Analysis

  • max time kernel
    120s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 14:28

General

  • Target

    5bafd79df47f5f307f726bd0830bb419666d89b2ae597b88ad5d21c5da458cadN.exe

  • Size

    148KB

  • MD5

    57703a155f9702db14ee8a2b78fcf080

  • SHA1

    96e38ed8c3717cda62e0d7ab2ae1f11462a359b8

  • SHA256

    5bafd79df47f5f307f726bd0830bb419666d89b2ae597b88ad5d21c5da458cad

  • SHA512

    57fd4db79ee156ed12d58fb508207d2d4c217e9bba7075f02e20537a74db83564988a0f4ce993f2b2c5cedfa370ece0f8c727bab6c389522404442092df95de0

  • SSDEEP

    1536:DJo0IHgL2AHfb1mzaFXg+xsukl4Y17jsgS/jHagQNuXGpeVTV:tx6AHjYzaFXg+w17jsgS/jHagQg19V

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • UAC bypass 3 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Drops file in Drivers directory 24 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
  • Executes dropped EXE 30 IoCs
  • Loads dropped DLL 18 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Drops desktop.ini file(s) 64 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 64 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 39 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 6 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 53 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 22 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies Control Panel 64 IoCs
  • Modifies Internet Explorer settings 1 TTPs 12 IoCs
  • Modifies registry class 51 IoCs
  • Runs ping.exe 1 TTPs 22 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 31 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5bafd79df47f5f307f726bd0830bb419666d89b2ae597b88ad5d21c5da458cadN.exe
    "C:\Users\Admin\AppData\Local\Temp\5bafd79df47f5f307f726bd0830bb419666d89b2ae597b88ad5d21c5da458cadN.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • UAC bypass
    • Disables RegEdit via registry modification
    • Drops file in Drivers directory
    • Event Triggered Execution: Image File Execution Options Injection
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3796
    • C:\Windows\Fonts\Admin 19 - 9 - 2024\smss.exe
      "C:\Windows\Fonts\Admin 19 - 9 - 2024\smss.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • UAC bypass
      • Disables RegEdit via registry modification
      • Drops file in Drivers directory
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Sets desktop wallpaper using registry
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1812
      • C:\Windows\Fonts\Admin 19 - 9 - 2024\smss.exe
        "C:\Windows\Fonts\Admin 19 - 9 - 2024\smss.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4984
      • C:\Windows\Fonts\Admin 19 - 9 - 2024\Gaara.exe
        "C:\Windows\Fonts\Admin 19 - 9 - 2024\Gaara.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • UAC bypass
        • Disables RegEdit via registry modification
        • Drops file in Drivers directory
        • Event Triggered Execution: Image File Execution Options Injection
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops desktop.ini file(s)
        • Enumerates connected drives
        • Drops autorun.inf file
        • Drops file in System32 directory
        • Sets desktop wallpaper using registry
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:1780
        • C:\Windows\Fonts\Admin 19 - 9 - 2024\smss.exe
          "C:\Windows\Fonts\Admin 19 - 9 - 2024\smss.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:4184
        • C:\Windows\Fonts\Admin 19 - 9 - 2024\Gaara.exe
          "C:\Windows\Fonts\Admin 19 - 9 - 2024\Gaara.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:3952
        • C:\Windows\Fonts\Admin 19 - 9 - 2024\csrss.exe
          "C:\Windows\Fonts\Admin 19 - 9 - 2024\csrss.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • UAC bypass
          • Disables RegEdit via registry modification
          • Drops file in Drivers directory
          • Event Triggered Execution: Image File Execution Options Injection
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Drops desktop.ini file(s)
          • Enumerates connected drives
          • Drops autorun.inf file
          • Drops file in System32 directory
          • Sets desktop wallpaper using registry
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Modifies Control Panel
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:1700
          • C:\Windows\Fonts\Admin 19 - 9 - 2024\smss.exe
            "C:\Windows\Fonts\Admin 19 - 9 - 2024\smss.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2896
          • C:\Windows\Fonts\Admin 19 - 9 - 2024\Gaara.exe
            "C:\Windows\Fonts\Admin 19 - 9 - 2024\Gaara.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:3400
          • C:\Windows\Fonts\Admin 19 - 9 - 2024\csrss.exe
            "C:\Windows\Fonts\Admin 19 - 9 - 2024\csrss.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:4368
          • C:\Windows\SysWOW64\drivers\Kazekage.exe
            C:\Windows\system32\drivers\Kazekage.exe
            5⤵
            • Modifies WinLogon for persistence
            • Modifies visibility of file extensions in Explorer
            • Modifies visiblity of hidden/system files in Explorer
            • UAC bypass
            • Disables RegEdit via registry modification
            • Drops file in Drivers directory
            • Event Triggered Execution: Image File Execution Options Injection
            • Executes dropped EXE
            • Adds Run key to start application
            • Checks whether UAC is enabled
            • Drops desktop.ini file(s)
            • Enumerates connected drives
            • Drops autorun.inf file
            • Drops file in System32 directory
            • Sets desktop wallpaper using registry
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Modifies Control Panel
            • Modifies Internet Explorer settings
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:1936
            • C:\Windows\Fonts\Admin 19 - 9 - 2024\smss.exe
              "C:\Windows\Fonts\Admin 19 - 9 - 2024\smss.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:3908
            • C:\Windows\Fonts\Admin 19 - 9 - 2024\Gaara.exe
              "C:\Windows\Fonts\Admin 19 - 9 - 2024\Gaara.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:2964
            • C:\Windows\Fonts\Admin 19 - 9 - 2024\csrss.exe
              "C:\Windows\Fonts\Admin 19 - 9 - 2024\csrss.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:1212
            • C:\Windows\SysWOW64\drivers\Kazekage.exe
              C:\Windows\system32\drivers\Kazekage.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:4884
            • C:\Windows\SysWOW64\drivers\system32.exe
              C:\Windows\system32\drivers\system32.exe
              6⤵
              • Modifies WinLogon for persistence
              • Modifies visibility of file extensions in Explorer
              • Modifies visiblity of hidden/system files in Explorer
              • UAC bypass
              • Disables RegEdit via registry modification
              • Drops file in Drivers directory
              • Event Triggered Execution: Image File Execution Options Injection
              • Executes dropped EXE
              • Adds Run key to start application
              • Checks whether UAC is enabled
              • Drops desktop.ini file(s)
              • Enumerates connected drives
              • Drops autorun.inf file
              • Drops file in System32 directory
              • Sets desktop wallpaper using registry
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Modifies Control Panel
              • Modifies Internet Explorer settings
              • Modifies registry class
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:1068
              • C:\Windows\Fonts\Admin 19 - 9 - 2024\smss.exe
                "C:\Windows\Fonts\Admin 19 - 9 - 2024\smss.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:2480
              • C:\Windows\Fonts\Admin 19 - 9 - 2024\Gaara.exe
                "C:\Windows\Fonts\Admin 19 - 9 - 2024\Gaara.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:4772
              • C:\Windows\Fonts\Admin 19 - 9 - 2024\csrss.exe
                "C:\Windows\Fonts\Admin 19 - 9 - 2024\csrss.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:4112
              • C:\Windows\SysWOW64\drivers\Kazekage.exe
                C:\Windows\system32\drivers\Kazekage.exe
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:1080
              • C:\Windows\SysWOW64\drivers\system32.exe
                C:\Windows\system32\drivers\system32.exe
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:3944
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.rasasayang.com.my 65500
                7⤵
                • System Location Discovery: System Language Discovery
                • System Network Configuration Discovery: Internet Connection Discovery
                • Runs ping.exe
                PID:4940
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.duniasex.com 65500
                7⤵
                • System Location Discovery: System Language Discovery
                • System Network Configuration Discovery: Internet Connection Discovery
                • Runs ping.exe
                PID:2268
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.rasasayang.com.my 65500
                7⤵
                • System Location Discovery: System Language Discovery
                • System Network Configuration Discovery: Internet Connection Discovery
                • Runs ping.exe
                PID:3636
              • C:\Windows\SysWOW64\ping.exe
                ping -a -l www.duniasex.com 65500
                7⤵
                • System Location Discovery: System Language Discovery
                • System Network Configuration Discovery: Internet Connection Discovery
                • Runs ping.exe
                PID:2128
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.rasasayang.com.my 65500
              6⤵
              • System Location Discovery: System Language Discovery
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:3224
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.duniasex.com 65500
              6⤵
              • System Location Discovery: System Language Discovery
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:3536
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.rasasayang.com.my 65500
              6⤵
              • System Location Discovery: System Language Discovery
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:4476
            • C:\Windows\SysWOW64\ping.exe
              ping -a -l www.duniasex.com 65500
              6⤵
              • System Location Discovery: System Language Discovery
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:2192
          • C:\Windows\SysWOW64\drivers\system32.exe
            C:\Windows\system32\drivers\system32.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2892
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.rasasayang.com.my 65500
            5⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:4680
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.duniasex.com 65500
            5⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:3884
        • C:\Windows\SysWOW64\drivers\Kazekage.exe
          C:\Windows\system32\drivers\Kazekage.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2844
        • C:\Windows\SysWOW64\drivers\system32.exe
          C:\Windows\system32\drivers\system32.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2324
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:4200
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:1628
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:3800
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:4340
      • C:\Windows\Fonts\Admin 19 - 9 - 2024\csrss.exe
        "C:\Windows\Fonts\Admin 19 - 9 - 2024\csrss.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1476
      • C:\Windows\SysWOW64\drivers\Kazekage.exe
        C:\Windows\system32\drivers\Kazekage.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1916
      • C:\Windows\SysWOW64\drivers\system32.exe
        C:\Windows\system32\drivers\system32.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1108
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.rasasayang.com.my 65500
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:4204
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.duniasex.com 65500
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:5092
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.rasasayang.com.my 65500
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:3828
      • C:\Windows\SysWOW64\ping.exe
        ping -a -l www.duniasex.com 65500
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:3808
    • C:\Windows\Fonts\Admin 19 - 9 - 2024\Gaara.exe
      "C:\Windows\Fonts\Admin 19 - 9 - 2024\Gaara.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4532
    • C:\Windows\Fonts\Admin 19 - 9 - 2024\csrss.exe
      "C:\Windows\Fonts\Admin 19 - 9 - 2024\csrss.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4340
    • C:\Windows\SysWOW64\drivers\Kazekage.exe
      C:\Windows\system32\drivers\Kazekage.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3616
    • C:\Windows\SysWOW64\drivers\system32.exe
      C:\Windows\system32\drivers\system32.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3344
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.rasasayang.com.my 65500
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Runs ping.exe
      PID:4280
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.duniasex.com 65500
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Runs ping.exe
      PID:4772
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.rasasayang.com.my 65500
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Runs ping.exe
      PID:4360
    • C:\Windows\SysWOW64\ping.exe
      ping -a -l www.duniasex.com 65500
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Runs ping.exe
      PID:4352

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Admin Games\Readme.txt

          Filesize

          736B

          MD5

          bb5d6abdf8d0948ac6895ce7fdfbc151

          SHA1

          9266b7a247a4685892197194d2b9b86c8f6dddbd

          SHA256

          5db2e0915b5464d32e83484f8ae5e3c73d2c78f238fde5f58f9b40dbb5322de8

          SHA512

          878444760e8df878d65bb62b4798177e168eb099def58ad3634f4348e96705c83f74324f9fa358f0eff389991976698a233ca53e9b72034ae11c86d42322a76c

        • C:\Autorun.inf

          Filesize

          196B

          MD5

          1564dfe69ffed40950e5cb644e0894d1

          SHA1

          201b6f7a01cc49bb698bea6d4945a082ed454ce4

          SHA256

          be114a2dbcc08540b314b01882aa836a772a883322a77b67aab31233e26dc184

          SHA512

          72df187e39674b657974392cfa268e71ef86dc101ebd2303896381ca56d3c05aa9db3f0ab7d0e428d7436e0108c8f19e94c2013814d30b0b95a23a6b9e341097

        • C:\Windows\Fonts\Admin 19 - 9 - 2024\Gaara.exe

          Filesize

          148KB

          MD5

          4a864b70ad0743841a9f08234d17a115

          SHA1

          aadd7efd1e1037a9631f18d4c3a18b55f0353bbb

          SHA256

          90a223aac0407aa3abac05ce007f012040a873f718909294ccad0a69f578fd9e

          SHA512

          4586cf898ad0368fe2195f6f0b0e419e82b40f3efc813533730ed75e64c7879041c77608a65ae7e85523730b7a15eda9c8a7bfe5dac5b786d41ac41f4d4338ad

        • C:\Windows\Fonts\Admin 19 - 9 - 2024\csrss.exe

          Filesize

          148KB

          MD5

          57703a155f9702db14ee8a2b78fcf080

          SHA1

          96e38ed8c3717cda62e0d7ab2ae1f11462a359b8

          SHA256

          5bafd79df47f5f307f726bd0830bb419666d89b2ae597b88ad5d21c5da458cad

          SHA512

          57fd4db79ee156ed12d58fb508207d2d4c217e9bba7075f02e20537a74db83564988a0f4ce993f2b2c5cedfa370ece0f8c727bab6c389522404442092df95de0

        • C:\Windows\Fonts\Admin 19 - 9 - 2024\csrss.exe

          Filesize

          148KB

          MD5

          f67639436482388b67ba741f4548c1cd

          SHA1

          859e1110b78c3fd38620fc12561d939a8831a3cc

          SHA256

          26df49ba7cbe10369b9c5082397988c51d4bf049abefefc6bfec5f40cdc5c2da

          SHA512

          d5a9902ce6f4864dd879e6a0e4a7fd44b402470c93e50437a739acddfa2d607a01d18dd991e0ef0d808d2aebf6ad352eee802a22afcb8e0746a4433f3152b478

        • C:\Windows\Fonts\Admin 19 - 9 - 2024\csrss.exe

          Filesize

          148KB

          MD5

          2d3ffac629eb6c61fb6e5a83d5511d48

          SHA1

          e7564e07801e69c4d7eb65fc51401a48d2dd23e2

          SHA256

          4509288a9e316acbe255aaf276976c1df1b4b7cfa95ea800c7037d5bc8c0d74a

          SHA512

          c34dd077fca548379a51728975999b5c7293a673f24c8c8a89fcb40a517080a08ec805a4aeb04f696744e1d161a2e223f7412c402e997215f727ff3c40636c58

        • C:\Windows\Fonts\Admin 19 - 9 - 2024\smss.exe

          Filesize

          148KB

          MD5

          0b12547796494de8b3db2f82740c65ff

          SHA1

          a906fd9876703c7726c9074db21aeb4f33e543b3

          SHA256

          8bf39dfc025045c0d329021034836d0ed569e91287d755bc14f6b4b040060fdb

          SHA512

          c7008e23331200a7ac616593c404db3c09d23217a4559d72f1ec5eb2673a7a6451ca3c427a8c841150684a9ac3bff201b4cafcf4b5e8da4afa81eeb2cfeb43b3

        • C:\Windows\Fonts\The Kazekage.jpg

          Filesize

          1.4MB

          MD5

          d6b05020d4a0ec2a3a8b687099e335df

          SHA1

          df239d830ebcd1cde5c68c46a7b76dad49d415f4

          SHA256

          9824b98dab6af65a9e84c2ea40e9df948f9766ce2096e81feecad7db8dd6080a

          SHA512

          78fd360faa4d34f5732056d6e9ad7b9930964441c69cf24535845d397de92179553b9377a25649c01eb5ac7d547c29cc964e69ede7f2af9fc677508a99251fff

        • C:\Windows\SysWOW64\19-9-2024.exe

          Filesize

          148KB

          MD5

          2d2113ecf6fc7eccc32ccdb5149a6ba9

          SHA1

          eb496930a4827922b4e0fd758d7479d95678c320

          SHA256

          4e3fbbf6c2b15a0f6fb15e6ddab27347253c465a7f4a915779ef2563074f2430

          SHA512

          f3c973a3c81bdbb1430125187d262513e199f351f926ad862f571b042b3fbd77b7952088f1c8e8c4a609cbf396235dcceb63415008252dc2fd63b15304387cfc

        • C:\Windows\SysWOW64\19-9-2024.exe

          Filesize

          148KB

          MD5

          9a87cf432672f36e894ac04f904515c2

          SHA1

          0d3d9324b0f663fb241ab9df20b7d640ec30d689

          SHA256

          e75e36758db67e0a38c406d5a1127ef083ebe73e59efc27bc7551cb06b9bc673

          SHA512

          6e6a9f4204482cbad3c3a61bca17c9299aee10bb573ea45ef408e286715a36f92f2bb5c8b43519a0ad7ca50617fd427b48b13d714d483efdff494b5068e4afe8

        • C:\Windows\SysWOW64\19-9-2024.exe

          Filesize

          148KB

          MD5

          34d1c7ea1f92e935fb9bca237b3c61ff

          SHA1

          2be14b7ed11f030df81d30af86b8656c3a6a67c8

          SHA256

          78c08ef9ba127fbd1bc0dbe731d447e0f7b9c5008352bf1bddc6b5babb6917a8

          SHA512

          afc765f93e85e6c059da43f1c50b683e58ebc700860f2f369231559e8b718e74361e5c545a8a12b02d88905991fbf2fe2b7f7cf3fea6b4147a56359be47504c9

        • C:\Windows\SysWOW64\19-9-2024.exe

          Filesize

          148KB

          MD5

          6c392b2c2f8372fb95e2e60a775eb60b

          SHA1

          bfeb6bd23da4665b68940358dade1b3a15c5c560

          SHA256

          5901192858d35da5eb3a4704405e59d804cea651bc5e2bd563e2949a3e0521e4

          SHA512

          0e3395b963fd706979ec413dbc03d04b57b530738107151410fb0f76f4dd780e4c57490bd5fafaa4a2ed4a443a9040e396c0eac8b17700a548d2ca9afb648749

        • C:\Windows\SysWOW64\19-9-2024.exe

          Filesize

          148KB

          MD5

          71b5d8e9a4c10dac24900fc4bf40d013

          SHA1

          fca2ee48dbf99e1f970b957c9194303f05bb8a8c

          SHA256

          e91c74874fb90ee95dab5de9dfd205949e78ff8405d346a3213ef56dd469083e

          SHA512

          26617df37c2600682e985123b85a2c3379e83d3e2e63787433fe134936e55ca5bd4bfef9e6942cb8fb103845e07147718aa51ca7fc56f24c1ecfcced85f14230

        • C:\Windows\SysWOW64\Desktop.ini

          Filesize

          65B

          MD5

          64acfa7e03b01f48294cf30d201a0026

          SHA1

          10facd995b38a095f30b4a800fa454c0bcbf8438

          SHA256

          ba8159d865d106e7b4d0043007a63d1541e1de455dc8d7ff0edd3013bd425c62

          SHA512

          65a9b2e639de74a2a7faa83463a03f5f5b526495e3c793ec1e144c422ed0b842dd304cd5ff4f8aec3d76d826507030c5916f70a231429cea636ec2d8ab43931a

        • C:\Windows\SysWOW64\drivers\Kazekage.exe

          Filesize

          148KB

          MD5

          c62f59c9fb5541b827b6acceeb303c5f

          SHA1

          e02e32e3ea93146a4f7010d62743ab2eaa3bc1b3

          SHA256

          e0f2d5369ba6e018718835435976510aeb2b3b0ca5ea68f0091b6b73d7555dfc

          SHA512

          019e7c27205243cb3d566cdda7c379f81df307734b38ecbfecfed707cb2e6612cd0a7a9534607e3f5ec5ec361a6f730cca8316a86b111feb5811c19936dad3f0

        • C:\Windows\SysWOW64\drivers\Kazekage.exe

          Filesize

          148KB

          MD5

          880ad70f2c634630e140ac25658d3ff1

          SHA1

          fecbcbf199c7296b2d47903a09ee0a5cd2a082c1

          SHA256

          3ea97eb162970043fcbee4fac4761306d19fe04d558d5900b660bb947aa6bf1c

          SHA512

          75691f70626a3b3b37129a5bd1272c95ea04bb440bed55e0bc24a41c5d8fd995f2eb4cd0ac5a933eab83040cf06a45eaa5f36121163813fbdcc73c8eb9864d2a

        • C:\Windows\SysWOW64\drivers\Kazekage.exe

          Filesize

          148KB

          MD5

          3e1d2f5ee074df0b814cd3b4e3d00bb2

          SHA1

          6c0692b0ee7680ab51ea299546a6e6758e8fcca0

          SHA256

          849bb34944bc29eff50de5a1da238235058215ca7607f5c9af3fec4dd8c8f19b

          SHA512

          a7c6cdc904b889915cd91ca7f07a0d0d5a86b58fcb8740d8bee65a4df7e3fcd2e15af3ab831d7be9e246a2d45f577611adae798f4dabc942802e04b1d2a97be0

        • C:\Windows\SysWOW64\drivers\system32.exe

          Filesize

          148KB

          MD5

          c7a1091f5c757c088892438d8ad33786

          SHA1

          a3327fdcf7e57483979c2a7b37932d86b4c16e5c

          SHA256

          e5fba969b45a160be6fc198aa5dd446049c1e4ff4b78a25d91ca383101a4fc98

          SHA512

          eac8b32cef083b30c0e9db2c435786ccb42232bde6876acc5823d18f2cb380bb767d444c150214d94f5847a255daeb330f1683251a42f3942e5b3b0e8c299d02

        • C:\Windows\SysWOW64\drivers\system32.exe

          Filesize

          148KB

          MD5

          13f69b79881f57b4ce2aa38eb51e702c

          SHA1

          20263969cec9225e032907f0a6e9f66ab7fbdc82

          SHA256

          4cfc5ef3d39c98ecae9a3c0242e83e2f79db121ecffafcd37567e1b81b4fba6d

          SHA512

          73adfe38e31c175bade04cf530f37d8c9bb5b6a953dff1f7a40f5e2a42752189d1e4527f32eea3b62bbb0ec24ced21513abec56a8ac27e4a936873d504e4387b

        • C:\Windows\SysWOW64\drivers\system32.exe

          Filesize

          148KB

          MD5

          668f3761580b883e7e41ac2490c0e789

          SHA1

          c28b1183561b1c5b6f2d1febfb74703609f45c71

          SHA256

          9e8825727f0567e90bd502fd6742cb4552acbe7b996320597a9efc06c3e2b390

          SHA512

          a080551838f3cd910211cf9a859bf1548163ad389b26d0e02bd393512c72c57fd62c03ed6f51007c9cd2932f108b48ec2eb1800b8799b79689a8c1c442abf354

        • C:\Windows\SysWOW64\drivers\system32.exe

          Filesize

          148KB

          MD5

          f917968c4727008e9886c2bc46ced18f

          SHA1

          7b932b4b60c17f1f69af5243211166a9fb3826ae

          SHA256

          fd3dc32b18f5e8ad8673f05e94a94322a2bd502c4b671573dff9fdffe1908e4e

          SHA512

          665a8d28155a4b84bf84d2c677b35bae003fcc31c063800a81673b0c8bea748b98acfab71714144711b3716a6e8b33ac9d0a497b95a4ebe18f179c9b0c9879a0

        • C:\Windows\System\msvbvm60.dll

          Filesize

          1.4MB

          MD5

          25f62c02619174b35851b0e0455b3d94

          SHA1

          4e8ee85157f1769f6e3f61c0acbe59072209da71

          SHA256

          898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

          SHA512

          f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

        • memory/1068-531-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/1068-205-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/1080-235-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/1108-259-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/1212-200-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/1476-253-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/1700-529-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/1700-120-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/1780-76-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/1780-528-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/1812-527-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/1812-32-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/1916-256-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/1936-163-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/1936-530-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/2324-250-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/2480-227-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/2844-247-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/2892-241-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/2896-152-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/2964-197-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/3344-271-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/3400-151-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/3400-158-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/3616-268-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/3796-0-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/3796-526-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/3944-238-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/3952-119-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/4340-265-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/4368-157-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/4368-165-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/4532-262-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/4772-230-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/4884-206-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/4984-80-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB

        • memory/4984-70-0x0000000000400000-0x0000000000425000-memory.dmp

          Filesize

          148KB