Resubmissions

22/03/2025, 19:39

250322-ydaxzstjy7 7

22/03/2025, 19:21

250322-x2mq1syxew 10

Analysis

  • max time kernel
    190s
  • max time network
    183s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 19:21

General

  • Target

    https://purejoyaroma.com/v1.2/fonts/qanej

Malware Config

Extracted

Family

kutaki

C2

http://91.223.82.87/~ojorobia/laptop/laptop.php

Signatures

  • Kutaki

    Information stealer and keylogger that hides inside legitimate Visual Basic applications.

  • Kutaki family
  • Drops startup file 10 IoCs
  • Executes dropped EXE 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 20 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 42 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 30 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://purejoyaroma.com/v1.2/fonts/qanej
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1580
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffba451dcf8,0x7ffba451dd04,0x7ffba451dd10
      2⤵
        PID:4952
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1520,i,11200624600641632223,2056010565327807270,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2108 /prefetch:3
        2⤵
          PID:3468
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2076,i,11200624600641632223,2056010565327807270,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2072 /prefetch:2
          2⤵
            PID:1244
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2400,i,11200624600641632223,2056010565327807270,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2416 /prefetch:8
            2⤵
              PID:1320
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3056,i,11200624600641632223,2056010565327807270,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3108 /prefetch:1
              2⤵
                PID:4972
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3060,i,11200624600641632223,2056010565327807270,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3132 /prefetch:1
                2⤵
                  PID:4420
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4280,i,11200624600641632223,2056010565327807270,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4296 /prefetch:2
                  2⤵
                    PID:2220
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4776,i,11200624600641632223,2056010565327807270,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4768 /prefetch:1
                    2⤵
                      PID:3452
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5524,i,11200624600641632223,2056010565327807270,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3108 /prefetch:8
                      2⤵
                        PID:4072
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5528,i,11200624600641632223,2056010565327807270,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3124 /prefetch:8
                        2⤵
                          PID:3384
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=5876,i,11200624600641632223,2056010565327807270,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3216 /prefetch:1
                          2⤵
                            PID:5060
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4764,i,11200624600641632223,2056010565327807270,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5752 /prefetch:8
                            2⤵
                              PID:4080
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=208,i,11200624600641632223,2056010565327807270,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4888 /prefetch:8
                              2⤵
                                PID:4252
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5908,i,11200624600641632223,2056010565327807270,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4828 /prefetch:8
                                2⤵
                                  PID:2444
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5748,i,11200624600641632223,2056010565327807270,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5668 /prefetch:8
                                  2⤵
                                    PID:3872
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=5708,i,11200624600641632223,2056010565327807270,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4916 /prefetch:8
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:3760
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=on_device_model.mojom.OnDeviceModelService --lang=en-US --service-sandbox-type=on_device_model_execution --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=3880,i,11200624600641632223,2056010565327807270,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=1216 /prefetch:8
                                    2⤵
                                      PID:4572
                                  • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                    "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                    1⤵
                                      PID:4168
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                      1⤵
                                        PID:5196
                                      • C:\Windows\System32\rundll32.exe
                                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                        1⤵
                                          PID:1816
                                        • C:\Users\Admin\AppData\Local\Temp\Temp2_HDFC CHALLAN.zip\HDFC CHALLAN.bat
                                          "C:\Users\Admin\AppData\Local\Temp\Temp2_HDFC CHALLAN.zip\HDFC CHALLAN.bat"
                                          1⤵
                                          • Drops startup file
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious use of SetWindowsHookEx
                                          PID:4652
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd.exe /c C:\Users\Admin\AppData\Local\Temp\
                                            2⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:2064
                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bajnssfk.exe
                                            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bajnssfk.exe"
                                            2⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of SetWindowsHookEx
                                            PID:4972
                                        • C:\Users\Admin\AppData\Local\Temp\Temp2_HDFC CHALLAN.zip\HDFC CHALLAN.bat
                                          "C:\Users\Admin\AppData\Local\Temp\Temp2_HDFC CHALLAN.zip\HDFC CHALLAN.bat"
                                          1⤵
                                          • Drops startup file
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2244
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd.exe /c C:\Users\Admin\AppData\Local\Temp\
                                            2⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:1928
                                          • C:\Windows\SysWOW64\taskkill.exe
                                            taskkill /im bajnssfk.exe /f
                                            2⤵
                                            • System Location Discovery: System Language Discovery
                                            • Kills process with taskkill
                                            PID:4008
                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bajnssfk.exe
                                            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bajnssfk.exe"
                                            2⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of SetWindowsHookEx
                                            PID:3580
                                        • C:\Users\Admin\AppData\Local\Temp\Temp2_HDFC CHALLAN.zip\HDFC CHALLAN.bat
                                          "C:\Users\Admin\AppData\Local\Temp\Temp2_HDFC CHALLAN.zip\HDFC CHALLAN.bat"
                                          1⤵
                                          • Drops startup file
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious use of SetWindowsHookEx
                                          PID:3416
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd.exe /c C:\Users\Admin\AppData\Local\Temp\
                                            2⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:3604
                                          • C:\Windows\SysWOW64\taskkill.exe
                                            taskkill /im bajnssfk.exe /f
                                            2⤵
                                            • System Location Discovery: System Language Discovery
                                            • Kills process with taskkill
                                            PID:2744
                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bajnssfk.exe
                                            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bajnssfk.exe"
                                            2⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of SetWindowsHookEx
                                            PID:5252
                                        • C:\Users\Admin\Downloads\HDFC CHALLAN.bat
                                          "C:\Users\Admin\Downloads\HDFC CHALLAN.bat"
                                          1⤵
                                          • Drops startup file
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious use of SetWindowsHookEx
                                          PID:5436
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd.exe /c C:\Users\Admin\AppData\Local\Temp\
                                            2⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:5388
                                          • C:\Windows\SysWOW64\taskkill.exe
                                            taskkill /im bajnssfk.exe /f
                                            2⤵
                                            • System Location Discovery: System Language Discovery
                                            • Kills process with taskkill
                                            PID:2832
                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dfjdtvfk.exe
                                            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dfjdtvfk.exe"
                                            2⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of SetWindowsHookEx
                                            PID:3272
                                        • C:\Users\Admin\Downloads\HDFC CHALLAN.bat
                                          "C:\Users\Admin\Downloads\HDFC CHALLAN.bat"
                                          1⤵
                                          • Drops startup file
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1608
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd.exe /c C:\Users\Admin\AppData\Local\Temp\
                                            2⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:3720
                                          • C:\Windows\SysWOW64\taskkill.exe
                                            taskkill /im dfjdtvfk.exe /f
                                            2⤵
                                            • System Location Discovery: System Language Discovery
                                            • Kills process with taskkill
                                            PID:3452
                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dfjdtvfk.exe
                                            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dfjdtvfk.exe"
                                            2⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of SetWindowsHookEx
                                            PID:4772
                                        • C:\Windows\explorer.exe
                                          C:\Windows\explorer.exe /factory,{5BD95610-9434-43C2-886C-57852CC8A120} -Embedding
                                          1⤵
                                          • Drops file in Windows directory
                                          • Modifies Internet Explorer settings
                                          • Modifies registry class
                                          • Suspicious behavior: AddClipboardFormatListener
                                          • Suspicious behavior: GetForegroundWindowSpam
                                          • Suspicious use of FindShellTrayWindow
                                          PID:5328
                                        • C:\Windows\SysWOW64\DllHost.exe
                                          C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
                                          1⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:3732

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                          Filesize

                                          649B

                                          MD5

                                          cb5720f4714029fbd3e5d097660bbbbe

                                          SHA1

                                          c060c9b977743928b7d63837586425a2dc53c88c

                                          SHA256

                                          26746c60110bac5ccfa1fc6822805fb73293f685d6816a36a99b70a0f6a62133

                                          SHA512

                                          236dfd685457e75d0e3f9a7888c43356687a5877cf291546920d712eb0e80e24f8cbaa5cd58b5e0a86589298ce678864d5fa6f07b64951336ab096d0b22516e9

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                          Filesize

                                          2KB

                                          MD5

                                          bca9068d5d37b198be81157fa4163ec2

                                          SHA1

                                          e4fe02ed6b76e5c5b5addbd59076338241c6088b

                                          SHA256

                                          b7f1dc0c420fdbab130cfca04419cb1c7278de8c6b7f4be51210d2c6fdc2d460

                                          SHA512

                                          5adc67a387437474e7c0c3cc42efdeb740e2b094dd5ea9582cb66d00861ad2a9d10198c807644cf4a4a1abebee2b14b8cc0512e3a45858382f4d39c743b9104f

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                          Filesize

                                          2B

                                          MD5

                                          d751713988987e9331980363e24189ce

                                          SHA1

                                          97d170e1550eee4afc0af065b78cda302a97674c

                                          SHA256

                                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                          SHA512

                                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          10KB

                                          MD5

                                          ef0ed0432f635dd054995e92a36143d7

                                          SHA1

                                          d79f09763e7d4d2bd1ee2d44856a300ab70d1373

                                          SHA256

                                          2f93f5336afe858babe697a8848f23f0dd2673e520a3c118f4e9839bce3dbca3

                                          SHA512

                                          f071e147cf9320975cd09db67f271760bea77dd9447dce3a4db18267e5fa8da90a97844bfd93282c1e766342a97d4c01bf1c0ad15425617543ba3442bad6695b

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          11KB

                                          MD5

                                          2a6d9c73baebb3bc3870e29d90a92963

                                          SHA1

                                          da38e7b85cae207b7f0c181b02e7974af483d417

                                          SHA256

                                          58c3635f4327f26dbbfa508cbb41222fc5fa39daf4b560622ceee98dc822ee04

                                          SHA512

                                          ddc371dd94bb539453402528ea59bce21fdbdcd091c340e2553c8658e892ddc25e021d35c19154b4f01eefed9a52d774dfe3727d741c9b7e6ac89539ea4182ed

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                          Filesize

                                          15KB

                                          MD5

                                          328c996b51b6cd31ae0b3302686b612d

                                          SHA1

                                          2830f5d4e26278403aaf6b36de2c4273100265ac

                                          SHA256

                                          d036f2520fe83f5001b255f7008ebb03622edf5d1c4c9a89a786e31a1d321030

                                          SHA512

                                          abae3ccc6a0ff87b5ba8c8b5ab90f8af02ad9419a2d1f4a7259003d76fad600a81b8e953ac08ce93e00d85324041fb3a446fbe97b3b02c0a3863f2e645c31070

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                          Filesize

                                          72B

                                          MD5

                                          36912dc9ec8a3a419bc260f2a984a197

                                          SHA1

                                          945815fe1da8a16e36d95eb0afba03e1bbea0257

                                          SHA256

                                          a17c576a9974c1adf91469f16192d36749e7ec999be0824709f8690d63cfa2bd

                                          SHA512

                                          79a27f11ef9cc6efcd4674939e6922e929fadc01aa3088d708e746de52712e0a9dbe9e98c19daa763241d127c273cfab118f9d47465c18fa22615cb2629063af

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe581102.TMP

                                          Filesize

                                          48B

                                          MD5

                                          532255d829460c56deb721b362e6cb5d

                                          SHA1

                                          80c42794b930aa1101b7a66b2f72fba778041ec3

                                          SHA256

                                          8447bfc5040e0680642be770fb19575ff9ced8e6fd06fa911aa6670adff7fc88

                                          SHA512

                                          28c9cffc630e67f7999eb27c58c0d6fcf71874d33e8e1fa776557e225c2a0bb7508869c8b48e174f3e82d811e6a85be12180d38510acffb60331ff8145cf1fe5

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                          Filesize

                                          80KB

                                          MD5

                                          b8eeabac8d29b45f0d9588210dce5340

                                          SHA1

                                          230220ced1bba97717b15d9fa3a1f6b26930e774

                                          SHA256

                                          25117ba90bc324f6065840e4662053745af37e55f8d15a87a0e40506423c355e

                                          SHA512

                                          a14d70399f8ecb1ae9f6121f4433446214f360e2c74cdebfe062b8ef64119c961c7418389b124e061956ef5cb15b4f773cc768d5656e5cf03e3a3071a4ab9aae

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                          Filesize

                                          81KB

                                          MD5

                                          97ae9938a44dc3871c83742f9276bf91

                                          SHA1

                                          b825e2450eca1b5a52005089a802096d3f02a2fd

                                          SHA256

                                          c1798a0405e2fb81d453041be5e54dbf969864a88f6bba73fb0530baf7be3558

                                          SHA512

                                          7474bb064b1b4c503b689084079f40206d0b9c17bd61ec56c1d2d87fe8b2b9067e91e10bf7a67d45f21e519d6f121781cece33e76fde0f81ebae30b6c55a79ee

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                          Filesize

                                          81KB

                                          MD5

                                          1b5969d04c8e049ec025bc66c8782c99

                                          SHA1

                                          6875d9b277f80554a6b1222e522c59a5e296b6f7

                                          SHA256

                                          d7fb755a29250fd1ad0c6761702ca79d985bb5e2e085190f61fe9161c624a10f

                                          SHA512

                                          90e93bb463a379ea48c10946e8f4328faaf019f431586b58dd5da5aa0362bd0404c06ff113fcee16f11af8f2f1dbfc17c5fb306023d4fbe4c57bd139133526f4

                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bajnssfk.exe

                                          Filesize

                                          500KB

                                          MD5

                                          0bf5903099c9aa35783dc0bb980e7ebe

                                          SHA1

                                          f9bdd08f52948dd7429dc127f56f6fa08b278ee0

                                          SHA256

                                          60694d9024e1988c2a5a1ad4e73796ebc75d46c2020444dfdde4ec7d9751f801

                                          SHA512

                                          4d564771cb5f006316c837cef4c09843ead21569f392674dc418481f00da6a6143886074788ce78e4ccf32ac3e84404c6ca89a86f8bbe4dbca4fae8fff57fad5

                                        • C:\Users\Admin\Downloads\HDFC CHALLAN.zip.crdownload

                                          Filesize

                                          333KB

                                          MD5

                                          57f4405f389bc9b25d48667509166738

                                          SHA1

                                          70179157b9e24fd4295eeb3e586fb650aec7dc56

                                          SHA256

                                          5f66a88744746018929af0add4d19434af4759be047cfed6aec018471673b768

                                          SHA512

                                          d611dd3c6c46e5292e153e411c1cc2902ceece0045253090e0885366b6ed1c535aea8f2f70df29fdbc413cd3a25bd2f3cbbb27e450dd152cfb8362852e9b2ecb