Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/03/2024, 23:57

General

  • Target

    c2381fc7edb515d63e5da3ba6f503d79581ecb16bf7ba0e5c3e7724e2ed6b24a.exe

  • Size

    54KB

  • MD5

    33ae7df5fe25355ef97e68fe977480dd

  • SHA1

    3fc1713750d36117b4eed3c23787723154354dec

  • SHA256

    c2381fc7edb515d63e5da3ba6f503d79581ecb16bf7ba0e5c3e7724e2ed6b24a

  • SHA512

    659585fdc24b3e44ca5959757c1b7bf5f24b99fcc0baff95f167d94484238160241abf76c14064e7d9777a4250e4ebd00a42a5c00a3e219145c04dbf1cc45018

  • SSDEEP

    1536:A7TJopblB4dqyyUiZ06pX3I6/qxiSEGNJFV:A7TQlatyYePxiFV

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • UAC bypass 3 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Drops file in Drivers directory 24 IoCs
  • Sets file execution options in registry 2 TTPs 64 IoCs
  • Executes dropped EXE 30 IoCs
  • Loads dropped DLL 18 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Drops desktop.ini file(s) 64 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 64 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 39 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 6 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies Control Panel 64 IoCs
  • Modifies Internet Explorer settings 1 TTPs 12 IoCs
  • Modifies registry class 51 IoCs
  • Runs ping.exe 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 31 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c2381fc7edb515d63e5da3ba6f503d79581ecb16bf7ba0e5c3e7724e2ed6b24a.exe
    "C:\Users\Admin\AppData\Local\Temp\c2381fc7edb515d63e5da3ba6f503d79581ecb16bf7ba0e5c3e7724e2ed6b24a.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • UAC bypass
    • Disables RegEdit via registry modification
    • Drops file in Drivers directory
    • Sets file execution options in registry
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:4632
    • C:\Windows\Fonts\Admin 27 - 3 - 2024\smss.exe
      "C:\Windows\Fonts\Admin 27 - 3 - 2024\smss.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • UAC bypass
      • Disables RegEdit via registry modification
      • Drops file in Drivers directory
      • Sets file execution options in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Sets desktop wallpaper using registry
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4088
      • C:\Windows\Fonts\Admin 27 - 3 - 2024\smss.exe
        "C:\Windows\Fonts\Admin 27 - 3 - 2024\smss.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:2128
      • C:\Windows\Fonts\Admin 27 - 3 - 2024\Gaara.exe
        "C:\Windows\Fonts\Admin 27 - 3 - 2024\Gaara.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • UAC bypass
        • Disables RegEdit via registry modification
        • Drops file in Drivers directory
        • Sets file execution options in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops desktop.ini file(s)
        • Enumerates connected drives
        • Drops autorun.inf file
        • Drops file in System32 directory
        • Sets desktop wallpaper using registry
        • Drops file in Windows directory
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:3008
        • C:\Windows\Fonts\Admin 27 - 3 - 2024\smss.exe
          "C:\Windows\Fonts\Admin 27 - 3 - 2024\smss.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:544
        • C:\Windows\Fonts\Admin 27 - 3 - 2024\Gaara.exe
          "C:\Windows\Fonts\Admin 27 - 3 - 2024\Gaara.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:1188
        • C:\Windows\Fonts\Admin 27 - 3 - 2024\csrss.exe
          "C:\Windows\Fonts\Admin 27 - 3 - 2024\csrss.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • UAC bypass
          • Disables RegEdit via registry modification
          • Drops file in Drivers directory
          • Sets file execution options in registry
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Drops desktop.ini file(s)
          • Enumerates connected drives
          • Drops autorun.inf file
          • Drops file in System32 directory
          • Sets desktop wallpaper using registry
          • Drops file in Windows directory
          • Modifies Control Panel
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:4892
          • C:\Windows\Fonts\Admin 27 - 3 - 2024\smss.exe
            "C:\Windows\Fonts\Admin 27 - 3 - 2024\smss.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:540
          • C:\Windows\Fonts\Admin 27 - 3 - 2024\Gaara.exe
            "C:\Windows\Fonts\Admin 27 - 3 - 2024\Gaara.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:528
          • C:\Windows\Fonts\Admin 27 - 3 - 2024\csrss.exe
            "C:\Windows\Fonts\Admin 27 - 3 - 2024\csrss.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:4552
          • C:\Windows\SysWOW64\drivers\Kazekage.exe
            C:\Windows\system32\drivers\Kazekage.exe
            5⤵
            • Modifies WinLogon for persistence
            • Modifies visibility of file extensions in Explorer
            • Modifies visiblity of hidden/system files in Explorer
            • UAC bypass
            • Disables RegEdit via registry modification
            • Drops file in Drivers directory
            • Sets file execution options in registry
            • Executes dropped EXE
            • Adds Run key to start application
            • Checks whether UAC is enabled
            • Drops desktop.ini file(s)
            • Enumerates connected drives
            • Drops autorun.inf file
            • Drops file in System32 directory
            • Sets desktop wallpaper using registry
            • Drops file in Windows directory
            • Modifies Control Panel
            • Modifies Internet Explorer settings
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:3476
            • C:\Windows\Fonts\Admin 27 - 3 - 2024\smss.exe
              "C:\Windows\Fonts\Admin 27 - 3 - 2024\smss.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:4440
            • C:\Windows\Fonts\Admin 27 - 3 - 2024\Gaara.exe
              "C:\Windows\Fonts\Admin 27 - 3 - 2024\Gaara.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:4216
            • C:\Windows\Fonts\Admin 27 - 3 - 2024\csrss.exe
              "C:\Windows\Fonts\Admin 27 - 3 - 2024\csrss.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:4756
            • C:\Windows\SysWOW64\drivers\Kazekage.exe
              C:\Windows\system32\drivers\Kazekage.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:2164
            • C:\Windows\SysWOW64\drivers\system32.exe
              C:\Windows\system32\drivers\system32.exe
              6⤵
              • Modifies WinLogon for persistence
              • Modifies visibility of file extensions in Explorer
              • Modifies visiblity of hidden/system files in Explorer
              • UAC bypass
              • Disables RegEdit via registry modification
              • Drops file in Drivers directory
              • Sets file execution options in registry
              • Executes dropped EXE
              • Adds Run key to start application
              • Checks whether UAC is enabled
              • Drops desktop.ini file(s)
              • Enumerates connected drives
              • Drops autorun.inf file
              • Drops file in System32 directory
              • Sets desktop wallpaper using registry
              • Drops file in Windows directory
              • Modifies Control Panel
              • Modifies Internet Explorer settings
              • Modifies registry class
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:2852
              • C:\Windows\Fonts\Admin 27 - 3 - 2024\smss.exe
                "C:\Windows\Fonts\Admin 27 - 3 - 2024\smss.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:5092
              • C:\Windows\Fonts\Admin 27 - 3 - 2024\Gaara.exe
                "C:\Windows\Fonts\Admin 27 - 3 - 2024\Gaara.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:2436
              • C:\Windows\Fonts\Admin 27 - 3 - 2024\csrss.exe
                "C:\Windows\Fonts\Admin 27 - 3 - 2024\csrss.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:1668
              • C:\Windows\SysWOW64\drivers\Kazekage.exe
                C:\Windows\system32\drivers\Kazekage.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:4000
              • C:\Windows\SysWOW64\drivers\system32.exe
                C:\Windows\system32\drivers\system32.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:4336
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.rasasayang.com.my 65500
                7⤵
                • Runs ping.exe
                PID:4016
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.duniasex.com 65500
                7⤵
                • Runs ping.exe
                PID:4880
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.rasasayang.com.my 65500
                7⤵
                • Runs ping.exe
                PID:1788
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.duniasex.com 65500
                7⤵
                • Runs ping.exe
                PID:1072
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.rasasayang.com.my 65500
                7⤵
                • Runs ping.exe
                PID:3764
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.duniasex.com 65500
                7⤵
                • Runs ping.exe
                PID:1044
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.rasasayang.com.my 65500
              6⤵
              • Runs ping.exe
              PID:2424
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.duniasex.com 65500
              6⤵
              • Runs ping.exe
              PID:1116
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.rasasayang.com.my 65500
              6⤵
              • Runs ping.exe
              PID:1584
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.duniasex.com 65500
              6⤵
              • Runs ping.exe
              PID:3492
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.rasasayang.com.my 65500
              6⤵
              • Runs ping.exe
              PID:1632
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.duniasex.com 65500
              6⤵
              • Runs ping.exe
              PID:2124
          • C:\Windows\SysWOW64\drivers\system32.exe
            C:\Windows\system32\drivers\system32.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:2564
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.rasasayang.com.my 65500
            5⤵
            • Runs ping.exe
            PID:4368
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.duniasex.com 65500
            5⤵
            • Runs ping.exe
            PID:404
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.rasasayang.com.my 65500
            5⤵
            • Runs ping.exe
            PID:4764
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.duniasex.com 65500
            5⤵
            • Runs ping.exe
            PID:4768
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.rasasayang.com.my 65500
            5⤵
            • Runs ping.exe
            PID:3580
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.duniasex.com 65500
            5⤵
            • Runs ping.exe
            PID:2896
        • C:\Windows\SysWOW64\drivers\Kazekage.exe
          C:\Windows\system32\drivers\Kazekage.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:4880
        • C:\Windows\SysWOW64\drivers\system32.exe
          C:\Windows\system32\drivers\system32.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:5100
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          4⤵
          • Runs ping.exe
          PID:2924
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          4⤵
          • Runs ping.exe
          PID:1224
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          4⤵
          • Runs ping.exe
          PID:4824
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          4⤵
          • Runs ping.exe
          PID:1580
      • C:\Windows\Fonts\Admin 27 - 3 - 2024\csrss.exe
        "C:\Windows\Fonts\Admin 27 - 3 - 2024\csrss.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:4272
      • C:\Windows\SysWOW64\drivers\Kazekage.exe
        C:\Windows\system32\drivers\Kazekage.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2848
      • C:\Windows\SysWOW64\drivers\system32.exe
        C:\Windows\system32\drivers\system32.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2888
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.rasasayang.com.my 65500
        3⤵
        • Runs ping.exe
        PID:3608
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.duniasex.com 65500
        3⤵
        • Runs ping.exe
        PID:2176
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.rasasayang.com.my 65500
        3⤵
        • Runs ping.exe
        PID:2948
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.duniasex.com 65500
        3⤵
        • Runs ping.exe
        PID:3964
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.rasasayang.com.my 65500
        3⤵
        • Runs ping.exe
        PID:1424
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.duniasex.com 65500
        3⤵
        • Runs ping.exe
        PID:2944
    • C:\Windows\Fonts\Admin 27 - 3 - 2024\Gaara.exe
      "C:\Windows\Fonts\Admin 27 - 3 - 2024\Gaara.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:2904
    • C:\Windows\Fonts\Admin 27 - 3 - 2024\csrss.exe
      "C:\Windows\Fonts\Admin 27 - 3 - 2024\csrss.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:3532
    • C:\Windows\SysWOW64\drivers\Kazekage.exe
      C:\Windows\system32\drivers\Kazekage.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4864
    • C:\Windows\SysWOW64\drivers\system32.exe
      C:\Windows\system32\drivers\system32.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:228
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.rasasayang.com.my 65500
      2⤵
      • Runs ping.exe
      PID:4416
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.duniasex.com 65500
      2⤵
      • Runs ping.exe
      PID:2540
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.rasasayang.com.my 65500
      2⤵
      • Runs ping.exe
      PID:1648
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.duniasex.com 65500
      2⤵
      • Runs ping.exe
      PID:3692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Admin Games\Hokage-Sampit (Nothing).exe

    Filesize

    54KB

    MD5

    f0b57f58caf23b9c5c759b680749163b

    SHA1

    6ae6073a373d9f04b86483c842301ccc3141a5c2

    SHA256

    0b9a0c16dc3f90798cdee0c1e111f1c6abd6f4a8b42e71c5bd05449782d1bcf0

    SHA512

    ff4dce1e11faa718da0aaeb0527d258ffa9b345c8d34cc8be5a07e2eee662d45dd1c4764c907c926c8433a0c05499f2f3204584586a3b9dbff7ac917060816ee

  • C:\Admin Games\Readme.txt

    Filesize

    736B

    MD5

    bb5d6abdf8d0948ac6895ce7fdfbc151

    SHA1

    9266b7a247a4685892197194d2b9b86c8f6dddbd

    SHA256

    5db2e0915b5464d32e83484f8ae5e3c73d2c78f238fde5f58f9b40dbb5322de8

    SHA512

    878444760e8df878d65bb62b4798177e168eb099def58ad3634f4348e96705c83f74324f9fa358f0eff389991976698a233ca53e9b72034ae11c86d42322a76c

  • C:\Autorun.inf

    Filesize

    196B

    MD5

    1564dfe69ffed40950e5cb644e0894d1

    SHA1

    201b6f7a01cc49bb698bea6d4945a082ed454ce4

    SHA256

    be114a2dbcc08540b314b01882aa836a772a883322a77b67aab31233e26dc184

    SHA512

    72df187e39674b657974392cfa268e71ef86dc101ebd2303896381ca56d3c05aa9db3f0ab7d0e428d7436e0108c8f19e94c2013814d30b0b95a23a6b9e341097

  • C:\Windows\Fonts\Admin 27 - 3 - 2024\Gaara.exe

    Filesize

    54KB

    MD5

    8a489b43cb3a4a3a5a893b35af6c9280

    SHA1

    e4eb2aa542084e233d6d83bcc4b295eb4b9d7cb8

    SHA256

    4e74fb08b361e64f603d6b832a11801a607de2f14dd9b341bd2bf9e3904b738c

    SHA512

    05626f49f1153d8a99170621a55708fed21448ff2fb576be77606725bf7c20614f8c233fe6e1fa129030204a020897743cbaa2b124c64a53a8f552de398319ab

  • C:\Windows\Fonts\Admin 27 - 3 - 2024\csrss.exe

    Filesize

    54KB

    MD5

    33ae7df5fe25355ef97e68fe977480dd

    SHA1

    3fc1713750d36117b4eed3c23787723154354dec

    SHA256

    c2381fc7edb515d63e5da3ba6f503d79581ecb16bf7ba0e5c3e7724e2ed6b24a

    SHA512

    659585fdc24b3e44ca5959757c1b7bf5f24b99fcc0baff95f167d94484238160241abf76c14064e7d9777a4250e4ebd00a42a5c00a3e219145c04dbf1cc45018

  • C:\Windows\Fonts\Admin 27 - 3 - 2024\csrss.exe

    Filesize

    54KB

    MD5

    9de2af19b47855a9eaf125fc5ed3bb7d

    SHA1

    54145b89b1e85d5df8a21fcd5a10c9610f973c57

    SHA256

    525df9bfb7bd9fc3c25fe768d5e3cb8fe3dd3cd6987201e6040ed337dcf265b6

    SHA512

    009ccc8e3d8fb1f13cce276cdbff890a01ed7e5c923e9801d3e877c83f35e657421d7652a1ea24d1905afe334bacf38c6bdda085c9f3b14d554286157c1875d8

  • C:\Windows\Fonts\Admin 27 - 3 - 2024\csrss.exe

    Filesize

    54KB

    MD5

    c9a37c0d193db6ea0abbc85f0ada2bfe

    SHA1

    29895a2e00b4ef8b96e69e6345567d339d1b1e65

    SHA256

    a2ab1db49fca9d3a41f85aee24cc903c314190f739a418ef3edff5b8612abfb1

    SHA512

    b6dade8efef05bc41384338596f3909ae654caaa667d8003afe2b6b99274af115b50a8c5c06ee1bc3ddc8f430993668671b2c60dfe0e06519ebfc1eaca60948d

  • C:\Windows\Fonts\Admin 27 - 3 - 2024\smss.exe

    Filesize

    54KB

    MD5

    28aea8adde73c8d5c6f8c2aba0bc249f

    SHA1

    ff4844c27a2f6dfa05f5f63f6c8abead60fd846c

    SHA256

    f6cd64bdcb667e7d458a2aa58c78345ebce7bd383100753dbff7390c83a25742

    SHA512

    32175c08fcc1041c1898c9e5d23dfe8e4f897532afe2cbe32840c62d27ccf059c0bae2f6d14bea9bfbb26170c01a99012729fef188e2778ecb80f8b21c7ff728

  • C:\Windows\Fonts\The Kazekage.jpg

    Filesize

    1.4MB

    MD5

    d6b05020d4a0ec2a3a8b687099e335df

    SHA1

    df239d830ebcd1cde5c68c46a7b76dad49d415f4

    SHA256

    9824b98dab6af65a9e84c2ea40e9df948f9766ce2096e81feecad7db8dd6080a

    SHA512

    78fd360faa4d34f5732056d6e9ad7b9930964441c69cf24535845d397de92179553b9377a25649c01eb5ac7d547c29cc964e69ede7f2af9fc677508a99251fff

  • C:\Windows\SysWOW64\27-3-2024.exe

    Filesize

    54KB

    MD5

    fd6ea7600d65a511a82808bf758797a7

    SHA1

    5e1169cb652b974d55bd2475a2cd71280addf074

    SHA256

    d20e969a1d4a20f7253e50bb4fd2f530b995328a1ca1065384451e02d5ba8bab

    SHA512

    542cb78d3053697b418310e9bf60cae7250b5a459f8353c03b420e517c1d1b98a1897e45a235a4589f99ca626bcf45943803f7400de202c9480f1929125f0ca5

  • C:\Windows\SysWOW64\27-3-2024.exe

    Filesize

    54KB

    MD5

    59530a58267fbb4fded54b6c6e5fcec6

    SHA1

    06d670ad7aa4dc0888b68dba563cf5956606ac10

    SHA256

    2234263b72d1128868ee215a5207a497b6cdad033465fb304ae410c8afe5c970

    SHA512

    9c98ff81e5a90ef8042cb327ae9189193ea2c41153bf1831cff037623cce82e305d2bc46746156c130ff9cbac2bd11bb9df45a71a96bbefd8ca2a716fec6073a

  • C:\Windows\SysWOW64\27-3-2024.exe

    Filesize

    54KB

    MD5

    01b89619b74f1d3df04956e7d68bac93

    SHA1

    40009a576d040830090dd0d70cffb46f60775af1

    SHA256

    856562d9a9f8d50f883e7b0f70cc5d90d527821ab587df9b4a6cde63c74da7cb

    SHA512

    5d6405fdae59189dc1112f2fca8ad0c78c72b9905e8d22a74fbe0ee8e52acd4bb0151f12c563ba1aa25143adb7d3fa0689fc5d1f1db9fbd77ca8880adadb5697

  • C:\Windows\SysWOW64\27-3-2024.exe

    Filesize

    54KB

    MD5

    e1320e182e072417d1604c2f1b66fafd

    SHA1

    0066138596c82e30acdafcaa434de95cf583ca78

    SHA256

    2b2b5b0f517f45b3b8023d76923c978bf79302959e055e72ab97c0cc041f5557

    SHA512

    5181b65637afb611fbfd933e3e2c8f0b1873152c7bc07e95ca28d02c22fe41b726f517e64b0e69ef106b04d3d788b046a035880332fc0558b8320d4c3246828d

  • C:\Windows\SysWOW64\27-3-2024.exe

    Filesize

    54KB

    MD5

    433c00f4d04ccaac5a87669ce44c1099

    SHA1

    2e26aa661d7519b0fb64a5b44cf6cac40e2af3a2

    SHA256

    09ef51251ead8a0f57ff4748b55a793c2ab97a45a59948a1d3efbec5ae0f288d

    SHA512

    a1ad6a1fe087ce208d87b07b325360714d4424a2c1969e553415e23c425d666a96f5af5791b46591c732fee0b1c675bb6ee1a6e32fdf9435c24d9b9f822ae7ef

  • C:\Windows\SysWOW64\27-3-2024.exe

    Filesize

    54KB

    MD5

    26f5c4b1d7b4a131f0ff971202889180

    SHA1

    773ac85c6d55ba84a105ac67b0c9ca7c5af711ac

    SHA256

    4110cbe4f205fe962e74c79199c6213ac481f38884fc146c8d35b1d0ab1858a5

    SHA512

    98fe9e06ab5b939d97e0db6cf55b8e48dccd6a3380433955213b52a585edbb29f02a64a2e14148dc0f7855c6931add0b8dea7e3c3ec13334292d93777780957d

  • C:\Windows\SysWOW64\Desktop.ini

    Filesize

    65B

    MD5

    64acfa7e03b01f48294cf30d201a0026

    SHA1

    10facd995b38a095f30b4a800fa454c0bcbf8438

    SHA256

    ba8159d865d106e7b4d0043007a63d1541e1de455dc8d7ff0edd3013bd425c62

    SHA512

    65a9b2e639de74a2a7faa83463a03f5f5b526495e3c793ec1e144c422ed0b842dd304cd5ff4f8aec3d76d826507030c5916f70a231429cea636ec2d8ab43931a

  • C:\Windows\SysWOW64\drivers\Kazekage.exe

    Filesize

    54KB

    MD5

    5c73a71d39cad95ef3d56bc4c1e38b78

    SHA1

    c5406f1d2c1f720adfa1de756ae7894110ac6945

    SHA256

    f8e4795e742652ed8edb37bed5d9fa80cc93087782c94beeec701ed84983552f

    SHA512

    100b30614e196c684c921ec7656c582175c088ba36786584fb954ab7b9ae83a2005041f84315a8969f1eada61d6a76371bbb984076b6034ac7f200ba998ba3c4

  • C:\Windows\SysWOW64\drivers\Kazekage.exe

    Filesize

    54KB

    MD5

    f2500543681108c52bcf77eb9eace892

    SHA1

    e5b3215b8c9eb0309ef84a7ece0b3f2a03ba3166

    SHA256

    fdc2413710c4ce4d9e0695ac9ff4bbd2507bc428d3f714e447a259b90f15cdc5

    SHA512

    ffd0aba332ebcac772ca25b14c5326330597abadb724c9fb9da96b26297c8aa2d86f28b279a41913bd081443af646440475ecbb3c3b007e1b6602fd796110295

  • C:\Windows\SysWOW64\drivers\Kazekage.exe

    Filesize

    54KB

    MD5

    acd9b87065e721adca3f87707a6f3988

    SHA1

    8dbbf37395c6520184eb568c732d362b52a39f0c

    SHA256

    11548f6eaf777bc601e1a90423f276bae5a51c50e9abdba827968ebf7de31b39

    SHA512

    5a9a1fbe482e02ca3051a4d599d84f30a2a9d416ce9d00ec049589ff57507c2acbe8c05cc2bab3f0f45ecc9e63b5056a9449d8289699facd90131daae3dcdc44

  • C:\Windows\SysWOW64\drivers\system32.exe

    Filesize

    54KB

    MD5

    c95a8f5617480141bd635e94bb861bfe

    SHA1

    a36f4ffd00e8a7df12cc4f924d1aae058dfdbbf9

    SHA256

    f3e382eba35103a09a7f22338ef3c3bdd39f202e4d1fc7383bb2d5acbc989ddc

    SHA512

    16a80ae4d5010c508865c6015996a76c0da4c3fb60a498e4f37a7fd64390788430da8e61b998b1b6babcc5c1cfedb600375326ab1684b3b8381396f008e255e0

  • C:\Windows\SysWOW64\drivers\system32.exe

    Filesize

    54KB

    MD5

    06b365e59c49b27ada297701d2c626cf

    SHA1

    75d8c165f0863ce867a341d8bdb1eabd754820fb

    SHA256

    2591fd384bbd66a1c93a5fb5c2ac8f3f23881caf54ee475612b38164477b186f

    SHA512

    41a271fdec074a7441b46336526a5de95e0539ed0a53500f1f9635f16783b572b15d6fef067c62acd15440271dfa6d6386863b786e45c93695387fcd556eab2b

  • C:\Windows\SysWOW64\drivers\system32.exe

    Filesize

    54KB

    MD5

    99e12d93e45501ac3353e5d3080c0415

    SHA1

    348738226b85bab40d27399263b2750b812774a8

    SHA256

    d85c37857c2f5312734edd5a5d8f876e1b0e70e82618077695aa93ee0017be1e

    SHA512

    3561a131966e1cbe7bf245143d761d3edb8fcd1c956bac6ae75afeba9de27714a892de6503ab89f9d6a2b9669fa9660751dd9238ee0aee24a57fd2e92c350841

  • C:\Windows\SysWOW64\drivers\system32.exe

    Filesize

    54KB

    MD5

    925a12633e9e62c952e14f9cb45109b9

    SHA1

    ec07ea52a871257751b03521010b586a3ad2ff22

    SHA256

    20369ade69bc72d82e0d0a7547339e48f8ce7f31ad21e7db841edbd69d3eed4e

    SHA512

    d1b2cdec75d2a413a774cb38598a524efc913e33c7337041ac5fc06f72deb9c5b32e8c66a1fc7934ef4ab50181d1f60f3978b22e3653df52efbc5e4976cb3048

  • C:\Windows\System\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • memory/228-296-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/528-165-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/544-112-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/1188-116-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/1188-123-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/1188-118-0x0000000000020000-0x0000000000022000-memory.dmp

    Filesize

    8KB

  • memory/2128-74-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2128-82-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2164-215-0x0000000000020000-0x0000000000022000-memory.dmp

    Filesize

    8KB

  • memory/2164-220-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2436-247-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2564-260-0x0000000000020000-0x0000000000022000-memory.dmp

    Filesize

    8KB

  • memory/2564-262-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2848-278-0x0000000000020000-0x0000000000022000-memory.dmp

    Filesize

    8KB

  • memory/2848-281-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2852-302-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2852-574-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2852-223-0x00000000001C0000-0x00000000001C2000-memory.dmp

    Filesize

    8KB

  • memory/2852-222-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2888-284-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2904-287-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/3008-530-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/3008-79-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/3008-80-0x00000000001C0000-0x00000000001C2000-memory.dmp

    Filesize

    8KB

  • memory/3008-299-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/3476-174-0x00000000001C0000-0x00000000001C2000-memory.dmp

    Filesize

    8KB

  • memory/3476-532-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/3476-301-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/3476-173-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/3532-290-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/4000-255-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/4000-252-0x0000000000020000-0x0000000000022000-memory.dmp

    Filesize

    8KB

  • memory/4000-251-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/4088-298-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/4088-37-0x00000000001E0000-0x00000000001E2000-memory.dmp

    Filesize

    8KB

  • memory/4088-529-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/4088-33-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/4216-203-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/4216-204-0x0000000000020000-0x0000000000022000-memory.dmp

    Filesize

    8KB

  • memory/4216-208-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/4272-274-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/4336-258-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/4440-201-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/4440-196-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/4552-169-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/4552-164-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/4552-166-0x00000000001E0000-0x00000000001E2000-memory.dmp

    Filesize

    8KB

  • memory/4632-297-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/4632-337-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/4632-0-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/4632-1-0x00000000001C0000-0x00000000001C2000-memory.dmp

    Filesize

    8KB

  • memory/4632-157-0x00000000001C0000-0x00000000001C2000-memory.dmp

    Filesize

    8KB

  • memory/4756-214-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/4756-210-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/4864-293-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/4880-268-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/4892-127-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/4892-300-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/4892-531-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/5092-241-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/5100-273-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/5100-269-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/5100-270-0x0000000000020000-0x0000000000022000-memory.dmp

    Filesize

    8KB