955c9c194980ca9e9ca81246eebb68b16bd8f891fdd856828a826dc19c30dfa3d1cae14ba8dc700a78e9b3

  • C:\Windows\SysWOW64\drivers\Kazekage.exe

    Filesize

    54KB

    MD5

    770aa2992fb21db8627e2a906253ae38

    SHA1

    cc22b3bae6be4ddf18c6c495d386823fc476a312

    SHA256

    ec959a0ebbbba1eced22d586e6b16bbbb3ac5621287aec74b491a4bbf26b6c78

    SHA512

    8b6365485ecf426a9f7bfcd9833dd4440a13196839d0dfa9736d02613de90ba09c696d1bbb0d101dcf195791a4ad900dabeec51053f01976a7a421347fd910dd

  • C:\Windows\SysWOW64\drivers\Kazekage.exe

    Filesize

    54KB

    MD5

    f2500543681108c52bcf77eb9eace892

    SHA1

    e5b3215b8c9eb0309ef84a7ece0b3f2a03ba3166

    SHA256

    fdc2413710c4ce4d9e0695ac9ff4bbd2507bc428d3f714e447a259b90f15cdc5

    SHA512

    ffd0aba332ebcac772ca25b14c5326330597abadb724c9fb9da96b26297c8aa2d86f28b279a41913bd081443af646440475ecbb3c3b007e1b6602fd796110295

  • C:\Windows\SysWOW64\drivers\Kazekage.exe

    Filesize

    54KB

    MD5

    6e1aab20f535e5f9ee51fd0d2610d940

    SHA1

    9abd268c96eedf00b6138bf41d4b0c2777d8df24

    SHA256

    ff99be4c7da5a72c15c48f3ca573b8ce20ec589c08cb16b4a66b0b9bf91586eb

    SHA512

    be4f4453eeb1e01d189b3c8269c636b3383433d61a4a965c500eefd7af3fb81c3b98eed1f56f18c9e468878177c18311c5004ac6d5c9b0e070fca7133032c47a

  • C:\Windows\SysWOW64\drivers\system32.exe

    Filesize

    54KB

    MD5

    1a0b35155a98cf583d7cda54fc667724

    SHA1

    467ce07408ff43d5374210a5788b4063ce169310

    SHA256

    b3c6566f0d43dae8bae0b30a4483421a264ce4e9eb3ec490cd6c4f18a6c46ad7

    SHA512

    c746d9010f357cfaf9da5bbf73bad558c11b1dbb258fe32b92c94bdd0c287898ac92dc5d1e58d7405d88dc735201162d86c127980568939fb38e8920cac960b4

  • C:\Windows\SysWOW64\drivers\system32.exe

    Filesize

    54KB

    MD5

    99e12d93e45501ac3353e5d3080c0415

    SHA1

    348738226b85bab40d27399263b2750b812774a8

    SHA256

    d85c37857c2f5312734edd5a5d8f876e1b0e70e82618077695aa93ee0017be1e

    SHA512

    3561a131966e1cbe7bf245143d761d3edb8fcd1c956bac6ae75afeba9de27714a892de6503ab89f9d6a2b9669fa9660751dd9238ee0aee24a57fd2e92c350841

  • C:\Windows\SysWOW64\drivers\system32.exe

    Filesize

    54KB

    MD5

    1f300faf191be147fcfd3cda10f7bb84

    SHA1

    f86f7d6f2e35fbcd6d8cb2b0e3bafe4081eee0d0

    SHA256

    67c78b23d16bb2a4999d6f57fd9f2245a59abf79cf84fd46247b4aa52fa77756

    SHA512

    9957676b68a8b9e16f4823cb88257a7cacc4b9f3133d6df818e2881544f1051720b5840404c2b3b25ff3e678124500f407e143403bf2635b06060fc1308f0d3f

  • C:\Windows\mscomctl.ocx

    Filesize

    54KB

    MD5

    1a1dbab61926a5b1d2cfffd64071046c

    SHA1

    2356834048e12cfcc1b0c9e2ad299af66f32d1f7

    SHA256

    bb3d37e69a4a975e0e3db3ad1407a1809c77322aa4361baa47b8ac1124476886

    SHA512

    e28248bad8b908eefd7aa51fe2feb669cd7df47feb54d5c4e01b738d3c6a047bb1a09d7eadf927059a7bb4e81f17d75f6704a4f0ada28505939b59c7ca496f57

  • C:\Windows\system\msvbvm60.dll

    Filesize

    1.3MB

    MD5

    5343a19c618bc515ceb1695586c6c137

    SHA1

    4dedae8cbde066f31c8e6b52c0baa3f8b1117742

    SHA256

    2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

    SHA512

    708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

  • F:\Admin Games\Anbu Team Sampit (Nothing).exe

    Filesize

    54KB

    MD5

    9b7625c35e506cae644ffa3acd9d6372

    SHA1

    86b2e06dd0ee0aa36b5fe5cc8070a210cac5c2d6

    SHA256

    5f27f337ccbf6d99c5026aab77886ed989e599d6c93d4105eeb1c17afccc44ce

    SHA512

    db13bb7233d516b9161a2b3252642b2bae658333f4f4bed6f5f65a3fa944933fb18e5c1923e6936a34193773fba4be74c4b01fc6bb0aa688510cb9b4cce653b6

  • \Windows\Fonts\Admin 27 - 3 - 2024\smss.exe

    Filesize

    54KB

    MD5

    df5b0fb30c070bff1eee3323044d7975

    SHA1

    c322a5c285c1ab224cb87d208741fc9585b83db5

    SHA256

    ec6a0ce61e76f66cbf19a449d6f4b7f9516aa7790f0dd60653b9f4e0c2581cc7

    SHA512

    f9500ad950a14a86e709e12034563d957bec72d7ce233237a087bd693c767120df471dff9f7736594a91d105a9cccf133f03ef3fc4b69d40b32818b58fb9750e

  • memory/532-261-0x0000000000490000-0x00000000004B4000-memory.dmp

    Filesize

    144KB

  • memory/532-243-0x0000000000020000-0x0000000000022000-memory.dmp

    Filesize

    8KB

  • memory/532-586-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/532-245-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/532-320-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/556-178-0x0000000000020000-0x0000000000022000-memory.dmp

    Filesize

    8KB

  • memory/556-183-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/572-239-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/572-235-0x0000000000020000-0x0000000000022000-memory.dmp

    Filesize

    8KB

  • memory/648-231-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/648-234-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/764-186-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/764-191-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/976-278-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/980-264-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/1164-265-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/1164-268-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/1168-227-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/1168-230-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/1216-282-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/1400-260-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/1400-257-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/1532-289-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/1636-271-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/1736-205-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/1736-585-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/1736-319-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/1912-286-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2040-138-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2044-82-0x0000000000020000-0x0000000000022000-memory.dmp

    Filesize

    8KB

  • memory/2044-86-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2044-81-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2268-272-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2268-275-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2280-79-0x0000000000320000-0x0000000000344000-memory.dmp

    Filesize

    144KB

  • memory/2280-316-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2280-42-0x0000000000020000-0x0000000000022000-memory.dmp

    Filesize

    8KB

  • memory/2280-424-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2280-861-0x0000000000320000-0x0000000000344000-memory.dmp

    Filesize

    144KB

  • memory/2280-41-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2284-193-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2284-199-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2300-302-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2300-298-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2344-226-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2392-303-0x0000000000300000-0x0000000000324000-memory.dmp

    Filesize

    144KB

  • memory/2392-38-0x0000000000300000-0x0000000000324000-memory.dmp

    Filesize

    144KB

  • memory/2392-310-0x0000000000300000-0x0000000000324000-memory.dmp

    Filesize

    144KB

  • memory/2392-40-0x0000000000300000-0x0000000000324000-memory.dmp

    Filesize

    144KB

  • memory/2392-423-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2392-0-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2392-860-0x0000000000300000-0x0000000000324000-memory.dmp

    Filesize

    144KB

  • memory/2392-315-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2392-1-0x0000000000020000-0x0000000000022000-memory.dmp

    Filesize

    8KB

  • memory/2420-295-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2436-134-0x00000000003B0000-0x00000000003D4000-memory.dmp

    Filesize

    144KB

  • memory/2436-279-0x00000000003B0000-0x00000000003D4000-memory.dmp

    Filesize

    144KB

  • memory/2436-317-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2436-94-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2436-583-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2436-127-0x00000000003B0000-0x00000000003D4000-memory.dmp

    Filesize

    144KB

  • memory/2436-868-0x00000000003B0000-0x00000000003D4000-memory.dmp

    Filesize

    144KB

  • memory/2436-283-0x00000000003B0000-0x00000000003D4000-memory.dmp

    Filesize

    144KB

  • memory/2524-132-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2732-584-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2732-175-0x0000000000350000-0x0000000000374000-memory.dmp

    Filesize

    144KB

  • memory/2732-148-0x0000000000020000-0x0000000000022000-memory.dmp

    Filesize

    8KB

  • memory/2732-146-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2732-318-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2848-314-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2864-307-0x0000000000020000-0x0000000000022000-memory.dmp

    Filesize

    8KB

  • memory/2864-311-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB