Malware Analysis Report

2025-01-19 03:43

Sample ID 230802-ppdzcafg5y
Target https://adclick.g.doubleclick.net/aclk?sa=l&ai=CcawtmdWpZN3vJcqEvQS9uJuwB9aKiO5wtaaLvbERnriItoMDEAEgt-WEIWCbg-mEnCmgAae_sLsDyAEJqQLdbPFuJVQKPqgDAcgDywSqBN8BT9BzgMwBGHFx_nQRadglaDR5WggYPKoS27tMnk3PfgLAuIfvaTrFQhtwZRT98UsySKqP6fimCVLdaZ1g_KV3vIHlL-GqrtFzIDi1TBN6F-KPvQ_r2aWCNZBCa9ePZYKS2SDPxPNwrRp6CSsHJcVRAYQD55e9evztRwnV9UhHWfBPCVoe-qFDKeydDc7vmKgzBMBkd0sATfrTHVaCv6nfWtSjNreQg_JeTeObnZt4yzLt2aufuiiaYZZsja1n_m9y1rmyCFq8mdrjT0PtEG56C2f4F95VK3c9fFkG6mnOg8AE5bqVla0EoAYugAfBwM9EqAeOzhuoB5PYG6gH7paxAqgH_p6xAqgHpKOxAqgH1ckbqAemvhuoB5oGqAfz0RuoB5bYG6gHqpuxAqgHg62xAqgH_56xAqgH35-xAtgHANIIEQiAYRABGAAyAooCOgKAQEgA8ggNYmlkZGVyLTYwNzM1NLEJyhyd44KcXyuACgSYCwHICwGADAG4DAG4E-QD2BMN0BUBmBYB-BYBgBcB&ae=1&num=1&pr=13:ZKnVmQAAAAAZiAs9GfKiDOu5J0L43h7sy7MEpA&cid=CAQSKQBpAlJWn8eIQ6uF2cLb5YVlHV0Fu6kiccjaXtJEWO6uZYMVOIo2I2A2GAE&sig=AOD64_3OpQkFEYQ0IhFLzP4vwYpmcaLaoQ&client=ca-pub-5722610347565274&rf=1&nb=7&adurl=https%3A%2F%2Fsecure.adnxs.com/seg?redir=https://metrotube.com.my/wp-admin/includes/[email protected]
Tags
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

Threat Level: Known bad

The file https://adclick.g.doubleclick.net/aclk?sa=l&ai=CcawtmdWpZN3vJcqEvQS9uJuwB9aKiO5wtaaLvbERnriItoMDEAEgt-WEIWCbg-mEnCmgAae_sLsDyAEJqQLdbPFuJVQKPqgDAcgDywSqBN8BT9BzgMwBGHFx_nQRadglaDR5WggYPKoS27tMnk3PfgLAuIfvaTrFQhtwZRT98UsySKqP6fimCVLdaZ1g_KV3vIHlL-GqrtFzIDi1TBN6F-KPvQ_r2aWCNZBCa9ePZYKS2SDPxPNwrRp6CSsHJcVRAYQD55e9evztRwnV9UhHWfBPCVoe-qFDKeydDc7vmKgzBMBkd0sATfrTHVaCv6nfWtSjNreQg_JeTeObnZt4yzLt2aufuiiaYZZsja1n_m9y1rmyCFq8mdrjT0PtEG56C2f4F95VK3c9fFkG6mnOg8AE5bqVla0EoAYugAfBwM9EqAeOzhuoB5PYG6gH7paxAqgH_p6xAqgHpKOxAqgH1ckbqAemvhuoB5oGqAfz0RuoB5bYG6gHqpuxAqgHg62xAqgH_56xAqgH35-xAtgHANIIEQiAYRABGAAyAooCOgKAQEgA8ggNYmlkZGVyLTYwNzM1NLEJyhyd44KcXyuACgSYCwHICwGADAG4DAG4E-QD2BMN0BUBmBYB-BYBgBcB&ae=1&num=1&pr=13:ZKnVmQAAAAAZiAs9GfKiDOu5J0L43h7sy7MEpA&cid=CAQSKQBpAlJWn8eIQ6uF2cLb5YVlHV0Fu6kiccjaXtJEWO6uZYMVOIo2I2A2GAE&sig=AOD64_3OpQkFEYQ0IhFLzP4vwYpmcaLaoQ&client=ca-pub-5722610347565274&rf=1&nb=7&adurl=https%3A%2F%2Fsecure.adnxs.com/seg?redir=https://metrotube.com.my/wp-admin/includes/[email protected] was found to be: Known bad.

Malicious Activity Summary


Suspicious use of AdjustPrivilegeToken

Suspicious use of FindShellTrayWindow

Suspicious use of SendNotifyMessage

Suspicious use of WriteProcessMemory

Modifies data under HKEY_USERS

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-08-02 12:29

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-08-02 12:29

Reported

2023-08-02 12:40

Platform

win10v2004-20230703-en

Max time kernel

600s

Max time network

588s

Command Line

"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://adclick.g.doubleclick.net/aclk?sa=l&ai=CcawtmdWpZN3vJcqEvQS9uJuwB9aKiO5wtaaLvbERnriItoMDEAEgt-WEIWCbg-mEnCmgAae_sLsDyAEJqQLdbPFuJVQKPqgDAcgDywSqBN8BT9BzgMwBGHFx_nQRadglaDR5WggYPKoS27tMnk3PfgLAuIfvaTrFQhtwZRT98UsySKqP6fimCVLdaZ1g_KV3vIHlL-GqrtFzIDi1TBN6F-KPvQ_r2aWCNZBCa9ePZYKS2SDPxPNwrRp6CSsHJcVRAYQD55e9evztRwnV9UhHWfBPCVoe-qFDKeydDc7vmKgzBMBkd0sATfrTHVaCv6nfWtSjNreQg_JeTeObnZt4yzLt2aufuiiaYZZsja1n_m9y1rmyCFq8mdrjT0PtEG56C2f4F95VK3c9fFkG6mnOg8AE5bqVla0EoAYugAfBwM9EqAeOzhuoB5PYG6gH7paxAqgH_p6xAqgHpKOxAqgH1ckbqAemvhuoB5oGqAfz0RuoB5bYG6gHqpuxAqgHg62xAqgH_56xAqgH35-xAtgHANIIEQiAYRABGAAyAooCOgKAQEgA8ggNYmlkZGVyLTYwNzM1NLEJyhyd44KcXyuACgSYCwHICwGADAG4DAG4E-QD2BMN0BUBmBYB-BYBgBcB&ae=1&num=1&pr=13:ZKnVmQAAAAAZiAs9GfKiDOu5J0L43h7sy7MEpA&cid=CAQSKQBpAlJWn8eIQ6uF2cLb5YVlHV0Fu6kiccjaXtJEWO6uZYMVOIo2I2A2GAE&sig=AOD64_3OpQkFEYQ0IhFLzP4vwYpmcaLaoQ&client=ca-pub-5722610347565274&rf=1&nb=7&adurl=https%3A%2F%2Fsecure.adnxs.com/seg?redir=https://metrotube.com.my/wp-admin/includes/[email protected]

Signatures

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133354530133762120" C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3172 wrote to memory of 4452 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 4452 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 2664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 2664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 2664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 2664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 2664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 2664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 2664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 2664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 2664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 2664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 2664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 2664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 2664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 2664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 2664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 2664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 2664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 2664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 2664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 2664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 2664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 2664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 2664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 2664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 2664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 2664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 2664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 2664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 2664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 2664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 2664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 2664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 2664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 2664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 2664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 2664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 2664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 2664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 1064 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 1064 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 1016 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 1016 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 1016 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 1016 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 1016 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 1016 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 1016 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 1016 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 1016 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 1016 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 1016 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 1016 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 1016 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 1016 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 1016 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 1016 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 1016 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 1016 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 1016 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 1016 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 1016 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3172 wrote to memory of 1016 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe

Processes

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://adclick.g.doubleclick.net/aclk?sa=l&ai=CcawtmdWpZN3vJcqEvQS9uJuwB9aKiO5wtaaLvbERnriItoMDEAEgt-WEIWCbg-mEnCmgAae_sLsDyAEJqQLdbPFuJVQKPqgDAcgDywSqBN8BT9BzgMwBGHFx_nQRadglaDR5WggYPKoS27tMnk3PfgLAuIfvaTrFQhtwZRT98UsySKqP6fimCVLdaZ1g_KV3vIHlL-GqrtFzIDi1TBN6F-KPvQ_r2aWCNZBCa9ePZYKS2SDPxPNwrRp6CSsHJcVRAYQD55e9evztRwnV9UhHWfBPCVoe-qFDKeydDc7vmKgzBMBkd0sATfrTHVaCv6nfWtSjNreQg_JeTeObnZt4yzLt2aufuiiaYZZsja1n_m9y1rmyCFq8mdrjT0PtEG56C2f4F95VK3c9fFkG6mnOg8AE5bqVla0EoAYugAfBwM9EqAeOzhuoB5PYG6gH7paxAqgH_p6xAqgHpKOxAqgH1ckbqAemvhuoB5oGqAfz0RuoB5bYG6gHqpuxAqgHg62xAqgH_56xAqgH35-xAtgHANIIEQiAYRABGAAyAooCOgKAQEgA8ggNYmlkZGVyLTYwNzM1NLEJyhyd44KcXyuACgSYCwHICwGADAG4DAG4E-QD2BMN0BUBmBYB-BYBgBcB&ae=1&num=1&pr=13:ZKnVmQAAAAAZiAs9GfKiDOu5J0L43h7sy7MEpA&cid=CAQSKQBpAlJWn8eIQ6uF2cLb5YVlHV0Fu6kiccjaXtJEWO6uZYMVOIo2I2A2GAE&sig=AOD64_3OpQkFEYQ0IhFLzP4vwYpmcaLaoQ&client=ca-pub-5722610347565274&rf=1&nb=7&adurl=https%3A%2F%2Fsecure.adnxs.com/seg?redir=https://metrotube.com.my/wp-admin/includes/[email protected]

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd12599758,0x7ffd12599768,0x7ffd12599778

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1920,i,6458684599938146447,9249477949249501115,131072 /prefetch:2

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1920,i,6458684599938146447,9249477949249501115,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2260 --field-trial-handle=1920,i,6458684599938146447,9249477949249501115,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3048 --field-trial-handle=1920,i,6458684599938146447,9249477949249501115,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3080 --field-trial-handle=1920,i,6458684599938146447,9249477949249501115,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4628 --field-trial-handle=1920,i,6458684599938146447,9249477949249501115,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4920 --field-trial-handle=1920,i,6458684599938146447,9249477949249501115,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5176 --field-trial-handle=1920,i,6458684599938146447,9249477949249501115,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 --field-trial-handle=1920,i,6458684599938146447,9249477949249501115,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 --field-trial-handle=1920,i,6458684599938146447,9249477949249501115,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4552 --field-trial-handle=1920,i,6458684599938146447,9249477949249501115,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 --field-trial-handle=1920,i,6458684599938146447,9249477949249501115,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=1800 --field-trial-handle=1920,i,6458684599938146447,9249477949249501115,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2764 --field-trial-handle=1920,i,6458684599938146447,9249477949249501115,131072 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 59.128.231.4.in-addr.arpa udp
US 8.8.8.8:53 adclick.g.doubleclick.net udp
NL 142.251.36.2:443 adclick.g.doubleclick.net tcp
US 8.8.8.8:53 secure.adnxs.com udp
NL 185.89.210.122:443 secure.adnxs.com tcp
US 8.8.8.8:53 metrotube.com.my udp
MY 185.93.164.203:443 metrotube.com.my tcp
MY 185.93.164.203:443 metrotube.com.my tcp
US 8.8.8.8:53 126.24.238.8.in-addr.arpa udp
US 8.8.8.8:53 2.36.251.142.in-addr.arpa udp
US 8.8.8.8:53 234.168.217.172.in-addr.arpa udp
US 8.8.8.8:53 98.39.251.142.in-addr.arpa udp
US 8.8.8.8:53 busy-beryl-pedestrian.glitch.me udp
US 54.152.166.72:443 busy-beryl-pedestrian.glitch.me tcp
US 54.152.166.72:443 busy-beryl-pedestrian.glitch.me tcp
US 8.8.8.8:53 122.210.89.185.in-addr.arpa udp
US 8.8.8.8:53 203.164.93.185.in-addr.arpa udp
US 8.8.8.8:53 17.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 72.166.152.54.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 ipfs.io udp
US 209.94.90.1:443 ipfs.io tcp
US 209.94.90.1:443 ipfs.io tcp
US 8.8.8.8:53 apps.identrust.com udp
NL 88.221.25.153:80 apps.identrust.com tcp
US 8.8.8.8:53 stackpath.bootstrapcdn.com udp
US 8.8.8.8:53 code.jquery.com udp
US 8.8.8.8:53 cdnjs.cloudflare.com udp
US 8.8.8.8:53 maxcdn.bootstrapcdn.com udp
US 8.8.8.8:53 ajax.googleapis.com udp
NL 142.250.179.170:443 ajax.googleapis.com tcp
US 104.18.10.207:443 maxcdn.bootstrapcdn.com tcp
US 104.18.10.207:443 maxcdn.bootstrapcdn.com tcp
US 104.18.10.207:443 maxcdn.bootstrapcdn.com tcp
US 69.16.175.10:443 code.jquery.com tcp
US 104.17.25.14:443 cdnjs.cloudflare.com tcp
US 8.8.8.8:53 ipfs.tech udp
NL 84.17.46.54:443 ipfs.tech tcp
US 8.8.8.8:53 logo.clearbit.com udp
US 8.8.8.8:53 image.thum.io udp
US 8.8.8.8:53 content-autofill.googleapis.com udp
NL 65.9.86.8:443 logo.clearbit.com tcp
NL 13.227.219.35:443 image.thum.io tcp
US 8.8.8.8:53 17.211.227.13.in-addr.arpa udp
US 8.8.8.8:53 1.90.94.209.in-addr.arpa udp
US 8.8.8.8:53 153.25.221.88.in-addr.arpa udp
US 8.8.8.8:53 170.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 207.10.18.104.in-addr.arpa udp
US 8.8.8.8:53 14.25.17.104.in-addr.arpa udp
US 8.8.8.8:53 10.175.16.69.in-addr.arpa udp
US 8.8.8.8:53 54.46.17.84.in-addr.arpa udp
NL 172.217.168.202:443 content-autofill.googleapis.com tcp
US 8.8.8.8:53 8.86.9.65.in-addr.arpa udp
US 8.8.8.8:53 35.219.227.13.in-addr.arpa udp
US 8.8.8.8:53 202.168.217.172.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 208.194.73.20.in-addr.arpa udp
US 8.8.8.8:53 cozytinyhouse.com udp
US 188.114.96.1:443 cozytinyhouse.com tcp
US 8.8.8.8:53 1.96.114.188.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 188.114.96.1:443 cozytinyhouse.com udp
US 8.8.8.8:53 nihonbashicolombia.org udp
US 106.0.62.70:443 nihonbashicolombia.org tcp
US 106.0.62.70:443 nihonbashicolombia.org tcp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 106.0.62.70:443 nihonbashicolombia.org udp
US 8.8.8.8:53 70.62.0.106.in-addr.arpa udp
US 8.8.8.8:53 161.252.72.23.in-addr.arpa udp
US 8.8.8.8:53 195.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 beacons.gcp.gvt2.com udp
US 192.178.49.3:443 beacons.gcp.gvt2.com tcp
US 192.178.49.3:443 beacons.gcp.gvt2.com tcp
US 8.8.8.8:53 beacons2.gvt2.com udp
US 216.239.38.117:443 beacons2.gvt2.com tcp
US 216.239.38.117:443 beacons2.gvt2.com udp
US 8.8.8.8:53 3.49.178.192.in-addr.arpa udp
US 8.8.8.8:53 117.38.239.216.in-addr.arpa udp
US 8.8.8.8:53 8.173.189.20.in-addr.arpa udp
US 192.178.49.3:443 beacons.gcp.gvt2.com udp

Files

\??\pipe\crashpad_3172_JDRDNXDEDLGNWFJI

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 b2a949032887cafbf434834041b58014
SHA1 49673d5982017bca482aa4746008dbf84964d9e8
SHA256 426764526f21c42e6339f1255702d39823c5343ef41a114473b2858cefa2ef00
SHA512 7315d37df2d7e7269cc6fc6a67eb701e179424dea667b7f5752547ec14395805abd1f0034d934ef6e12fd00f14f9e41ed4d93047ac8b50bd5a554ce8b431bd5d

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

MD5 99914b932bd37a50b983c5e7c90ae93b
SHA1 bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA256 44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA512 27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 14e9cc0e6c33f3c39eeb75c0fd05933a
SHA1 6e6a72a6631b779c750846594aaa7d0976d923eb
SHA256 e2c4eb2774f766a434da8a760e3e611372ab638c5c902134cdb4f19f1fb0ac0d
SHA512 de41d8fb98e2315ab02862e8e5850301c2f4db81cebc520b4c68a3a2a48ddfc9531d9bb0afd378413c1a1181f337cfe87e51b2edcade14cd14c1544d52c3f180

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 a837b1a8ca80cf86a1c2242e360ac130
SHA1 9f2e617ed02d52f41e2cb360c351bcc0e100a3a5
SHA256 9672f2c746b0be5ea0149effae826104351f9cb31d1d6acf7bb038fb81087567
SHA512 0e9c1e3ba9e657c7a4680b635374b997148d4f0f4ea5eb68681e604235a8294cd6f7db4d839da0ad678b88493c0f3cd8489a1cb57151b4a42edb1ac6c4246320

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

MD5 232b80b2330d8ceb2be893f97a30710d
SHA1 8469ee75b0a352cd7ecf3f0f42f64cd3fd6bab51
SHA256 61a4d45f1958f855644bde621edf50a6a62df67c7a353b8a791dce553b634825
SHA512 c96af7b50a663858cd13bff6ad6912903347214171d72f8f64243ebd1c2141a61cc4244a19796057ac0444f71cea2d9e3ee7563835f6d269298fdf1c3d5dd4be

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 743f3963a950b5406c44b3dc52e7faaf
SHA1 0d5110458e0b446e2b5ba82ccdf82fba3f70948f
SHA256 79c37f8424674947c13a387450722d05f0a11b9ae950d4b88771b5f26bd0c04d
SHA512 1a15dd40e10c476283b4e7b419a2d6fb10cb0fb4564bdaedfaa292a6707d90093555f0430ffbaf620396a2b1813d8fde6e29e5d6c329466c5256aec4412ff88d

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 9a115d6db618dfabd68c96942901bed0
SHA1 8c1ba4bbb49ecdb2e9044d4d4de3a20f6ebdfc10
SHA256 323bc7ffe321deb555d48531d500f66f33234c392462ac5f34fcf248deff8cf1
SHA512 df382632b90d5b71259b986489156cfded3b4c52ad3d530736134e5a9147c4cbc9d108298f3ed902bac89461d23e711c4d351212c87079a92bf5d7416ca24e64

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

MD5 6ce2320130c1fa4ce1abb0c59e8863cc
SHA1 71bd614d1b51f709aaeb38ed099a144ed6b7d59e
SHA256 ff81bcb8521dcf4e5ef24c3874957f984652189dd6058ebc397072a82f1e54ee
SHA512 0ac5648c1ff48c80fbf876d6046d281b566a00e4e5bd354d8c1c12ffb7b3b1c7cc439cc1630efa1e38088fdc5a3a0069945b7297e0729eea1f53c2a2da14ee0c

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 24ba59e447f8c3a0929c08516e6dccb6
SHA1 49d7160f05b880a94f17c29a62afea4c0da116c5
SHA256 e99820746ae2f1daef8934a0caa9ba9f49669720646072dad3228b9576025e00
SHA512 2f84ad7587b38da4450660d5da9c71b4c124af4c6b164a50769cebcf567ea6a18f7e5b006b5f4b1b5d6a048ae18e820243318a347fe4e32a9cb70983b582c9e1

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

MD5 6579fbd3770b840242ba3805cbb13862
SHA1 41d1fea05c16051403a4b6532e0197fbe3b563a1
SHA256 488c86389985ad8a60fccaffc53f98618f2f07a61af857c474c97caa8d496ba1
SHA512 3a67c2f7a4b2bf205a4e940a10f6cdb906eae1dd22d707279cedaba22ef3640594f2a04fb512a9664585134d58a096e748c398b9bc7b147ac8222d8e5e70fefc

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 13ae51c7bcee5cd4f1d6a99ac82ac2d2
SHA1 d90305f4afc6314049935db0558230b8c7112660
SHA256 0a5ca79fe07bc5df0cfe15dc095bd1c70a342244a98558ca2a2b1fa9ddea3331
SHA512 c20e52bf93197e56dd6e6b381f863c2b0def02f4093c1ea6f90b19d8800143c34999861200170ac71bd430244181d18aeb29e86fe0d787b494b683700b300f6b

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

MD5 11df819b8d2fc1919fb69c0dbd5deb4f
SHA1 7ab2b4c791268084cbef6cb8be5dfec3427ac150
SHA256 55dc831fe96bfdb8e68b004a599ed8f603c5e1c9ead651d8864ba5a1a68b904c
SHA512 4eab0f73758ea5705be00a73f71c52973b27621a1598b946df03c384251dd35d2215ad139c90c1a282c0afd6664869e29b2424d712b1239a2d7f17b165eeb0fe