Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/05/2024, 20:18

General

  • Target

    349ee2c769c672dc70fc7d2a5e0d44c897066834a7872d813257df43cd67721c.exe

  • Size

    148KB

  • MD5

    4e16157e70437e950eb4b1137af5777d

  • SHA1

    0ef6e1ebfabf172f6f594c463a42fa8123c36fba

  • SHA256

    349ee2c769c672dc70fc7d2a5e0d44c897066834a7872d813257df43cd67721c

  • SHA512

    44b7eebb7d22fce31499678cb30feeae7843a8a241da5dab9a1044ea9bfc919155f4bf929341c45d52b461fa6c9e35d0afd1e6fdcb7a262fef024d7cd0a6df03

  • SSDEEP

    1536:jJo0IHgL2AHfb1mzaFXg+xsukl4Y17jsgS/jHagQNuXGpeVTV:Nx6AHjYzaFXg+w17jsgS/jHagQg19V

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • UAC bypass 3 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Drops file in Drivers directory 24 IoCs
  • Sets file execution options in registry 2 TTPs 64 IoCs
  • Executes dropped EXE 30 IoCs
  • Loads dropped DLL 18 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Drops desktop.ini file(s) 64 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 64 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 39 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 6 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies Control Panel 64 IoCs
  • Modifies Internet Explorer settings 1 TTPs 12 IoCs
  • Modifies registry class 51 IoCs
  • Runs ping.exe 1 TTPs 30 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 31 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\349ee2c769c672dc70fc7d2a5e0d44c897066834a7872d813257df43cd67721c.exe
    "C:\Users\Admin\AppData\Local\Temp\349ee2c769c672dc70fc7d2a5e0d44c897066834a7872d813257df43cd67721c.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • UAC bypass
    • Disables RegEdit via registry modification
    • Drops file in Drivers directory
    • Sets file execution options in registry
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1400
    • C:\Windows\Fonts\Admin 29 - 5 - 2024\smss.exe
      "C:\Windows\Fonts\Admin 29 - 5 - 2024\smss.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • UAC bypass
      • Disables RegEdit via registry modification
      • Drops file in Drivers directory
      • Sets file execution options in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Sets desktop wallpaper using registry
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2604
      • C:\Windows\Fonts\Admin 29 - 5 - 2024\smss.exe
        "C:\Windows\Fonts\Admin 29 - 5 - 2024\smss.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:3372
      • C:\Windows\Fonts\Admin 29 - 5 - 2024\Gaara.exe
        "C:\Windows\Fonts\Admin 29 - 5 - 2024\Gaara.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • UAC bypass
        • Disables RegEdit via registry modification
        • Drops file in Drivers directory
        • Sets file execution options in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops desktop.ini file(s)
        • Enumerates connected drives
        • Drops autorun.inf file
        • Drops file in System32 directory
        • Sets desktop wallpaper using registry
        • Drops file in Windows directory
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:4084
        • C:\Windows\Fonts\Admin 29 - 5 - 2024\smss.exe
          "C:\Windows\Fonts\Admin 29 - 5 - 2024\smss.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:3736
        • C:\Windows\Fonts\Admin 29 - 5 - 2024\Gaara.exe
          "C:\Windows\Fonts\Admin 29 - 5 - 2024\Gaara.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:1392
        • C:\Windows\Fonts\Admin 29 - 5 - 2024\csrss.exe
          "C:\Windows\Fonts\Admin 29 - 5 - 2024\csrss.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • UAC bypass
          • Disables RegEdit via registry modification
          • Drops file in Drivers directory
          • Sets file execution options in registry
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Drops desktop.ini file(s)
          • Enumerates connected drives
          • Drops autorun.inf file
          • Drops file in System32 directory
          • Sets desktop wallpaper using registry
          • Drops file in Windows directory
          • Modifies Control Panel
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:3768
          • C:\Windows\Fonts\Admin 29 - 5 - 2024\smss.exe
            "C:\Windows\Fonts\Admin 29 - 5 - 2024\smss.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:2252
          • C:\Windows\Fonts\Admin 29 - 5 - 2024\Gaara.exe
            "C:\Windows\Fonts\Admin 29 - 5 - 2024\Gaara.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:2988
          • C:\Windows\Fonts\Admin 29 - 5 - 2024\csrss.exe
            "C:\Windows\Fonts\Admin 29 - 5 - 2024\csrss.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:2844
          • C:\Windows\SysWOW64\drivers\Kazekage.exe
            C:\Windows\system32\drivers\Kazekage.exe
            5⤵
            • Modifies WinLogon for persistence
            • Modifies visibility of file extensions in Explorer
            • Modifies visiblity of hidden/system files in Explorer
            • UAC bypass
            • Disables RegEdit via registry modification
            • Drops file in Drivers directory
            • Sets file execution options in registry
            • Executes dropped EXE
            • Adds Run key to start application
            • Checks whether UAC is enabled
            • Drops desktop.ini file(s)
            • Enumerates connected drives
            • Drops autorun.inf file
            • Drops file in System32 directory
            • Sets desktop wallpaper using registry
            • Drops file in Windows directory
            • Modifies Control Panel
            • Modifies Internet Explorer settings
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:3144
            • C:\Windows\Fonts\Admin 29 - 5 - 2024\smss.exe
              "C:\Windows\Fonts\Admin 29 - 5 - 2024\smss.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:2280
            • C:\Windows\Fonts\Admin 29 - 5 - 2024\Gaara.exe
              "C:\Windows\Fonts\Admin 29 - 5 - 2024\Gaara.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:4752
            • C:\Windows\Fonts\Admin 29 - 5 - 2024\csrss.exe
              "C:\Windows\Fonts\Admin 29 - 5 - 2024\csrss.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:1572
            • C:\Windows\SysWOW64\drivers\Kazekage.exe
              C:\Windows\system32\drivers\Kazekage.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:5072
            • C:\Windows\SysWOW64\drivers\system32.exe
              C:\Windows\system32\drivers\system32.exe
              6⤵
              • Modifies WinLogon for persistence
              • Modifies visibility of file extensions in Explorer
              • Modifies visiblity of hidden/system files in Explorer
              • UAC bypass
              • Disables RegEdit via registry modification
              • Drops file in Drivers directory
              • Sets file execution options in registry
              • Executes dropped EXE
              • Adds Run key to start application
              • Checks whether UAC is enabled
              • Drops desktop.ini file(s)
              • Enumerates connected drives
              • Drops autorun.inf file
              • Drops file in System32 directory
              • Sets desktop wallpaper using registry
              • Drops file in Windows directory
              • Modifies Control Panel
              • Modifies Internet Explorer settings
              • Modifies registry class
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:4168
              • C:\Windows\Fonts\Admin 29 - 5 - 2024\smss.exe
                "C:\Windows\Fonts\Admin 29 - 5 - 2024\smss.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:1220
              • C:\Windows\Fonts\Admin 29 - 5 - 2024\Gaara.exe
                "C:\Windows\Fonts\Admin 29 - 5 - 2024\Gaara.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:4868
              • C:\Windows\Fonts\Admin 29 - 5 - 2024\csrss.exe
                "C:\Windows\Fonts\Admin 29 - 5 - 2024\csrss.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:2648
              • C:\Windows\SysWOW64\drivers\Kazekage.exe
                C:\Windows\system32\drivers\Kazekage.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:3220
              • C:\Windows\SysWOW64\drivers\system32.exe
                C:\Windows\system32\drivers\system32.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:4520
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.rasasayang.com.my 65500
                7⤵
                • Runs ping.exe
                PID:2016
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.duniasex.com 65500
                7⤵
                • Runs ping.exe
                PID:5100
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.rasasayang.com.my 65500
                7⤵
                • Runs ping.exe
                PID:3192
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.duniasex.com 65500
                7⤵
                • Runs ping.exe
                PID:4608
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.rasasayang.com.my 65500
              6⤵
              • Runs ping.exe
              PID:1224
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.duniasex.com 65500
              6⤵
              • Runs ping.exe
              PID:1920
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.rasasayang.com.my 65500
              6⤵
              • Runs ping.exe
              PID:4472
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.duniasex.com 65500
              6⤵
              • Runs ping.exe
              PID:1624
          • C:\Windows\SysWOW64\drivers\system32.exe
            C:\Windows\system32\drivers\system32.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:1580
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.rasasayang.com.my 65500
            5⤵
            • Runs ping.exe
            PID:4504
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.duniasex.com 65500
            5⤵
            • Runs ping.exe
            PID:2444
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.rasasayang.com.my 65500
            5⤵
            • Runs ping.exe
            PID:3212
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.duniasex.com 65500
            5⤵
            • Runs ping.exe
            PID:3372
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.rasasayang.com.my 65500
            5⤵
            • Runs ping.exe
            PID:1628
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.duniasex.com 65500
            5⤵
            • Runs ping.exe
            PID:5052
        • C:\Windows\SysWOW64\drivers\Kazekage.exe
          C:\Windows\system32\drivers\Kazekage.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:2916
        • C:\Windows\SysWOW64\drivers\system32.exe
          C:\Windows\system32\drivers\system32.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1452
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          4⤵
          • Runs ping.exe
          PID:4108
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          4⤵
          • Runs ping.exe
          PID:3272
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          4⤵
          • Runs ping.exe
          PID:2692
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          4⤵
          • Runs ping.exe
          PID:5004
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          4⤵
          • Runs ping.exe
          PID:1548
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          4⤵
          • Runs ping.exe
          PID:1160
      • C:\Windows\Fonts\Admin 29 - 5 - 2024\csrss.exe
        "C:\Windows\Fonts\Admin 29 - 5 - 2024\csrss.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:2904
      • C:\Windows\SysWOW64\drivers\Kazekage.exe
        C:\Windows\system32\drivers\Kazekage.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3308
      • C:\Windows\SysWOW64\drivers\system32.exe
        C:\Windows\system32\drivers\system32.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3360
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.rasasayang.com.my 65500
        3⤵
        • Runs ping.exe
        PID:1160
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.duniasex.com 65500
        3⤵
        • Runs ping.exe
        PID:752
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.rasasayang.com.my 65500
        3⤵
        • Runs ping.exe
        PID:892
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.duniasex.com 65500
        3⤵
        • Runs ping.exe
        PID:3496
    • C:\Windows\Fonts\Admin 29 - 5 - 2024\Gaara.exe
      "C:\Windows\Fonts\Admin 29 - 5 - 2024\Gaara.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:396
    • C:\Windows\Fonts\Admin 29 - 5 - 2024\csrss.exe
      "C:\Windows\Fonts\Admin 29 - 5 - 2024\csrss.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:4196
    • C:\Windows\SysWOW64\drivers\Kazekage.exe
      C:\Windows\system32\drivers\Kazekage.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1624
    • C:\Windows\SysWOW64\drivers\system32.exe
      C:\Windows\system32\drivers\system32.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1504
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.rasasayang.com.my 65500
      2⤵
      • Runs ping.exe
      PID:3308
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.duniasex.com 65500
      2⤵
      • Runs ping.exe
      PID:4036
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.rasasayang.com.my 65500
      2⤵
      • Runs ping.exe
      PID:1548
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.duniasex.com 65500
      2⤵
      • Runs ping.exe
      PID:3376
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.rasasayang.com.my 65500
      2⤵
      • Runs ping.exe
      PID:1176
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.duniasex.com 65500
      2⤵
      • Runs ping.exe
      PID:3092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Admin Games\Readme.txt

    Filesize

    736B

    MD5

    bb5d6abdf8d0948ac6895ce7fdfbc151

    SHA1

    9266b7a247a4685892197194d2b9b86c8f6dddbd

    SHA256

    5db2e0915b5464d32e83484f8ae5e3c73d2c78f238fde5f58f9b40dbb5322de8

    SHA512

    878444760e8df878d65bb62b4798177e168eb099def58ad3634f4348e96705c83f74324f9fa358f0eff389991976698a233ca53e9b72034ae11c86d42322a76c

  • C:\Autorun.inf

    Filesize

    196B

    MD5

    1564dfe69ffed40950e5cb644e0894d1

    SHA1

    201b6f7a01cc49bb698bea6d4945a082ed454ce4

    SHA256

    be114a2dbcc08540b314b01882aa836a772a883322a77b67aab31233e26dc184

    SHA512

    72df187e39674b657974392cfa268e71ef86dc101ebd2303896381ca56d3c05aa9db3f0ab7d0e428d7436e0108c8f19e94c2013814d30b0b95a23a6b9e341097

  • C:\Windows\Fonts\Admin 29 - 5 - 2024\Gaara.exe

    Filesize

    148KB

    MD5

    e7227fe1e934295f9cff905888f1e321

    SHA1

    c7526749d9bc47906ea029525e53882defdf8fe7

    SHA256

    af2377630e0288a66be1f527a2a347fb4c419fb10b3d38f546285be5709db0e0

    SHA512

    cd6d1395914652ab92f529c65a6b8234020125ca1ca2c1de7dd679965f5efb72c54991e76218ec4c42fcdfc434e648c88039231bd8780f208a313603d6e85714

  • C:\Windows\Fonts\Admin 29 - 5 - 2024\csrss.exe

    Filesize

    148KB

    MD5

    cb36b6c3957ba68adf18c5ea91e01606

    SHA1

    8985eb673f3888f967d515fbd26f3807e81c4020

    SHA256

    0c8d57cf80a2d4e21b46444cdbba1c6838487e6e79807f246ef4df69cf71cafc

    SHA512

    ef24ddd2d55d44ae5103ff7a644b9c44d835064c537ba533eca09b51cf5411f3dcc4a5923b8ee5d49922cbfb93224b43175ea3e298022d9b60d01a02102e49eb

  • C:\Windows\Fonts\Admin 29 - 5 - 2024\csrss.exe

    Filesize

    148KB

    MD5

    7bbd7604920f5e8485812b7b7f7aa888

    SHA1

    03483dfef5c65386f797a065cbb07a12e606d2ae

    SHA256

    ebda3d61af52b276db8b34fec3557b3dec09b3aa353702b646d832a022fea422

    SHA512

    ee043e44d711008339cf80e5118e76cc1aabd37ab7006e6a9b99526e3e285a07b4b806ab89bf599679627251256c143b5ff15ae260679c6ef7ba3fd61879f9d3

  • C:\Windows\Fonts\Admin 29 - 5 - 2024\smss.exe

    Filesize

    148KB

    MD5

    f9c394d47949f4ccc5abe636f5aff815

    SHA1

    277b55b63f17d1d4181abf78cc475ad74582dd03

    SHA256

    675395d4dc2d3ff62b8e32b264cd93cb9a50592b7567700e65e168f46ff86576

    SHA512

    91230d18e7d36d7a2def9c409ffb34fb0a799b42d66a8e445fe32f23567305e418f3a166222b2e567fb5371bca6a6955f67a8577c159e9a8239af15b20d53c6c

  • C:\Windows\Fonts\The Kazekage.jpg

    Filesize

    1.4MB

    MD5

    d6b05020d4a0ec2a3a8b687099e335df

    SHA1

    df239d830ebcd1cde5c68c46a7b76dad49d415f4

    SHA256

    9824b98dab6af65a9e84c2ea40e9df948f9766ce2096e81feecad7db8dd6080a

    SHA512

    78fd360faa4d34f5732056d6e9ad7b9930964441c69cf24535845d397de92179553b9377a25649c01eb5ac7d547c29cc964e69ede7f2af9fc677508a99251fff

  • C:\Windows\SysWOW64\29-5-2024.exe

    Filesize

    148KB

    MD5

    8c7abda9682a08f61b5feb5271ed8eed

    SHA1

    e416c7f3d7a478bb1ac6bc63ec1a1a56b11d2326

    SHA256

    e3b26e75414b551d3fa77d0dadcf57ef937440596ee5339aeaebd2d46994aa1f

    SHA512

    84b491460f4442c1d975c068f53baf7447fca07bacb77857a5f0b2e7c952e48cbbc7e6a61128bb2fcb27da916264f4c071adffb8936a89a9c593f4b0176ec4a0

  • C:\Windows\SysWOW64\29-5-2024.exe

    Filesize

    148KB

    MD5

    23d42f4b74eca1193be21574dac226ec

    SHA1

    e74ff8baf4e40f29aba0f91e3987a75fa8e35d48

    SHA256

    38abee2def3b1c42ff29af15f32ec99646420fd004e03de119fb9da0d2f1b339

    SHA512

    57ab9532bec693b911009c3b905ff186c2b2d5d5998baa60d03a25629b8fb9a3b7ef1ff098af979fe9cd7bf5a8e20ce41f06dde33dfa4aef52741a410f1dd2da

  • C:\Windows\SysWOW64\29-5-2024.exe

    Filesize

    148KB

    MD5

    9f02ae35262afbd32d68c7086db4c22a

    SHA1

    8ba4ee4acc533d5d245a467db604ab0d43f5bd5b

    SHA256

    3bf48d8c9fa0306bef431e6105090f214287aa1842ad3733aea3646b8259cbe3

    SHA512

    a3375fba2d90657df3b743dc2c4046f4d962f1ffc95ee6577aec769416dab9a46e6e1cbc98a1a2470c2657b2346c145919d720288ee12e6d633a5255afafe651

  • C:\Windows\SysWOW64\29-5-2024.exe

    Filesize

    148KB

    MD5

    f656ab7e32e047fcbf93cc1d87209dc2

    SHA1

    e5734ba7a00130a56b12a4559e69c644725ae0c8

    SHA256

    d3d98f33974c2ab13ae7b76a503bd7a678b6fe9a0c07826853160d4d38800c80

    SHA512

    c45eaafcb543a5b5278af854784f637757fa1798986c9964981bf8a6cbe9e259dbf5256627f8148f3aa573cca7b9f3825281419183932fe2fd3c0735c1dcb278

  • C:\Windows\SysWOW64\Desktop.ini

    Filesize

    65B

    MD5

    64acfa7e03b01f48294cf30d201a0026

    SHA1

    10facd995b38a095f30b4a800fa454c0bcbf8438

    SHA256

    ba8159d865d106e7b4d0043007a63d1541e1de455dc8d7ff0edd3013bd425c62

    SHA512

    65a9b2e639de74a2a7faa83463a03f5f5b526495e3c793ec1e144c422ed0b842dd304cd5ff4f8aec3d76d826507030c5916f70a231429cea636ec2d8ab43931a

  • C:\Windows\SysWOW64\drivers\Kazekage.exe

    Filesize

    148KB

    MD5

    897e6e2c265164ee3579a3570c8d2c6c

    SHA1

    ead47cd287574274866b6b809cc1c667f8a8f4da

    SHA256

    12c3a3cbd446326ace463d04887eb6c3f2d2df19e3bf7840307b67f1e4dbb4f9

    SHA512

    a2c754c100ec950db7df5596455424ab0dc57a1dbdb20697f36306883cee93ab896cb2a8458d01feb203df0dcd9084195a47e7d1da22913be87329dd7ef80b01

  • C:\Windows\SysWOW64\drivers\Kazekage.exe

    Filesize

    148KB

    MD5

    a63acabac108a9a447cf2755dac66de6

    SHA1

    31786dbbe547ba82de236460024398a31b9dafc9

    SHA256

    868bb284799f3b81bd080b15e5ba15e2cb23b19619c7248581f667b36d4d7680

    SHA512

    d6e6a246c67034a81654d66210fe50cc0fa7a3ec4b22cb0b50124535ae384b9e9716968a5ce8e9b5de9c84983c48b12c44521944c2452fdf31146dc4c0d8ede4

  • C:\Windows\SysWOW64\drivers\system32.exe

    Filesize

    148KB

    MD5

    6c2680e8c5536380c72f0d8f5e5517aa

    SHA1

    b0bdaf2f03bba52f19721b5dda02cf081f86afd5

    SHA256

    85a114fc75a8d780af8b53723c8d0aa9ad05ae58273b8c115f8f2ad85969e031

    SHA512

    29b9aabc465074904c8bbbb720ddd3b33b6d4b56ae7271046386adb3a7eb4e0656395dcf8d3a8a021516e06baf3b0155b746daa81a0e972bbf57bcd3e4bc3ee3

  • C:\Windows\SysWOW64\drivers\system32.exe

    Filesize

    148KB

    MD5

    78eac3c335819ef1f241122f9039569b

    SHA1

    3c07d50f86d7ad3306c3049d874168f00fe66d68

    SHA256

    1ac60c316969abf8e0f375f97f7c889cc0d8caed1e2fc5910abcff99eb0dcd55

    SHA512

    53eec9ab71b020443b9ca52ec8ea6bfc7b0c58b42ac573fb690969b42bbb15855f3b5ad86534402ec1663ce11a029686028665cb3a5825c205c5f3d885282759

  • C:\Windows\SysWOW64\drivers\system32.exe

    Filesize

    148KB

    MD5

    e60a747845ad8174ce9d23acbcddaae8

    SHA1

    ba11214e04007faa6629cd0f38056457f803fc1c

    SHA256

    03019ec381aab4e0492f5a1cf2e030ef2ab58249188e31aa03d9325647c8bec6

    SHA512

    87172914d51a60791531ebd191ca75343db13d082bbdf6087593392a868ff74479f5bc98963c4ef7b23c9aff89fc256d74436f62d482de7631d53a228f733f2b

  • C:\Windows\System\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • F:\Gaara.exe

    Filesize

    148KB

    MD5

    4e16157e70437e950eb4b1137af5777d

    SHA1

    0ef6e1ebfabf172f6f594c463a42fa8123c36fba

    SHA256

    349ee2c769c672dc70fc7d2a5e0d44c897066834a7872d813257df43cd67721c

    SHA512

    44b7eebb7d22fce31499678cb30feeae7843a8a241da5dab9a1044ea9bfc919155f4bf929341c45d52b461fa6c9e35d0afd1e6fdcb7a262fef024d7cd0a6df03

  • memory/396-267-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1220-230-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1392-121-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1400-941-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1400-0-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1452-256-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1504-276-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1572-202-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1580-247-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1624-273-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2252-154-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2252-150-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2280-193-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2604-942-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2604-32-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2648-237-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2648-233-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2844-165-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2916-253-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2988-159-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2988-153-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/3144-945-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/3144-164-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/3220-241-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/3308-261-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/3360-264-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/3372-71-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/3372-78-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/3736-113-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/3768-120-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/3768-944-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/4084-943-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/4084-75-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/4168-209-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/4196-270-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/4520-244-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/4520-240-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/4752-197-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/4868-234-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/5072-207-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/5072-203-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB