Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-08-2024 22:03

General

  • Target

    9469e78f405795ec4c02ce5d9b479bf0N.exe

  • Size

    148KB

  • MD5

    9469e78f405795ec4c02ce5d9b479bf0

  • SHA1

    fda420f07893db4e065b7249fb7e9d16a72e53ea

  • SHA256

    22bbdb6b0fe902df3383ccf29d6047c5f104036316e67d5fd6adc82b68a99a0f

  • SHA512

    4774c113756f0a7ff363a0b0bfdf865e5b627a404844907a6ea147878506a6d27237e221139ed240089191a3896baa717ba79b9c8d33e18f787d08a254884416

  • SSDEEP

    1536:IJo0IHgL2AHfb1mzaFXg+xsukl4Y17jsgS/jHagQNuXGpeVTV:sx6AHjYzaFXg+w17jsgS/jHagQg19V

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • UAC bypass 3 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Drops file in Drivers directory 24 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
  • Executes dropped EXE 30 IoCs
  • Loads dropped DLL 18 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Drops desktop.ini file(s) 64 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 64 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 39 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 6 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 53 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 22 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies Control Panel 64 IoCs
  • Modifies Internet Explorer settings 1 TTPs 12 IoCs
  • Modifies registry class 51 IoCs
  • Runs ping.exe 1 TTPs 22 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 31 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9469e78f405795ec4c02ce5d9b479bf0N.exe
    "C:\Users\Admin\AppData\Local\Temp\9469e78f405795ec4c02ce5d9b479bf0N.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • UAC bypass
    • Disables RegEdit via registry modification
    • Drops file in Drivers directory
    • Event Triggered Execution: Image File Execution Options Injection
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:324
    • C:\Windows\Fonts\Admin 22 - 8 - 2024\smss.exe
      "C:\Windows\Fonts\Admin 22 - 8 - 2024\smss.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • UAC bypass
      • Disables RegEdit via registry modification
      • Drops file in Drivers directory
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Sets desktop wallpaper using registry
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1948
      • C:\Windows\Fonts\Admin 22 - 8 - 2024\smss.exe
        "C:\Windows\Fonts\Admin 22 - 8 - 2024\smss.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1892
      • C:\Windows\Fonts\Admin 22 - 8 - 2024\Gaara.exe
        "C:\Windows\Fonts\Admin 22 - 8 - 2024\Gaara.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • UAC bypass
        • Disables RegEdit via registry modification
        • Drops file in Drivers directory
        • Event Triggered Execution: Image File Execution Options Injection
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops desktop.ini file(s)
        • Enumerates connected drives
        • Drops autorun.inf file
        • Drops file in System32 directory
        • Sets desktop wallpaper using registry
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:2668
        • C:\Windows\Fonts\Admin 22 - 8 - 2024\smss.exe
          "C:\Windows\Fonts\Admin 22 - 8 - 2024\smss.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:4044
        • C:\Windows\Fonts\Admin 22 - 8 - 2024\Gaara.exe
          "C:\Windows\Fonts\Admin 22 - 8 - 2024\Gaara.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:880
        • C:\Windows\Fonts\Admin 22 - 8 - 2024\csrss.exe
          "C:\Windows\Fonts\Admin 22 - 8 - 2024\csrss.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • UAC bypass
          • Disables RegEdit via registry modification
          • Drops file in Drivers directory
          • Event Triggered Execution: Image File Execution Options Injection
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Drops desktop.ini file(s)
          • Enumerates connected drives
          • Drops autorun.inf file
          • Drops file in System32 directory
          • Sets desktop wallpaper using registry
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Modifies Control Panel
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:532
          • C:\Windows\Fonts\Admin 22 - 8 - 2024\smss.exe
            "C:\Windows\Fonts\Admin 22 - 8 - 2024\smss.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2772
          • C:\Windows\Fonts\Admin 22 - 8 - 2024\Gaara.exe
            "C:\Windows\Fonts\Admin 22 - 8 - 2024\Gaara.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2036
          • C:\Windows\Fonts\Admin 22 - 8 - 2024\csrss.exe
            "C:\Windows\Fonts\Admin 22 - 8 - 2024\csrss.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:4560
          • C:\Windows\SysWOW64\drivers\Kazekage.exe
            C:\Windows\system32\drivers\Kazekage.exe
            5⤵
            • Modifies WinLogon for persistence
            • Modifies visibility of file extensions in Explorer
            • Modifies visiblity of hidden/system files in Explorer
            • UAC bypass
            • Disables RegEdit via registry modification
            • Drops file in Drivers directory
            • Event Triggered Execution: Image File Execution Options Injection
            • Executes dropped EXE
            • Adds Run key to start application
            • Checks whether UAC is enabled
            • Drops desktop.ini file(s)
            • Enumerates connected drives
            • Drops autorun.inf file
            • Drops file in System32 directory
            • Sets desktop wallpaper using registry
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Modifies Control Panel
            • Modifies Internet Explorer settings
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:5020
            • C:\Windows\Fonts\Admin 22 - 8 - 2024\smss.exe
              "C:\Windows\Fonts\Admin 22 - 8 - 2024\smss.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:4172
            • C:\Windows\Fonts\Admin 22 - 8 - 2024\Gaara.exe
              "C:\Windows\Fonts\Admin 22 - 8 - 2024\Gaara.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:4048
            • C:\Windows\Fonts\Admin 22 - 8 - 2024\csrss.exe
              "C:\Windows\Fonts\Admin 22 - 8 - 2024\csrss.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:3140
            • C:\Windows\SysWOW64\drivers\Kazekage.exe
              C:\Windows\system32\drivers\Kazekage.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:4228
            • C:\Windows\SysWOW64\drivers\system32.exe
              C:\Windows\system32\drivers\system32.exe
              6⤵
              • Modifies WinLogon for persistence
              • Modifies visibility of file extensions in Explorer
              • Modifies visiblity of hidden/system files in Explorer
              • UAC bypass
              • Disables RegEdit via registry modification
              • Drops file in Drivers directory
              • Event Triggered Execution: Image File Execution Options Injection
              • Executes dropped EXE
              • Adds Run key to start application
              • Checks whether UAC is enabled
              • Drops desktop.ini file(s)
              • Enumerates connected drives
              • Drops autorun.inf file
              • Drops file in System32 directory
              • Sets desktop wallpaper using registry
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Modifies Control Panel
              • Modifies Internet Explorer settings
              • Modifies registry class
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:4840
              • C:\Windows\Fonts\Admin 22 - 8 - 2024\smss.exe
                "C:\Windows\Fonts\Admin 22 - 8 - 2024\smss.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:884
              • C:\Windows\Fonts\Admin 22 - 8 - 2024\Gaara.exe
                "C:\Windows\Fonts\Admin 22 - 8 - 2024\Gaara.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:4120
              • C:\Windows\Fonts\Admin 22 - 8 - 2024\csrss.exe
                "C:\Windows\Fonts\Admin 22 - 8 - 2024\csrss.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:1128
              • C:\Windows\SysWOW64\drivers\Kazekage.exe
                C:\Windows\system32\drivers\Kazekage.exe
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:3596
              • C:\Windows\SysWOW64\drivers\system32.exe
                C:\Windows\system32\drivers\system32.exe
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:1376
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.rasasayang.com.my 65500
                7⤵
                • System Location Discovery: System Language Discovery
                • System Network Configuration Discovery: Internet Connection Discovery
                • Runs ping.exe
                PID:1556
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.duniasex.com 65500
                7⤵
                • System Location Discovery: System Language Discovery
                • System Network Configuration Discovery: Internet Connection Discovery
                • Runs ping.exe
                PID:4872
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.rasasayang.com.my 65500
                7⤵
                • System Location Discovery: System Language Discovery
                • System Network Configuration Discovery: Internet Connection Discovery
                • Runs ping.exe
                PID:3156
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.duniasex.com 65500
                7⤵
                • System Location Discovery: System Language Discovery
                • System Network Configuration Discovery: Internet Connection Discovery
                • Runs ping.exe
                PID:2300
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.rasasayang.com.my 65500
              6⤵
              • System Location Discovery: System Language Discovery
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:2696
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.duniasex.com 65500
              6⤵
              • System Location Discovery: System Language Discovery
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:1992
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.rasasayang.com.my 65500
              6⤵
              • System Location Discovery: System Language Discovery
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:2432
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.duniasex.com 65500
              6⤵
              • System Location Discovery: System Language Discovery
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:628
          • C:\Windows\SysWOW64\drivers\system32.exe
            C:\Windows\system32\drivers\system32.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:4056
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.rasasayang.com.my 65500
            5⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:3344
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.duniasex.com 65500
            5⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:2272
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.rasasayang.com.my 65500
            5⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:3084
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.duniasex.com 65500
            5⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:2456
        • C:\Windows\SysWOW64\drivers\Kazekage.exe
          C:\Windows\system32\drivers\Kazekage.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:3872
        • C:\Windows\SysWOW64\drivers\system32.exe
          C:\Windows\system32\drivers\system32.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:3160
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:3280
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:4240
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:2864
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:984
      • C:\Windows\Fonts\Admin 22 - 8 - 2024\csrss.exe
        "C:\Windows\Fonts\Admin 22 - 8 - 2024\csrss.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1428
      • C:\Windows\SysWOW64\drivers\Kazekage.exe
        C:\Windows\system32\drivers\Kazekage.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3156
      • C:\Windows\SysWOW64\drivers\system32.exe
        C:\Windows\system32\drivers\system32.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4768
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.rasasayang.com.my 65500
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:3536
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.duniasex.com 65500
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:5024
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.rasasayang.com.my 65500
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:2380
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.duniasex.com 65500
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:2616
    • C:\Windows\Fonts\Admin 22 - 8 - 2024\Gaara.exe
      "C:\Windows\Fonts\Admin 22 - 8 - 2024\Gaara.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:5036
    • C:\Windows\Fonts\Admin 22 - 8 - 2024\csrss.exe
      "C:\Windows\Fonts\Admin 22 - 8 - 2024\csrss.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2376
    • C:\Windows\SysWOW64\drivers\Kazekage.exe
      C:\Windows\system32\drivers\Kazekage.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:892
    • C:\Windows\SysWOW64\drivers\system32.exe
      C:\Windows\system32\drivers\system32.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3496
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.rasasayang.com.my 65500
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Runs ping.exe
      PID:4584
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.duniasex.com 65500
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Runs ping.exe
      PID:208
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4408,i,11391966286255097843,10588851088187498028,262144 --variations-seed-version --mojo-platform-channel-handle=3664 /prefetch:8
    1⤵
      PID:3884

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Admin Games\Readme.txt

      Filesize

      736B

      MD5

      bb5d6abdf8d0948ac6895ce7fdfbc151

      SHA1

      9266b7a247a4685892197194d2b9b86c8f6dddbd

      SHA256

      5db2e0915b5464d32e83484f8ae5e3c73d2c78f238fde5f58f9b40dbb5322de8

      SHA512

      878444760e8df878d65bb62b4798177e168eb099def58ad3634f4348e96705c83f74324f9fa358f0eff389991976698a233ca53e9b72034ae11c86d42322a76c

    • C:\Autorun.inf

      Filesize

      196B

      MD5

      1564dfe69ffed40950e5cb644e0894d1

      SHA1

      201b6f7a01cc49bb698bea6d4945a082ed454ce4

      SHA256

      be114a2dbcc08540b314b01882aa836a772a883322a77b67aab31233e26dc184

      SHA512

      72df187e39674b657974392cfa268e71ef86dc101ebd2303896381ca56d3c05aa9db3f0ab7d0e428d7436e0108c8f19e94c2013814d30b0b95a23a6b9e341097

    • C:\Gaara.exe

      Filesize

      148KB

      MD5

      9469e78f405795ec4c02ce5d9b479bf0

      SHA1

      fda420f07893db4e065b7249fb7e9d16a72e53ea

      SHA256

      22bbdb6b0fe902df3383ccf29d6047c5f104036316e67d5fd6adc82b68a99a0f

      SHA512

      4774c113756f0a7ff363a0b0bfdf865e5b627a404844907a6ea147878506a6d27237e221139ed240089191a3896baa717ba79b9c8d33e18f787d08a254884416

    • C:\Windows\Fonts\Admin 22 - 8 - 2024\Gaara.exe

      Filesize

      148KB

      MD5

      9ff587af124e4e424c770402fdaa8f6f

      SHA1

      ee07e9ddeec7937e8f479f7011181fccd5bffa21

      SHA256

      6569dca5b4fef273df996ff2e9719248789cf174fdbcedc851e97b00f5c53a85

      SHA512

      15171724d09aa17f083cf0060c6df1cc47cba39a5cd5f13b50ee43267ad1cf1f8e6ef89445463228c55b0312df4b6981ade41edc8a04a30c3a75377b8485502c

    • C:\Windows\Fonts\Admin 22 - 8 - 2024\csrss.exe

      Filesize

      148KB

      MD5

      766a52b8b80be6a6a4ddf36d6b464280

      SHA1

      2d57544e559a1716761c3eff5a96f81a263a5298

      SHA256

      2968234fea23a9e9495d8db0fdc5197e3a7500aed6b86e59371896946d4f7aa6

      SHA512

      cb129c881850daf4333abc96ddf883316bfb2f4a4a8fec2dae1a68a09bc1cb932fe060da0f905e5e93ab61db8d8bf41a900142a90eb64cb7944c87155d4721a8

    • C:\Windows\Fonts\Admin 22 - 8 - 2024\csrss.exe

      Filesize

      148KB

      MD5

      c4e4bb8f500718a21056dd6cbd519408

      SHA1

      76491e18b3ba53a6344e247c51aa7d7b9c2577c6

      SHA256

      7e0ccd6f77e90d9c5c30d244dcb63b8e8362df0e93503d68c4d6cf7a1f377072

      SHA512

      3756b30d03b06cddfcdfc85d61e81e545e427439cf15a7dcc42dd0807913f92bfbd3f039bd52446d77decdb30538b889eca02460261a4c2091d650dbf4fb1442

    • C:\Windows\Fonts\Admin 22 - 8 - 2024\smss.exe

      Filesize

      148KB

      MD5

      9bdedfa7f1bee74d8131d8eb21271aea

      SHA1

      c1498c391bbbffa7def3e47d573d5f6db1bfabb0

      SHA256

      13efcf63a91de8156470a66a477f68f1e7c40a0d4594db6a4f88aa91aacbc99b

      SHA512

      9ff0e9f4a60cc31d8b24a120ab3deaed0e99ec70d860a736d21f3d78f37835135ce621708aa749c771be7219e0cac3763d3f27c743c788474beeaadd7f6e526a

    • C:\Windows\Fonts\The Kazekage.jpg

      Filesize

      1.4MB

      MD5

      d6b05020d4a0ec2a3a8b687099e335df

      SHA1

      df239d830ebcd1cde5c68c46a7b76dad49d415f4

      SHA256

      9824b98dab6af65a9e84c2ea40e9df948f9766ce2096e81feecad7db8dd6080a

      SHA512

      78fd360faa4d34f5732056d6e9ad7b9930964441c69cf24535845d397de92179553b9377a25649c01eb5ac7d547c29cc964e69ede7f2af9fc677508a99251fff

    • C:\Windows\SysWOW64\22-8-2024.exe

      Filesize

      148KB

      MD5

      5b7e4140c6fac9e2d5be369b46c6de20

      SHA1

      e4e875a42823a4e85e70de5cd165793dd3d8ac7d

      SHA256

      ce24a9255019288092370b29b73532e4ed7f44000c94ce69fe26fed1935173cf

      SHA512

      d1634883b9994ef01915cee10360972ef2c623b7f0573e087c20ca71ca84b71e6818d663d70379082e3a69c500815055864374216d3fcfe26697eb3328b9caf7

    • C:\Windows\SysWOW64\22-8-2024.exe

      Filesize

      148KB

      MD5

      f07719e31a88e22a08f28d2fd76ebb87

      SHA1

      3bea6d78355fd2ceb72ea83548953a652c4706f0

      SHA256

      379c1176beef18c9e0d2be30293d4ebf3185fab8f6f4ffce64af2b5a99ce6305

      SHA512

      445cd4e86669ff9d0c8af5dde32850cf32254c6c6901bb8f50be656fd010d6752e1161f462d118040d1663b6dd320913a519ca73e32ede3040c2a6e95510b0ab

    • C:\Windows\SysWOW64\22-8-2024.exe

      Filesize

      148KB

      MD5

      ae513e42ebe9db39ae71add25a9a8faa

      SHA1

      f67ecb4877c669caec44889f50337fd7c0b64a21

      SHA256

      a634c2e7b46fff73e039363a27bebb86eae1d09a46b6edbec98eb7b6591ccb3c

      SHA512

      f9a133e737ca7720f50d72d1b4ad90702fbb2bca015e9374b129219839930bbb42fea55c61788732ab89ad6eb3c124ba87003edebc4204d785ba14497c2de2ca

    • C:\Windows\SysWOW64\22-8-2024.exe

      Filesize

      148KB

      MD5

      4f844329d2ecab624936c98de23709e1

      SHA1

      80d2d99be8c0441c4b1896ba990146f9c7bd8e73

      SHA256

      999d057c58216f2ac122dee06d119a6f37b278428a23f165ab25a0a55a74fd23

      SHA512

      fd61f9884771721647b962b2b4fd4a8eebdc45f3706052f15561498a0913e3cd2cda29b13cefb51f5d894a1e1f3398f5c3d259a9d7eefb6405e5204b7362d001

    • C:\Windows\SysWOW64\22-8-2024.exe

      Filesize

      148KB

      MD5

      430d32545a82e0dc0556377af0b9b320

      SHA1

      6c69cb979509cb678270419425e24d02d15c3b40

      SHA256

      1e8eddd20c881f0f63a9ff568c42431156d201c0da0349ea8594d13954b33657

      SHA512

      8e2097da93566332798306bcdbd928ce28e6740d971b64a1f23555bccfbed18b87708e69363a66e3ff27aca3231ce24d06c18267745bbe0bf1db65f4b9e4f0d5

    • C:\Windows\SysWOW64\22-8-2024.exe

      Filesize

      148KB

      MD5

      eaf4e653e7965e9f66d368fe31789ab0

      SHA1

      fddc0012dac8d057d799b04d0ef67792c053010d

      SHA256

      2d0a7671b9f16aeacbcaaf06c0e0a56df9f8fef09780f21342e5f3bd30ab6b56

      SHA512

      14c65dcd25e28e384bec987d6c6aff8ef623c1bdfb07397532d5a7a003d5135f198daec35a3b682dd827dc11a6374a32ac48c6f502dc96d0ef943155b0bc842d

    • C:\Windows\SysWOW64\Desktop.ini

      Filesize

      65B

      MD5

      64acfa7e03b01f48294cf30d201a0026

      SHA1

      10facd995b38a095f30b4a800fa454c0bcbf8438

      SHA256

      ba8159d865d106e7b4d0043007a63d1541e1de455dc8d7ff0edd3013bd425c62

      SHA512

      65a9b2e639de74a2a7faa83463a03f5f5b526495e3c793ec1e144c422ed0b842dd304cd5ff4f8aec3d76d826507030c5916f70a231429cea636ec2d8ab43931a

    • C:\Windows\SysWOW64\drivers\Kazekage.exe

      Filesize

      148KB

      MD5

      c5177a484e1fb99e4bfb52c66007c48f

      SHA1

      6dd525aef751edb971129529f1b991d617e5382f

      SHA256

      5c10759476617643e976bdaf01d4aed91f4c379b530a9e4ec74e98fa125b2362

      SHA512

      23a27928f78d22aba1d952411aa9360311c1b62409ed2ad5ef7206cbbf14c6801568ed4ac5675909bb8f2acbe8eca7c81ebfd465c66a85a21ddbfcdb7ae73c32

    • C:\Windows\SysWOW64\drivers\Kazekage.exe

      Filesize

      148KB

      MD5

      bda1017a4448dcdf627a5558fe88b8d9

      SHA1

      bcddfd75448f4784e5e8a9c8bececc9634a1f984

      SHA256

      d405b26f4ae06978431d4c362ed43fddccaf9d420d318ea1ca39b0e704054167

      SHA512

      90d5147026bbf8b487eb67d8032d7796a399b37681ad531ea8797c55510d8b75dc4b6b086c7e810bc7f437f889726dab5716be28ed5fa0d4789f6aa75c5ac27e

    • C:\Windows\SysWOW64\drivers\Kazekage.exe

      Filesize

      148KB

      MD5

      30a75bb03899a0b70e1cffbdfd5f6176

      SHA1

      11cfeed01c0ef4c5800f68410996d6bc14794ebb

      SHA256

      867de53fe87b36d136f3664e24a2176e70d7fb4d57ca337a0dbab12cd7fbf7f2

      SHA512

      33094839d307d72e768e8c3a77720d6f17c138201b90d2ade9acad112eb398d748e222a51a6b3ccbcd1dd7afbc5263a09ef27e5fad20b7de3655f9248d302b77

    • C:\Windows\SysWOW64\drivers\system32.exe

      Filesize

      148KB

      MD5

      b3202b80ba5dd6e1d487decce0135e79

      SHA1

      ecf50efcfe66969bf111bfb1232e889c1ca4a5aa

      SHA256

      52aff279f0ec95f78d570a277a92cbc2caf531c591168a8c6ad693eeef054fad

      SHA512

      54db2515ef7b5dfccf825ac19cb3a7516e3cb2a94770315e502081cd26f40719614dcc8b645370c5b3233293d4ed1231dc588e7893a6efdffdb3d9b2f5d21748

    • C:\Windows\SysWOW64\drivers\system32.exe

      Filesize

      148KB

      MD5

      1a898fdae6fbc962f1139e07905e973b

      SHA1

      af606940d49c7e08488614ab666cdd656c42c0e9

      SHA256

      b811c69a0f36440ace3109453a0350c1685a215419bb242cf85ad34c63e10231

      SHA512

      fa55b3b6c9b7ecff02e2e9e560d67e6c119fe17fd11415eb3e5b4ea90693a32b24fbaff7bde0717dcb60b09cec0aa77ffcc25f0682ad707dbaa9e936bae31cd4

    • C:\Windows\SysWOW64\drivers\system32.exe

      Filesize

      148KB

      MD5

      9fc9fbe4fa90ea7e4d4934d2561aa2c1

      SHA1

      523d716417ceeb394f50321042beae0d136efe4b

      SHA256

      910dfcdcaf6c75b92f1ffc625aee8d20819f63b30e7bbcf8d87b414cd59413a4

      SHA512

      ad6af03f73c1566e75336715e4a561e0a72c6d571de8563650e7b1f1d8909dd0bb88d4f6ccce42006e5000594b1db7feeb1230fa4fe7db64078ee3c40dc2345a

    • C:\Windows\SysWOW64\drivers\system32.exe

      Filesize

      148KB

      MD5

      dc24dc523aa66cf1cbc6a39740dcf4fa

      SHA1

      eaefea64cebb15080e174993092998e82c075a7d

      SHA256

      f583c48069d915b1df5c59130b660c71b79a2465476fc1147141c47181277add

      SHA512

      28c7a9e18017ebb9d5dfe64aa1fc528a1408d51f8ae1f4e0b45265b6a6a922df08a5194f2274738165fc536778e3e136658ac487439656b23edf0682c32251b3

    • C:\Windows\System\msvbvm60.dll

      Filesize

      1.4MB

      MD5

      25f62c02619174b35851b0e0455b3d94

      SHA1

      4e8ee85157f1769f6e3f61c0acbe59072209da71

      SHA256

      898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

      SHA512

      f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

    • memory/324-0-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/324-529-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/532-532-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/532-116-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/880-119-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/884-229-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/892-271-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/1128-235-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/1376-241-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/1428-256-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/1892-79-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/1948-530-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/1948-32-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/2036-158-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/2036-151-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/2376-268-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/2668-531-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/2668-74-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/2772-152-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/2772-146-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/3140-202-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/3156-259-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/3160-253-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/3496-274-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/3596-238-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/3872-250-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/4048-196-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/4056-247-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/4120-233-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/4172-192-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/4228-209-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/4228-201-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/4560-164-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/4560-157-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/4768-262-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/4840-208-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/4840-534-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/5020-165-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/5020-533-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/5036-265-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB