Analysis

  • max time kernel
    600s
  • max time network
    605s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-04-2024 18:43

General

  • Target

    http://globiradoctors.com/load

Malware Config

Extracted

Family

kutaki

C2

http://treysbeatend.com/laptop/squared.php

http://terebinnahicc.club/sec/kool.txt

Signatures

  • Kutaki

    Information stealer and keylogger that hides inside legitimate Visual Basic applications.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://globiradoctors.com/load
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4024
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc6059ab58,0x7ffc6059ab68,0x7ffc6059ab78
      2⤵
        PID:5056
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1596 --field-trial-handle=1884,i,4232621143721109859,7370925778401288995,131072 /prefetch:2
        2⤵
          PID:1152
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1776 --field-trial-handle=1884,i,4232621143721109859,7370925778401288995,131072 /prefetch:8
          2⤵
            PID:5104
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2268 --field-trial-handle=1884,i,4232621143721109859,7370925778401288995,131072 /prefetch:8
            2⤵
              PID:4532
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2984 --field-trial-handle=1884,i,4232621143721109859,7370925778401288995,131072 /prefetch:1
              2⤵
                PID:1516
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2988 --field-trial-handle=1884,i,4232621143721109859,7370925778401288995,131072 /prefetch:1
                2⤵
                  PID:4492
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4356 --field-trial-handle=1884,i,4232621143721109859,7370925778401288995,131072 /prefetch:1
                  2⤵
                    PID:1468
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4488 --field-trial-handle=1884,i,4232621143721109859,7370925778401288995,131072 /prefetch:1
                    2⤵
                      PID:4040
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 --field-trial-handle=1884,i,4232621143721109859,7370925778401288995,131072 /prefetch:8
                      2⤵
                        PID:3620
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4612 --field-trial-handle=1884,i,4232621143721109859,7370925778401288995,131072 /prefetch:8
                        2⤵
                          PID:2660
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 --field-trial-handle=1884,i,4232621143721109859,7370925778401288995,131072 /prefetch:8
                          2⤵
                            PID:4312
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4364 --field-trial-handle=1884,i,4232621143721109859,7370925778401288995,131072 /prefetch:1
                            2⤵
                              PID:1700
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4088 --field-trial-handle=1884,i,4232621143721109859,7370925778401288995,131072 /prefetch:1
                              2⤵
                                PID:3624
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5292 --field-trial-handle=1884,i,4232621143721109859,7370925778401288995,131072 /prefetch:8
                                2⤵
                                  PID:4536
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5332 --field-trial-handle=1884,i,4232621143721109859,7370925778401288995,131072 /prefetch:8
                                  2⤵
                                    PID:1148
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=5376 --field-trial-handle=1884,i,4232621143721109859,7370925778401288995,131072 /prefetch:1
                                    2⤵
                                      PID:112
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=5780 --field-trial-handle=1884,i,4232621143721109859,7370925778401288995,131072 /prefetch:1
                                      2⤵
                                        PID:5260
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5992 --field-trial-handle=1884,i,4232621143721109859,7370925778401288995,131072 /prefetch:8
                                        2⤵
                                          PID:5580
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5892 --field-trial-handle=1884,i,4232621143721109859,7370925778401288995,131072 /prefetch:8
                                          2⤵
                                            PID:5132
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2824 --field-trial-handle=1884,i,4232621143721109859,7370925778401288995,131072 /prefetch:2
                                            2⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:5692
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4068 --field-trial-handle=1884,i,4232621143721109859,7370925778401288995,131072 /prefetch:8
                                            2⤵
                                            • Modifies registry class
                                            • Suspicious use of SetWindowsHookEx
                                            PID:1788
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1464 --field-trial-handle=1884,i,4232621143721109859,7370925778401288995,131072 /prefetch:8
                                            2⤵
                                            • Modifies registry class
                                            • Suspicious use of SetWindowsHookEx
                                            PID:1460
                                        • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                                          "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                                          1⤵
                                            PID:4892
                                          • C:\Windows\System32\rundll32.exe
                                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                            1⤵
                                              PID:5152
                                            • C:\Program Files\7-Zip\7zG.exe
                                              "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap31194:92:7zEvent25719
                                              1⤵
                                              • Suspicious use of FindShellTrayWindow
                                              PID:5696
                                            • C:\Program Files\7-Zip\7zG.exe
                                              "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Order_Treacking\" -spe -an -ai#7zMap12908:92:7zEvent27483
                                              1⤵
                                              • Suspicious use of FindShellTrayWindow
                                              PID:4404
                                            • C:\Users\Admin\Downloads\Order_Treacking\Order_Treacking.bat
                                              "C:\Users\Admin\Downloads\Order_Treacking\Order_Treacking.bat"
                                              1⤵
                                              • Drops startup file
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:3432
                                              • C:\Windows\SysWOW64\cmd.exe
                                                cmd.exe /c C:\Users\Admin\AppData\Local\Temp\
                                                2⤵
                                                  PID:4332
                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\zzrdakfk.exe
                                                  "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\zzrdakfk.exe"
                                                  2⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:3168

                                              Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\4a274a8d-19ef-40bd-a25f-e5ddb5555724.tmp

                                                Filesize

                                                98KB

                                                MD5

                                                030edde13efc82236a159fee14d94292

                                                SHA1

                                                408cd1b1715ecb8bf1ffb466793cda8e8b401027

                                                SHA256

                                                211d0f338e057eca87c5ce121e9ecaeec4d12be7b0d1db71682c683d863d163d

                                                SHA512

                                                e4842c2b12fdf80aca296c00efbdade200e467912e9ccb0c4a4ce663f625666011b1d2885dfdf2b90573f432209d055fb8e299623a75055667c38cc5602b128c

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000013

                                                Filesize

                                                201KB

                                                MD5

                                                f5bc40498b73af1cc23f51ea60130601

                                                SHA1

                                                44de2c184cf4e0a2b9106756fc860df9ed584666

                                                SHA256

                                                c11b6273f0c5f039dfef3bf5d8efe45a2ecf65966e89eeb1a6c2277d712ae9fb

                                                SHA512

                                                9c993ef3ec746cbe937bbe32735410257f94ceb6f734d75e401fb78dc2e3ab3b7d83c086086f0e1230dc8dafd5328f9af664341eb781c72e67c4d84d1f6c1112

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                Filesize

                                                624B

                                                MD5

                                                e823e7d37549ac43d0be320f5ef033ac

                                                SHA1

                                                75268e374699388b90acf21c010f80c30b43ce7f

                                                SHA256

                                                585adad21aaaa997cdb45581954ab5eb8ba07b8c8caa6ea80edbbe8bf4047ed7

                                                SHA512

                                                004cbb92cc6255f852713c3274c421393981487b218ab50148e91aaa662d67e7ee9cfdcf00d7bf3a0fcd44ce29fbf22eece740721b40440222a6d8a9baf05943

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                Filesize

                                                1KB

                                                MD5

                                                54a99db379c4416e9877ff6e78be9168

                                                SHA1

                                                4c0e03b6bf39ea4efbe4ef417c99e7dd61ae6122

                                                SHA256

                                                e0714c73e9f32cf020748392a3d6f993cc628d9347219f5f86b925254136cf05

                                                SHA512

                                                cbe0654f608abc838ae512e76029e1a0e15ae5a2cdd11c24e93a2c10a02598a8b4d1a6652dcc947fb34131cea57e029933302d7b840b63416d5dfd7799feda26

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                Filesize

                                                552B

                                                MD5

                                                92438521d5b97f74b73f0fb84683a6c5

                                                SHA1

                                                e63f6023d23b4cc2c191d4294e34863873a7bf23

                                                SHA256

                                                7b35732500007a30fae2e37a3a0ea1944a602999332cbb951a4a0b1b048fd3da

                                                SHA512

                                                51e74d7babe47ba6f00a4522a1fc9b34bffe6bf7a1e6841f507c542bdf4cde843c1e29e93387d70a8c180e9a7d8361bf4a2fc37337178b1b524fa5ba90642969

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                Filesize

                                                624B

                                                MD5

                                                13a3a49bd7bf9b86321cc6126dc6363d

                                                SHA1

                                                dae8cb854553a6362f457976c42b3442ab590b69

                                                SHA256

                                                dde7cf99473df041f0987e5e64176347db728b9b8e533a5b060e58934bf7f51d

                                                SHA512

                                                ee7836ffa07d05b4f7df2a2176df71f44a9e7f9d8bf74f7daa3f978c4c55a990c2960d8ddcf199af512b9e619f0b829f7e66cd34477fb99c3d10a070392434ee

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                Filesize

                                                4KB

                                                MD5

                                                583648d60e6857d31582f7033de6a812

                                                SHA1

                                                00d7aead9373e9b1c57f61b00551f9b52b0a8e6a

                                                SHA256

                                                a2d3a06a123a0e13110174d4944880eeba6d071dd16f471714852cceb5bc31e0

                                                SHA512

                                                3e0e821902dc879011133fa85aff5852a011a71fbd708dffe8717fd72a5eac1018cdc6a0b93fe71086bd88ef54987b9011703b740f367e31c15cba7353129d48

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                Filesize

                                                3KB

                                                MD5

                                                34170d35e43e4e976c6859025a22424f

                                                SHA1

                                                867f24b38592b4528a6db99c9162c626025e7579

                                                SHA256

                                                8dcd89c70f3e8fc1276763dbeba2350d64ef6ea35996d3fe739e530feb35dd68

                                                SHA512

                                                da087e88eb839624bb07160d38a8b5569567976f61e45425fbda3cf770a4f7cb2e352cf0303c7c40b5ace5979b88baa0b204131b27b3c7091485b63f1e50d517

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                Filesize

                                                4KB

                                                MD5

                                                98ccdac2251e984bbb22c06d093076b5

                                                SHA1

                                                43deee7ca0763378079339c9180fe02d72401184

                                                SHA256

                                                d092fc7cf7d9f0afd75a8e7d19a44e50f3f965db5b28dc529014d7afb6d73920

                                                SHA512

                                                dd97374ffe98a38b458d9e370c18cd8e27753f4f869f8d4231315497c123a3f4a7b25795c7478550aacb8595f66052be43e90765267b6ef49b7e5e2d5134e363

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                Filesize

                                                3KB

                                                MD5

                                                6a818fa5c33c47626a53a1673b002898

                                                SHA1

                                                facd66a21bfaa55d66689215de9b0920758a3524

                                                SHA256

                                                0268703e8b0a39fe06e22bf5069751fddfb30e857babbcc02b05e5589533a3d7

                                                SHA512

                                                b7be47041381bb37e3ec18257a10b6efdf1067adf49518af1003e0c25ac5dddd1a619ee21df9c3b1ef2846d3f43f8e36b472b6b17e226e4b7053da4ff12260ad

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                Filesize

                                                2B

                                                MD5

                                                d751713988987e9331980363e24189ce

                                                SHA1

                                                97d170e1550eee4afc0af065b78cda302a97674c

                                                SHA256

                                                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                SHA512

                                                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                Filesize

                                                690B

                                                MD5

                                                437bf4cd23745d39c61a2756b516f5c1

                                                SHA1

                                                435e6fa257f255ca907bfc5fa0c8ed095b8e9df5

                                                SHA256

                                                d5a304082b11d8513d20391ffc5610ad284296cb20984f88904855b1234d2839

                                                SHA512

                                                56881bc3a47ea1273b9a6c32182a007265d4b3b6d55f2f6fe27cd5c77419922b4cbdf4b67df60eca910e4fbd938ad3576b7a0ef898f7b49d62e59062435aa7ac

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                Filesize

                                                1KB

                                                MD5

                                                364af20d012fba00ae10502be3940940

                                                SHA1

                                                26f6ec08224828d7904570492daf4b20ae8acf15

                                                SHA256

                                                38baf1645de56f2dc56044ae5d343c50e988739aeb83bb1f1131bea96245ad90

                                                SHA512

                                                ec94dcc40da6337fec4e1d4538292fbadc28d5120fb9fe2d1e30dc2948f615120fc479734e1eb961dba767837799e603c92bc3152bef4ba5c71800d64bd99550

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                Filesize

                                                7KB

                                                MD5

                                                8820b8c9fa821ba0ee78d539f4fe51fd

                                                SHA1

                                                ef937a0249537add2bbc46bdeb66d1d535968425

                                                SHA256

                                                50d339717f1b3d921cb326f3025c4acf881fee21ac2212affbbce6f56da0ab0f

                                                SHA512

                                                f096321374c5f6734adea7bf8726570041d24874c0648812221692287185df53a17e0dbf8cf251a00102afde8efe84896c249f2d36bfe774234213483b4be813

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                Filesize

                                                7KB

                                                MD5

                                                958ac20c5460edeb76afbbae7a866da6

                                                SHA1

                                                203796bfa606d94033d35f7002c2719cad14b77c

                                                SHA256

                                                38c052a7cf44eb5a04bb5626fdb7efdb42d591e83788cde9aaa1f8c9d8a2c0d0

                                                SHA512

                                                fb8906a6be3021affb70bff3310a20dd55c6b2cc470721af956eb6b0e6d0f22ae714ada5e64fbda28c8390ec91b3dcae6cd4432e1c83ba37126192ebd56f6d44

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                Filesize

                                                72B

                                                MD5

                                                a6caa8afcd167f74b235cd8ec85f6428

                                                SHA1

                                                010b5b77736a00b545f2e88f4338fe448275708c

                                                SHA256

                                                e46f65c7f1e4bcecebcb312ac732f5a463151840b229b3469d8c39343b99d94a

                                                SHA512

                                                0b09d556abe205e8276fcc9efbf1179a0c585e9a908d074b37070efeeaa5e1fb2e3d0f5625c5b3b88c58a7589134ad2a80d4a9a47fdd1fab50c300e53277fa7b

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57c96a.TMP

                                                Filesize

                                                48B

                                                MD5

                                                356d4ccb9301e3a35eae87af96463be7

                                                SHA1

                                                65cf560622c754fd4a9af802f94c1dd8d5a9f687

                                                SHA256

                                                b294fcd5d99f5a3f7b862bbcfd7d52eca37313154d86641ba196935f216c4baa

                                                SHA512

                                                555648873384d4041b4738030f035959b31ee237e384e01853dc93d73264d54e3caf13dde8aadbc3cd3e9b8163894632faa29c28aa02b655f91ed729e831e86b

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                Filesize

                                                250KB

                                                MD5

                                                2a7dab470fb34e5fa985a90b5cd2b1c9

                                                SHA1

                                                b4d3f37ca69d4445a941416fea81336ec134e3a4

                                                SHA256

                                                9c56178fffd825d7b87226ed054e861900d2970a1ced7161be59d5647f2fe938

                                                SHA512

                                                1e8e09720a5ad30eec72afbc031c7fa1ede27d161c5a88e1aface649691d2875f25772e375c16c8b7a9d50fafcf2b14808b668335ad0776ca9f12d96dd736085

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe57df83.TMP

                                                Filesize

                                                94KB

                                                MD5

                                                67239ed01ac99a4fd73d6f72922ad9ce

                                                SHA1

                                                ef0147bb0485efbe6eec5a78e7246cddc018f987

                                                SHA256

                                                64b2ae6c406802db965b12d1bd4377d9e86409b9b07f9e822077e267eced5af4

                                                SHA512

                                                7eb54147014f92e688fb55d3adc1e13992b4f421c6ed6ff1f1a729d18a23c1e1f8536885c1e614f3be3449a79f95d62e5d2a4dd84d2f2a90740605e9101455c9

                                              • C:\Users\Admin\Downloads\Order_Treacking.zip

                                                Filesize

                                                328KB

                                                MD5

                                                5d8b4d9f16d4b7e8c700904bb70410aa

                                                SHA1

                                                dc8f91e324c54ceae94484cd2d8fced164ed4198

                                                SHA256

                                                2c3e17965160d77b2db580cc636c35fed008d502f5d2b6983997225c3335883f

                                                SHA512

                                                103db2b9c304f3c0f97d67633ab23b219ad1e9f900b17e2fb6204332a8d24e701c5c2b6008c980665fe2c9748c17fba29823d837ad732bf6ea424a5b6a3c2528

                                              • C:\Users\Admin\Downloads\Order_Treacking\Order_Treacking.bat

                                                Filesize

                                                476KB

                                                MD5

                                                565781132ea81f765a6e0d5e1bd1040e

                                                SHA1

                                                0ff2a6a3d8b50bfd0a2ddf3645b97b31be6f762e

                                                SHA256

                                                14ded248770d588adc93d96c05f5b2d4edd48517a705271bef373b6470f90549

                                                SHA512

                                                7d79a28d9e94036bd8a45983cba06bb5464b8e14109a35864fda4f74dc8a72eaab6988ef00ddae02582e7bfaa8fe479d3fcdf96d738c52f7305d478de1ad1e1d