Analysis

  • max time kernel
    600s
  • max time network
    598s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-07-2023 20:42

General

  • Target

    https://www.dropbox.com/s/ou3xkgkz9fs49cv/

Malware Config

Extracted

Family

kutaki

C2

http://treysbeatend.com/laptop/squared.php

http://terebinnahicc.club/sec/kool.txt

Signatures

  • Kutaki

    Information stealer and keylogger that hides inside legitimate Visual Basic applications.

  • Drops startup file 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.dropbox.com/s/ou3xkgkz9fs49cv/
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3132
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff923f59758,0x7ff923f59768,0x7ff923f59778
      2⤵
        PID:4568
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 --field-trial-handle=1840,i,11365761626665271471,4086799523593070838,131072 /prefetch:2
        2⤵
          PID:2804
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1840,i,11365761626665271471,4086799523593070838,131072 /prefetch:8
          2⤵
            PID:4944
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1840,i,11365761626665271471,4086799523593070838,131072 /prefetch:8
            2⤵
              PID:4504
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3188 --field-trial-handle=1840,i,11365761626665271471,4086799523593070838,131072 /prefetch:1
              2⤵
                PID:1440
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3048 --field-trial-handle=1840,i,11365761626665271471,4086799523593070838,131072 /prefetch:1
                2⤵
                  PID:1716
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 --field-trial-handle=1840,i,11365761626665271471,4086799523593070838,131072 /prefetch:8
                  2⤵
                  • Modifies registry class
                  PID:5044
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4956 --field-trial-handle=1840,i,11365761626665271471,4086799523593070838,131072 /prefetch:8
                  2⤵
                    PID:1140
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3976 --field-trial-handle=1840,i,11365761626665271471,4086799523593070838,131072 /prefetch:1
                    2⤵
                      PID:4988
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5584 --field-trial-handle=1840,i,11365761626665271471,4086799523593070838,131072 /prefetch:8
                      2⤵
                        PID:632
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 --field-trial-handle=1840,i,11365761626665271471,4086799523593070838,131072 /prefetch:8
                        2⤵
                          PID:5008
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4748 --field-trial-handle=1840,i,11365761626665271471,4086799523593070838,131072 /prefetch:1
                          2⤵
                            PID:4472
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 --field-trial-handle=1840,i,11365761626665271471,4086799523593070838,131072 /prefetch:8
                            2⤵
                              PID:3776
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5320 --field-trial-handle=1840,i,11365761626665271471,4086799523593070838,131072 /prefetch:8
                              2⤵
                                PID:1224
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5568 --field-trial-handle=1840,i,11365761626665271471,4086799523593070838,131072 /prefetch:8
                                2⤵
                                  PID:3296
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 --field-trial-handle=1840,i,11365761626665271471,4086799523593070838,131072 /prefetch:8
                                  2⤵
                                    PID:408
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5108 --field-trial-handle=1840,i,11365761626665271471,4086799523593070838,131072 /prefetch:2
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:1588
                                • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                  "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                  1⤵
                                    PID:212
                                  • C:\Windows\System32\rundll32.exe
                                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                    1⤵
                                      PID:4460
                                    • C:\Users\Admin\AppData\Local\Temp\Temp1_Invoice No 88404.zip\Invoice No 88404.bat
                                      "C:\Users\Admin\AppData\Local\Temp\Temp1_Invoice No 88404.zip\Invoice No 88404.bat"
                                      1⤵
                                      • Drops startup file
                                      • Suspicious use of SetWindowsHookEx
                                      PID:4680
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd.exe /c C:\Users\Admin\AppData\Local\Temp\
                                        2⤵
                                          PID:752
                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qrpgxvfk.exe
                                          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qrpgxvfk.exe"
                                          2⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:3764
                                      • C:\Users\Admin\AppData\Local\Temp\Temp1_Invoice No 88404.zip\Invoice No 88404.bat
                                        "C:\Users\Admin\AppData\Local\Temp\Temp1_Invoice No 88404.zip\Invoice No 88404.bat"
                                        1⤵
                                        • Drops startup file
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1476
                                        • C:\Windows\SysWOW64\cmd.exe
                                          cmd.exe /c C:\Users\Admin\AppData\Local\Temp\
                                          2⤵
                                            PID:1644
                                          • C:\Windows\SysWOW64\taskkill.exe
                                            taskkill /im qrpgxvfk.exe /f
                                            2⤵
                                            • Kills process with taskkill
                                            PID:4196
                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qrpgxvfk.exe
                                            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qrpgxvfk.exe"
                                            2⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:4012
                                        • C:\Users\Admin\AppData\Local\Temp\Temp1_Invoice No 88404.zip\Invoice No 88404.bat
                                          "C:\Users\Admin\AppData\Local\Temp\Temp1_Invoice No 88404.zip\Invoice No 88404.bat"
                                          1⤵
                                          • Drops startup file
                                          • Suspicious use of SetWindowsHookEx
                                          PID:396
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd.exe /c C:\Users\Admin\AppData\Local\Temp\
                                            2⤵
                                              PID:1424
                                            • C:\Windows\SysWOW64\taskkill.exe
                                              taskkill /im qrpgxvfk.exe /f
                                              2⤵
                                              • Kills process with taskkill
                                              PID:4808
                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qrpgxvfk.exe
                                              "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qrpgxvfk.exe"
                                              2⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:788
                                          • C:\Users\Admin\AppData\Local\Temp\Temp1_Invoice No 88404.zip\Invoice No 88404.bat
                                            "C:\Users\Admin\AppData\Local\Temp\Temp1_Invoice No 88404.zip\Invoice No 88404.bat"
                                            1⤵
                                            • Drops startup file
                                            • Suspicious use of SetWindowsHookEx
                                            PID:4920
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd.exe /c C:\Users\Admin\AppData\Local\Temp\
                                              2⤵
                                                PID:336
                                              • C:\Windows\SysWOW64\taskkill.exe
                                                taskkill /im qrpgxvfk.exe /f
                                                2⤵
                                                • Kills process with taskkill
                                                PID:408
                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qrpgxvfk.exe
                                                "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qrpgxvfk.exe"
                                                2⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:3360

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\27621829-4144-442b-8452-39763355e22a.tmp

                                              Filesize

                                              6KB

                                              MD5

                                              debd4ae7c322d3b51d7586b4bfc6a07b

                                              SHA1

                                              bbf1c3b5b27015f948ed7f5fe109a57e3fb2605e

                                              SHA256

                                              703502fc97968f3aa5c36f455a46fbe553fae6012b346004d039bb96e5b44a23

                                              SHA512

                                              ba6ae32734dfd29694975a468d80cc36ea32d7ccfac0c7aa9916b54f9e941a7b16384509d4049599f165c24492ef32b421b40993ffe673f8deb83ab8d62f166f

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                              Filesize

                                              3KB

                                              MD5

                                              3846da813122cbeaa9d6f199c6a7c6f0

                                              SHA1

                                              4b2aad6e118fefb749b4f0bba8aa3efb350126b7

                                              SHA256

                                              cc15cb1e07bad4deeb3c1bd0bd45ec0ff9062060c8d0c61111a65a4d2d6fdb8f

                                              SHA512

                                              46a8559dbfd3c3e97d88af52f3fbb790376d82a5d71dcf8bfe55ee5f46fc0071365f0fdf03078ffd08be98af9c728a983245c15d0a9bfdb478365e0db8eae196

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                              Filesize

                                              2KB

                                              MD5

                                              fd9765086a1f0ddd5d504ed69967b974

                                              SHA1

                                              5e5855cee3341dcd78e0c22ae08f09303d46bd98

                                              SHA256

                                              717466c22606c45468c7e582e779aeece2cff33269fc67529d1d0e45634175a2

                                              SHA512

                                              10a9a7c2ab41948336393a38f5b9ddadb934e9d8fdcb0e0b63c539ed31bc0679c2523372848453a3f9b770bb979a56f69ea36038fc912dc27bd7d44ceb2dccfb

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                              Filesize

                                              2KB

                                              MD5

                                              835f6122321d252b9fd0f9b188828a7f

                                              SHA1

                                              c441faf4adae5d58a09eab5d93d806d456726871

                                              SHA256

                                              e63d2538a3f108b0d784bd84e39046254704b19791562ec3132b002d9f37547d

                                              SHA512

                                              e47484ce7308d029ff07892ab5657f32a5ccd0f199f42b8d35a0021cb3c3d6218eb07dc17798bc8f2cf974f967b85260b88c97d04ef8220f5f93f399920d31e0

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                              Filesize

                                              2KB

                                              MD5

                                              3be121f1f0d377deb7bb5a1c1b661a31

                                              SHA1

                                              5195c26e4eb143d21d86538c7e5d418e18ba527c

                                              SHA256

                                              a04372038b42f78d82553848e82f480c01fa5033307695db8ead875a10c13407

                                              SHA512

                                              14c1eb0998c8eeb44120bd041f1ec17ffc976dfd5fe3d58dc301bb54b8c0c960bc3a808f32f0d2a8121ead7dd04e6aa37cd6389d1449787b93415ff90e3deb2f

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                              Filesize

                                              1KB

                                              MD5

                                              038adf0ec9499973b498eef1c08f1fb9

                                              SHA1

                                              e39b207dcbbc633fcab2a99ca046f19db7d0bfd6

                                              SHA256

                                              3aa3adb501efa1872b9370a36da54a871ed5d76d0764f81722c41eb8c74d2440

                                              SHA512

                                              8e9494a97773cf5f41ae1eadc23c30e6a17ca10f053b28239eee24f871b8a338610fc24e792b465008d6aa40991ee35d8160e0ba34c8b8401f05bc00aecbe69d

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                              Filesize

                                              1KB

                                              MD5

                                              17b630cff865b15de38d5d0cbcbac669

                                              SHA1

                                              25f953f21ca46deb413d4b845b1484eac074fa7d

                                              SHA256

                                              b025a381ae299d6fd463bcbfc8b21e33b52d4a68b3feae7840c56608b2a76cdc

                                              SHA512

                                              f98781b1c7b9829c1e2188de57bf62dc85b4293fdda4fa2aee77bb688f14b6831a1f0e4c1f8b53847ee78eb8f329577ea5006435c1567dea8b8bd5c90d64bf4e

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                              Filesize

                                              1KB

                                              MD5

                                              03e8e540d08b97d831733ff28b5ebb60

                                              SHA1

                                              947441f24e35f4255db9b4fb70916e2fb78083e7

                                              SHA256

                                              af8f185c9e2d76150bd7f76d2b133c51a97df0879bee3cda85394176825a3915

                                              SHA512

                                              c233f9a1caba86fd8bfed5b2c94b53f99b8946b811d94541dd2ae2fa6519c6e88b0ab2f04440900e401ffde0b03c4775f67e8dc80464de587c548a32f9a624c7

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                              Filesize

                                              1KB

                                              MD5

                                              1492e2424c41cb630013c6235621a529

                                              SHA1

                                              e67378341e41994398b8f3bd505992644d247234

                                              SHA256

                                              9f466a186c6797b606ed93fb32b4de4c57d58367ee99bd1642d338f2427883e2

                                              SHA512

                                              79731aec86017646606f3caa7c51ec4203ab58a11b10c34deafbdc20917492b34296b4347853a38e3be1fc4350871afb7697bbc412db37955156684e06ce89c7

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                              Filesize

                                              1KB

                                              MD5

                                              332affa51bff4495f09c6c7a8278a6bc

                                              SHA1

                                              1a962706e10de6c465ed15a3c86994165f51ccc5

                                              SHA256

                                              0400343d942a6c492676857494ebba1d34b74753e12be91a0b4c9177f84590d5

                                              SHA512

                                              119a4a16ed46ab214378004923858f405f2366bd73f28180eb58300ddd64a0c920b163d007a63ad4b7db3bd1363443d9118fab5c26f572e241080d865f4d3f5d

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                              Filesize

                                              1KB

                                              MD5

                                              c5704522aa5c7673efd63370ced62c78

                                              SHA1

                                              5733679ab42fc2f6c2ec257548b66cd2fd46dc58

                                              SHA256

                                              b1310d90cb022774391e42f7701e0b6f43692baf2acfdf2aed08c5869cbadc6d

                                              SHA512

                                              ac6c55e9fb12e389c8eff8d160368fc739ccce6fedf05b74664a703a4f4e4a3279cd2a0bbde99e6a970e27558732ed83c9c655244fd286e413ce2d1f63aa47ac

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                              Filesize

                                              1KB

                                              MD5

                                              70dd6dbd07bd487a66afdf44c515be57

                                              SHA1

                                              ac416ad64ae0ec8e3b41ca8172bde2eb39d6a7c0

                                              SHA256

                                              ca305183e3154aa63f796b0301ff69651904009ea843292cacb742ab10079394

                                              SHA512

                                              a4f2eb05e8ad243bd5f278cba57e86e41374282ee74748c2cbe4cfa81fd6ee61464a14c3773d029e4dba1fddad74191cefd09c930f3032b014bd89075711902d

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                              Filesize

                                              1KB

                                              MD5

                                              18b7356da6be4b0a6065d94ebd055e66

                                              SHA1

                                              d32df9b18b5bb4e8e6fa3b81ad1aa0bad71ca111

                                              SHA256

                                              6da8c836fca03fc0b4dd4c04a280aae20f1e0aa086f2bacd726e249a17c5a430

                                              SHA512

                                              79c25e8705ce67cb31c85948cecc02522c938974af02683d4e6814d9b9d5a5ffafed23e9082915238b829041cb1f40d50ad53b4ee329a8e835e3493823a9beb9

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                              Filesize

                                              1KB

                                              MD5

                                              867d1d65f38bbd25a85c7d2dae1926bc

                                              SHA1

                                              725de1699cf591b10d454176415e023cfc3e9aaa

                                              SHA256

                                              cc2786ed342880bdb81901e0bdf77f93ed5e27e65e0eba862b1480bc1ef8c025

                                              SHA512

                                              ede2baf6dc4eb6d040853eb23fda39749300dfe0bdfe60a2c0ebd92009c6e236f07a0428a6c2b4e4edc83760da1dfaaa7d2d2e325030ae69a3f4d94f69585c69

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                              Filesize

                                              1KB

                                              MD5

                                              9bacdb700295c644f2e27e55b4c49a02

                                              SHA1

                                              2fc0e15843ff1179cf5e94764e55e8377c86fdb6

                                              SHA256

                                              234ca4ef16455ba0105fd8bcd5bd1df5532697ed2ce871e96e48e0e927edec02

                                              SHA512

                                              06a68ff710393effafd6d074003b237fd4e5dc73dfcd8bcde702ca466cf4caf24c652703034cf923dc993ed0444e230da19022dec31533f92596d2672bf9e621

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                              Filesize

                                              1KB

                                              MD5

                                              8682e142e6782e454793d0f381cadcb8

                                              SHA1

                                              60a1b34818aa51b6998e89206c9993df1db92c2d

                                              SHA256

                                              32edb14f80ab31ff25c27a76da6a6e25d2dd3732a6f43b9103953ba141f0cf92

                                              SHA512

                                              1dc05a354e7149a685479101020913835e10ff2daa9fd979d5b6dff47aa944dd1359c82568225b61211319f4e9e8f48395e1156d73766ff0bdcb8e535699f062

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                              Filesize

                                              1KB

                                              MD5

                                              6365e14271b510aa8e6dce700f6d4a5c

                                              SHA1

                                              f10b2f4305150f347cc797340d71ce2e7b15cf21

                                              SHA256

                                              d1b957a92356a2de3870f3993e6c7a679168868bfc1a6ac98a9eef1359baa26d

                                              SHA512

                                              bf51721db9e4be6df98cd08ef7977283cfd187008095d10651ac6f95ab7324d9c7d8a42d06f00002e4342108d3eeecaa3c792ba35244c04e93f141dbda37bf98

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                              Filesize

                                              1KB

                                              MD5

                                              fb207b6cc360b5f6da523a1a02c71bf8

                                              SHA1

                                              adb8854c95d3a1d2a0bee318fae67d3dc1310402

                                              SHA256

                                              0015a0573ea8dcee895d378f0f641ae888a7304118f60333cd030e4791191e54

                                              SHA512

                                              13fb23f490f6940b2a3f814794d4b9c491bf9a1d2774d3eb93f0205c11be50f9a135f8f14f69eff362b9ca9eaf966260e6b36dba7b3f19e2ef9d64d1650a897b

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                              Filesize

                                              1KB

                                              MD5

                                              b9ccc1321b272122822fe00cecb78d70

                                              SHA1

                                              a64aea3d023b8ac24f9ddfd17aa88781c058109c

                                              SHA256

                                              f3169f6e645c842ca2824a3141590e908ca818c62e99428449dba4570e803201

                                              SHA512

                                              a7dbe3a3aa9347619e450efde5863545d4549b784705dd85a4cd97a3e2b50829872d5d43507a0cda8fc1313b788412f94ed539fa96879468118913614cf3167f

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                              Filesize

                                              1KB

                                              MD5

                                              2ddd5f2385bb39a049d085efd273da85

                                              SHA1

                                              3ebb58f1a8ed4ab6acea7eb512fc3ae9ef0cbad0

                                              SHA256

                                              5bc828a9f24dc4779b6e44248a355480f8ec0ea922da36501a7c1a430b75883d

                                              SHA512

                                              1689a3ed3c3b5da5e1fdbf875abdbe19cf67f90a1a3871b7f3c4ac65873c9c4cac64c2a4ec3f94610a4febaee8b4975634c908163fd0aab5a3828ffb711d5d8d

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                              Filesize

                                              6KB

                                              MD5

                                              6ec211724306e73353bbe415c4982584

                                              SHA1

                                              dc09fc4e92506a92d8a98f9024de48f183d5699a

                                              SHA256

                                              4ebf141704a7aa26448446682994ca53c09afd34eef8cb771c6a576f07e786c9

                                              SHA512

                                              7060d3119876fe9f08d8f246559e73770a64960c876d75293fc9843c5c947a6ea132e86d24b344824155449626ab8f5ddb0dd3013aec0cd69e3491754ea75731

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                              Filesize

                                              89KB

                                              MD5

                                              ed601a1be16ba09acfb3e37316d2f7bb

                                              SHA1

                                              f1ae54f7bb5a46e157130a52108fbb42a7ce1d78

                                              SHA256

                                              9ae7a43dc705c9933edfebca0734f07ac2408535588e2008535d27705a8dfe88

                                              SHA512

                                              ba02ad19191b6946629705c72d06833b8da9377d8464de4218903cb88ee31adbf086065f67397d1e9e321fa221d55861debac9449375ad9dac58d0ada079d897

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                              Filesize

                                              89KB

                                              MD5

                                              7a0f16cd9adde4b92b0fa784491d09aa

                                              SHA1

                                              6134c87e786f34756e3b60d4e7bd2e6313b5b090

                                              SHA256

                                              0804b74da1587df37ca01de4f67048ddabc36462c8c58835f711ff1120a5d175

                                              SHA512

                                              38093e179c32ea6922ab83be37203898c1f4a8bc707d5fcffd6a13accc325c8d94eefb62addd6ffe6c11732b0f3a8d4ebdaa5de36bc601e5fae788c9191ab77a

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                              Filesize

                                              108KB

                                              MD5

                                              07fcdd1f6a30fc90d17ca1dc63341bd1

                                              SHA1

                                              a916e54171aca08720afd3d360062d4379e4aede

                                              SHA256

                                              34bd40723eb6096ae40e02c6bd65dfa1839c0335d4f836392a58f7118c1a28c7

                                              SHA512

                                              3eb9611c9eb7ddfc63d90ca1df3306810159fd068913ac47910fe2cdf42798de155396d38ce40c5596adc1ab151dfeadd3c0e394479a518b2c47f3e0b5dc6425

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                              Filesize

                                              89KB

                                              MD5

                                              37202bd62b39d83fdb3c26b507d79e84

                                              SHA1

                                              3910bf1578bc15b1c3076655429ab53162eaff84

                                              SHA256

                                              6c6e8579840067246924bacff45ef92e604876dbafa1a7d412c4ffecf9a53677

                                              SHA512

                                              102157477d0e5fed1ce2921c740351134e7612b37441568403d4892071a17d15a8b441e0e6735fa44d91a47669d232aa64ac85d3453db7a94a915348667f3075

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache

                                              Filesize

                                              113KB

                                              MD5

                                              ad598313941d3463c69eaf64d09586aa

                                              SHA1

                                              63246e39b5f41824e0acf1373d21bccb2a91cbbb

                                              SHA256

                                              cdc4e322293558762f87af4d1a4051fa8743a5c90f56c749522ffe17404ee1ba

                                              SHA512

                                              ac89bd8577bf523ea22ab83e8393e9ef3a27ad6a54c0471e2690db5cf5ffbf2ce8a9b923354020aff70e5e7cb8fe88cd9863c1ad8b6a0fdf0cfd308d47fb48cf

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe589863.TMP

                                              Filesize

                                              110KB

                                              MD5

                                              954250f5747df8035c566e3553fcfbb1

                                              SHA1

                                              da62f109e59292f02ce79a694215240b57727117

                                              SHA256

                                              35c9a4832bea4ccbb3d19a06640031b1a0d8e6f6be1e2e573e9350d19d068580

                                              SHA512

                                              1ef96f9cf66a04e139a4af76f0b5f124c975cec8f292703425bb261a3e19e90cdc85ed2905bf0402375def7714bbb8d6afa4ad9ac06f5fa37e3dc948ba5a6dbe

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                              Filesize

                                              2B

                                              MD5

                                              99914b932bd37a50b983c5e7c90ae93b

                                              SHA1

                                              bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                              SHA256

                                              44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                              SHA512

                                              27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qrpgxvfk.exe

                                              Filesize

                                              2.9MB

                                              MD5

                                              560f4049a77df65858b292169dcfc4e7

                                              SHA1

                                              d57078d853074841f38b864e7890d4c2839cf089

                                              SHA256

                                              7999d0441c310bc8bcc7ed86d613eece57a81f4fef6cddf592efae05937785fe

                                              SHA512

                                              db87807b417742dcbc32a9c0bbc833a5fefba8ad28f1703e7ba446a8949c76eca41f2637a6feacb07dd43258ecfe0ef4c9a17576fffd90a9409214d8d95e4de7

                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qrpgxvfk.exe

                                              Filesize

                                              2.9MB

                                              MD5

                                              560f4049a77df65858b292169dcfc4e7

                                              SHA1

                                              d57078d853074841f38b864e7890d4c2839cf089

                                              SHA256

                                              7999d0441c310bc8bcc7ed86d613eece57a81f4fef6cddf592efae05937785fe

                                              SHA512

                                              db87807b417742dcbc32a9c0bbc833a5fefba8ad28f1703e7ba446a8949c76eca41f2637a6feacb07dd43258ecfe0ef4c9a17576fffd90a9409214d8d95e4de7

                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qrpgxvfk.exe

                                              Filesize

                                              2.9MB

                                              MD5

                                              560f4049a77df65858b292169dcfc4e7

                                              SHA1

                                              d57078d853074841f38b864e7890d4c2839cf089

                                              SHA256

                                              7999d0441c310bc8bcc7ed86d613eece57a81f4fef6cddf592efae05937785fe

                                              SHA512

                                              db87807b417742dcbc32a9c0bbc833a5fefba8ad28f1703e7ba446a8949c76eca41f2637a6feacb07dd43258ecfe0ef4c9a17576fffd90a9409214d8d95e4de7

                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qrpgxvfk.exe

                                              Filesize

                                              2.9MB

                                              MD5

                                              560f4049a77df65858b292169dcfc4e7

                                              SHA1

                                              d57078d853074841f38b864e7890d4c2839cf089

                                              SHA256

                                              7999d0441c310bc8bcc7ed86d613eece57a81f4fef6cddf592efae05937785fe

                                              SHA512

                                              db87807b417742dcbc32a9c0bbc833a5fefba8ad28f1703e7ba446a8949c76eca41f2637a6feacb07dd43258ecfe0ef4c9a17576fffd90a9409214d8d95e4de7

                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qrpgxvfk.exe

                                              Filesize

                                              2.9MB

                                              MD5

                                              560f4049a77df65858b292169dcfc4e7

                                              SHA1

                                              d57078d853074841f38b864e7890d4c2839cf089

                                              SHA256

                                              7999d0441c310bc8bcc7ed86d613eece57a81f4fef6cddf592efae05937785fe

                                              SHA512

                                              db87807b417742dcbc32a9c0bbc833a5fefba8ad28f1703e7ba446a8949c76eca41f2637a6feacb07dd43258ecfe0ef4c9a17576fffd90a9409214d8d95e4de7

                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qrpgxvfk.exe

                                              Filesize

                                              2.9MB

                                              MD5

                                              560f4049a77df65858b292169dcfc4e7

                                              SHA1

                                              d57078d853074841f38b864e7890d4c2839cf089

                                              SHA256

                                              7999d0441c310bc8bcc7ed86d613eece57a81f4fef6cddf592efae05937785fe

                                              SHA512

                                              db87807b417742dcbc32a9c0bbc833a5fefba8ad28f1703e7ba446a8949c76eca41f2637a6feacb07dd43258ecfe0ef4c9a17576fffd90a9409214d8d95e4de7

                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qrpgxvfk.exe

                                              Filesize

                                              2.9MB

                                              MD5

                                              560f4049a77df65858b292169dcfc4e7

                                              SHA1

                                              d57078d853074841f38b864e7890d4c2839cf089

                                              SHA256

                                              7999d0441c310bc8bcc7ed86d613eece57a81f4fef6cddf592efae05937785fe

                                              SHA512

                                              db87807b417742dcbc32a9c0bbc833a5fefba8ad28f1703e7ba446a8949c76eca41f2637a6feacb07dd43258ecfe0ef4c9a17576fffd90a9409214d8d95e4de7

                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qrpgxvfk.exe

                                              Filesize

                                              2.9MB

                                              MD5

                                              560f4049a77df65858b292169dcfc4e7

                                              SHA1

                                              d57078d853074841f38b864e7890d4c2839cf089

                                              SHA256

                                              7999d0441c310bc8bcc7ed86d613eece57a81f4fef6cddf592efae05937785fe

                                              SHA512

                                              db87807b417742dcbc32a9c0bbc833a5fefba8ad28f1703e7ba446a8949c76eca41f2637a6feacb07dd43258ecfe0ef4c9a17576fffd90a9409214d8d95e4de7

                                            • C:\Users\Admin\Downloads\Invoice No 88404.zip.crdownload

                                              Filesize

                                              2.4MB

                                              MD5

                                              dbe37e700e7f1424e255629e453bacf1

                                              SHA1

                                              2f3c21c26d3faaaf5ea96fb710d2108800cb9efa

                                              SHA256

                                              f29a29a81edfdea36ece02fa5b22ff4ab6c4b5ab03f8295fd7dacf5464554100

                                              SHA512

                                              8e13b824b40b2cc97d22ef2d89c71ee7b1012f7034cdf88edaf2f86cc6e2a5c46d44376712845fc27e92e3ab922f159bf460e16bc857c76364481b36eb670bb6

                                            • \??\pipe\crashpad_3132_MZTTBNIOSJJTMNMN

                                              MD5

                                              d41d8cd98f00b204e9800998ecf8427e

                                              SHA1

                                              da39a3ee5e6b4b0d3255bfef95601890afd80709

                                              SHA256

                                              e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                              SHA512

                                              cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e