Malware Analysis Report

2025-08-05 15:38

Sample ID 240530-caz7tabc56
Target https://click.egifter.com/?t=eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.eyJtZXNzYWdlaWQiOiIyYTM1MDkzOS1jNWRlLTQ5ZjctOTNlZS00YTdlNTQwNGM4NWEiLCJsaW5rIjoiaHR0cHM6Ly9jbGFpbXMuc3RvcmVkdmFsdWUuY29tL2NsYWltL2dpZnQvNjRiNDk0Y2ItZWEyYy00MzYzLWExMTAtMDA2NWUwOWZmMGZjL0lDSkpWUTVRVXdkQVV3MWVCQUZXV0VjQUF3WWZVVXhBWFVaU0N3SlhYZzFRV0VOTUFGb0lYMThBUVFGZFFWTUgwP2xhbmc9ZW4tVVMmY3VsdHVyZT1lbi1VUyIsImVudiI6ImVnbSJ9.YViUFURw11wT1fmwkwQLV2_KCXL0XYDPWL4nkLA_-RhEpgW_6M8VCa2AZ303JSCtfg9tnrk7WQF79OhlKG4J-hA6T7XKMnkPE8ByWjE7XnSIVHlsBvWPZpVMcBdYVehvPuu4QQPJHXRo4gEz20Dt-BQ0PJZj8JQtDAgWVGMfRjAR3EpAyE-qdkl_5RFJVaFQMUUnaMaeQLixvH1JmA_TtjDa_kFeysL2CeourHvhb0N1u4O_nTgIfGbh0tOL05niDq96MCgVqc1kkwzCW8_DGjHWTqM9FwFkJzKiVRKtqmvPYuR0dikjkFyegqP1JjAHskJUT_Ruqv4Sd4xC7Rwong
Tags
score
1/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
1/10

Threat Level: No (potentially) malicious behavior was detected

The file https://click.egifter.com/?t=eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.eyJtZXNzYWdlaWQiOiIyYTM1MDkzOS1jNWRlLTQ5ZjctOTNlZS00YTdlNTQwNGM4NWEiLCJsaW5rIjoiaHR0cHM6Ly9jbGFpbXMuc3RvcmVkdmFsdWUuY29tL2NsYWltL2dpZnQvNjRiNDk0Y2ItZWEyYy00MzYzLWExMTAtMDA2NWUwOWZmMGZjL0lDSkpWUTVRVXdkQVV3MWVCQUZXV0VjQUF3WWZVVXhBWFVaU0N3SlhYZzFRV0VOTUFGb0lYMThBUVFGZFFWTUgwP2xhbmc9ZW4tVVMmY3VsdHVyZT1lbi1VUyIsImVudiI6ImVnbSJ9.YViUFURw11wT1fmwkwQLV2_KCXL0XYDPWL4nkLA_-RhEpgW_6M8VCa2AZ303JSCtfg9tnrk7WQF79OhlKG4J-hA6T7XKMnkPE8ByWjE7XnSIVHlsBvWPZpVMcBdYVehvPuu4QQPJHXRo4gEz20Dt-BQ0PJZj8JQtDAgWVGMfRjAR3EpAyE-qdkl_5RFJVaFQMUUnaMaeQLixvH1JmA_TtjDa_kFeysL2CeourHvhb0N1u4O_nTgIfGbh0tOL05niDq96MCgVqc1kkwzCW8_DGjHWTqM9FwFkJzKiVRKtqmvPYuR0dikjkFyegqP1JjAHskJUT_Ruqv4Sd4xC7Rwong was found to be: No (potentially) malicious behavior was detected.

Malicious Activity Summary


Suspicious use of SendNotifyMessage

Suspicious use of WriteProcessMemory

Modifies data under HKEY_USERS

Modifies registry class

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of AdjustPrivilegeToken

Enumerates system info in registry

Suspicious use of FindShellTrayWindow

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-30 01:53

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-30 01:53

Reported

2024-05-30 01:55

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

149s

Command Line

"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://click.egifter.com/?t=eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.eyJtZXNzYWdlaWQiOiIyYTM1MDkzOS1jNWRlLTQ5ZjctOTNlZS00YTdlNTQwNGM4NWEiLCJsaW5rIjoiaHR0cHM6Ly9jbGFpbXMuc3RvcmVkdmFsdWUuY29tL2NsYWltL2dpZnQvNjRiNDk0Y2ItZWEyYy00MzYzLWExMTAtMDA2NWUwOWZmMGZjL0lDSkpWUTVRVXdkQVV3MWVCQUZXV0VjQUF3WWZVVXhBWFVaU0N3SlhYZzFRV0VOTUFGb0lYMThBUVFGZFFWTUgwP2xhbmc9ZW4tVVMmY3VsdHVyZT1lbi1VUyIsImVudiI6ImVnbSJ9.YViUFURw11wT1fmwkwQLV2_KCXL0XYDPWL4nkLA_-RhEpgW_6M8VCa2AZ303JSCtfg9tnrk7WQF79OhlKG4J-hA6T7XKMnkPE8ByWjE7XnSIVHlsBvWPZpVMcBdYVehvPuu4QQPJHXRo4gEz20Dt-BQ0PJZj8JQtDAgWVGMfRjAR3EpAyE-qdkl_5RFJVaFQMUUnaMaeQLixvH1JmA_TtjDa_kFeysL2CeourHvhb0N1u4O_nTgIfGbh0tOL05niDq96MCgVqc1kkwzCW8_DGjHWTqM9FwFkJzKiVRKtqmvPYuR0dikjkFyegqP1JjAHskJUT_Ruqv4Sd4xC7Rwong

Signatures

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133615076084573123" C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1337824034-2731376981-3755436523-1000\{FD9797A7-DD50-4399-A7F2-3B2A6D4DB5B5} C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4264 wrote to memory of 1148 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 1148 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 3412 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 3412 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 3412 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 3412 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 3412 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 3412 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 3412 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 3412 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 3412 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 3412 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 3412 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 3412 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 3412 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 3412 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 3412 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 3412 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 3412 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 3412 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 3412 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 3412 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 3412 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 3412 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 3412 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 3412 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 3412 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 3412 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 3412 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 3412 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 3412 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 3412 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 3412 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 4756 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 4756 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4264 wrote to memory of 608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe

Processes

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://click.egifter.com/?t=eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.eyJtZXNzYWdlaWQiOiIyYTM1MDkzOS1jNWRlLTQ5ZjctOTNlZS00YTdlNTQwNGM4NWEiLCJsaW5rIjoiaHR0cHM6Ly9jbGFpbXMuc3RvcmVkdmFsdWUuY29tL2NsYWltL2dpZnQvNjRiNDk0Y2ItZWEyYy00MzYzLWExMTAtMDA2NWUwOWZmMGZjL0lDSkpWUTVRVXdkQVV3MWVCQUZXV0VjQUF3WWZVVXhBWFVaU0N3SlhYZzFRV0VOTUFGb0lYMThBUVFGZFFWTUgwP2xhbmc9ZW4tVVMmY3VsdHVyZT1lbi1VUyIsImVudiI6ImVnbSJ9.YViUFURw11wT1fmwkwQLV2_KCXL0XYDPWL4nkLA_-RhEpgW_6M8VCa2AZ303JSCtfg9tnrk7WQF79OhlKG4J-hA6T7XKMnkPE8ByWjE7XnSIVHlsBvWPZpVMcBdYVehvPuu4QQPJHXRo4gEz20Dt-BQ0PJZj8JQtDAgWVGMfRjAR3EpAyE-qdkl_5RFJVaFQMUUnaMaeQLixvH1JmA_TtjDa_kFeysL2CeourHvhb0N1u4O_nTgIfGbh0tOL05niDq96MCgVqc1kkwzCW8_DGjHWTqM9FwFkJzKiVRKtqmvPYuR0dikjkFyegqP1JjAHskJUT_Ruqv4Sd4xC7Rwong

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9b835ab58,0x7ff9b835ab68,0x7ff9b835ab78

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1752 --field-trial-handle=1928,i,2622157117193993047,14834247325482857978,131072 /prefetch:2

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1928,i,2622157117193993047,14834247325482857978,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2232 --field-trial-handle=1928,i,2622157117193993047,14834247325482857978,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3084 --field-trial-handle=1928,i,2622157117193993047,14834247325482857978,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3104 --field-trial-handle=1928,i,2622157117193993047,14834247325482857978,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe

"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4132 --field-trial-handle=1928,i,2622157117193993047,14834247325482857978,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4576 --field-trial-handle=1928,i,2622157117193993047,14834247325482857978,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4572 --field-trial-handle=1928,i,2622157117193993047,14834247325482857978,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4684 --field-trial-handle=1928,i,2622157117193993047,14834247325482857978,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4984 --field-trial-handle=1928,i,2622157117193993047,14834247325482857978,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 --field-trial-handle=1928,i,2622157117193993047,14834247325482857978,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5004 --field-trial-handle=1928,i,2622157117193993047,14834247325482857978,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4992 --field-trial-handle=1928,i,2622157117193993047,14834247325482857978,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3488 --field-trial-handle=1928,i,2622157117193993047,14834247325482857978,131072 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 click.egifter.com udp
US 104.18.21.14:443 click.egifter.com tcp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 14.21.18.104.in-addr.arpa udp
US 8.8.8.8:53 10.213.58.216.in-addr.arpa udp
US 8.8.8.8:53 claims.storedvalue.com udp
US 104.18.4.148:443 claims.storedvalue.com tcp
US 8.8.8.8:53 rum-static.pingdom.net udp
US 104.22.55.104:443 rum-static.pingdom.net tcp
US 8.8.8.8:53 80.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 148.4.18.104.in-addr.arpa udp
US 8.8.8.8:53 69.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 74.204.58.216.in-addr.arpa udp
US 8.8.8.8:53 99.201.58.216.in-addr.arpa udp
US 8.8.8.8:53 104.55.22.104.in-addr.arpa udp
US 8.8.8.8:53 s3.amazonaws.com udp
US 8.8.8.8:53 rum-collector-2.pingdom.net udp
US 52.217.44.206:443 s3.amazonaws.com tcp
IE 34.252.82.250:443 rum-collector-2.pingdom.net tcp
US 8.8.8.8:53 250.82.252.34.in-addr.arpa udp
US 8.8.8.8:53 206.44.217.52.in-addr.arpa udp
US 8.8.8.8:53 beacon.riskified.com udp
US 18.204.158.87:443 beacon.riskified.com tcp
US 8.8.8.8:53 eg-ui-assets.images.egifter.com udp
US 8.8.8.8:53 egsiteassets.images.egifter.com udp
US 104.18.14.194:443 egsiteassets.images.egifter.com tcp
US 104.18.14.194:443 egsiteassets.images.egifter.com tcp
US 8.8.8.8:53 img.riskified.com udp
US 3.210.153.240:443 img.riskified.com tcp
US 8.8.8.8:53 content-autofill.googleapis.com udp
GB 172.217.169.10:443 content-autofill.googleapis.com tcp
US 8.8.8.8:53 87.158.204.18.in-addr.arpa udp
US 8.8.8.8:53 194.14.18.104.in-addr.arpa udp
US 8.8.8.8:53 c.riskified.com udp
US 34.205.95.197:443 c.riskified.com tcp
US 8.8.8.8:53 240.153.210.3.in-addr.arpa udp
US 8.8.8.8:53 10.169.217.172.in-addr.arpa udp
US 8.8.8.8:53 197.95.205.34.in-addr.arpa udp
US 8.8.8.8:53 fpnpmcdn.net udp
GB 99.86.114.75:443 fpnpmcdn.net tcp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 fpm.egifter.com udp
US 52.223.13.89:443 fpm.egifter.com tcp
US 8.8.8.8:53 use1-turn.fpjs.io udp
US 8.8.8.8:53 75.114.86.99.in-addr.arpa udp
US 8.8.8.8:53 89.13.223.52.in-addr.arpa udp
DE 18.196.235.131:3478 use1-turn.fpjs.io tcp
N/A 10.127.0.93:52214 udp
US 8.8.8.8:53 131.235.196.18.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 195.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 beacons.gcp.gvt2.com udp
US 192.178.49.195:443 beacons.gcp.gvt2.com tcp
US 8.8.8.8:53 195.49.178.192.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 b0ffd47eabd47f88bfa3ebcac37c04a8
SHA1 7a0f8dfbc2229a94617990feb919226f9a897638
SHA256 2af745a27cb786a61e9e7879dbcd10878388c3c7163f132069e893e125b5c4dd
SHA512 4f5c2e0de415cd2c2718561a36f7aa7a5587fbf3bece0564881d01c71577efa6ec8df9506f74412c304f9898e6b761e9f20090fa4b6faed3afef3e3b0a396549

\??\pipe\crashpad_4264_NYSDRONVLGZSZVCT

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

MD5 d751713988987e9331980363e24189ce
SHA1 97d170e1550eee4afc0af065b78cda302a97674c
SHA256 4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512 b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\File System\Origins\CURRENT

MD5 46295cac801e5d4857d09837238a6394
SHA1 44e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA256 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA512 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 c64884cea38b54a2fab4b1cff37b32fc
SHA1 f717091992c49047a57e83e92850aa74a4d06d16
SHA256 12dcd786ef36011fe03a22cbc3bb73023f8f6702491f911f63fd9e6e72bd7c2e
SHA512 c5d0716bed0fe81152b00bb7d5fac23faf909a337a727356aa5b90b581311eb50a3812cda2c1c3035fc63ff2050f2624380b0fa5de761bc33378e27dbc1aa140

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 118530fd982592c90b46fd52477ccd90
SHA1 e010f3656a62aac2f1f5088a31da3e1b68316447
SHA256 d6f89a1aeeafe8484f11c64ba12e4a82daf7cf795a204d554b0038bb2b03fe8b
SHA512 98a4187f0d43beefa5609683d26352e559d413af2992d3b1a0b51498aa5d78005eadeaa61644b002ee6856e84d61613897f2b88eb20dafe362874f646ca343b5

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

MD5 09c5d01486f83127eb4449fd1e9f1954
SHA1 e08f280c097c6b55c1b984b09a1f7ac6cdb59476
SHA256 4c873b4bacee7d31ecdd616d9aba7be9bd6e156909480a6d8b0b9f38b53ca58b
SHA512 69bf3212586f65ed3cf21bbeedfce498f5b5df5b747f5fca219e96efbff3df31a89984c8ac6a20515055c85cbd7427178fd28361f781207ede1cb4478e694717

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\d5083a88cbcf969f746b9f6a19f288dff2462509\4322db17-8abb-470a-a7db-c3528bf24388\index-dir\the-real-index

MD5 fcbdd6115115706db44d496caa1583cc
SHA1 df8e67c775d3573a1c497cffe7141685a59f7903
SHA256 66cef83dac060ee7fe8dedace50546f748f2f06794a01d4abbf2b9206e47861c
SHA512 78ded3b527d556b70033493973288eb946565a4c2ce1ff68729c277b5025dff1254c1d5f94b2092ea74d5898db6716f069f1d870d8f78307c04ba4e4f65b5c87

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\d5083a88cbcf969f746b9f6a19f288dff2462509\4322db17-8abb-470a-a7db-c3528bf24388\index-dir\the-real-index~RFe57a345.TMP

MD5 beacb8532bbf6f225e64d7a55ef4f366
SHA1 ce9cfabe804848d0ef3548b6df7b8287d89daf37
SHA256 f32a900a50934bc554b7bea878b70ecd833115748a90573953ac306c2ac9e550
SHA512 190cfb997dc8a6efb1d3e67886dd175a1a08e70a165c259f62a7a66f15d6c009f8fec30d27523bce4aa06ebb9796731ca9b941f028feb0f2ef4baa6f98c9c89e

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\d5083a88cbcf969f746b9f6a19f288dff2462509\index.txt

MD5 a232cf96c5e87268e5c709377fd2beaf
SHA1 44ba2a838cf63d720e4cd10416228d982f1455aa
SHA256 c29b2735d74df00dab0540d3c970f5a3d8c52a41af9560b05d1cf0f8d4e96264
SHA512 c92d108a633a8e10362dfbed228e384ff3fcd5524e70f0742f738b963edef30ec5341ae6b7b19ea69cb48a73de71c45e585a5dbf36ae3db6f258a9d9dc16eafd

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\d5083a88cbcf969f746b9f6a19f288dff2462509\index.txt~RFe57a374.TMP

MD5 3b20aed4498cc0dcf95395bdd471eec7
SHA1 c4681cc40ced9337debb00f62ae83fd08e4a9ec0
SHA256 5a850298c24c7b24433f896feda947cffd0f2049ddddbac9ddaaba620a3409ce
SHA512 2ba23bf5f249da68ab467117281d568ff0bc43d7280bf27366022288a9d0f6c44963124d3da9292da04d44b442ddb9336e5a6bfb195b7bce954c221233c619bb

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 85f1fe3682e063b8492526293dffb214
SHA1 283bb0760e1fce3900fcb1b014d337522f88a915
SHA256 09282857838001ac69ecb824f4202b5d7895f4892714bc9f129fac579abc7faf
SHA512 b9831a526020b699d5bfb0019a993620e3ae387a7986a402027b85a7140f51d1f11b632959ffd100190807fd461e16991bf6e530f7b9904b85b583ca73595caf

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 b6ef36f19cc7da6fd1c40bd68e3c7b9e
SHA1 7958bdec9236ea0a04f1f395324aad7392cb4b94
SHA256 f8c3d26a1122812ebaaffe0696efb5413aa42d106b69a83266fa2b575d4cf91c
SHA512 de707833c9a9608e73053cf4864dcdd4e40ef3846d80ad300efa3541af8ce91ba1bfc0bfea0f386664a1d2ec0506a70ad8ca83b1c8debd656c2fe68a962e6d0b

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe57e31c.TMP

MD5 e4fdd771a9efb37c05cc65f0e7b40a41
SHA1 41a03720f1ba80cbfffb6868465cb9dc933b184c
SHA256 65ccac194da1645bbf96694f3f03559ef3823024094c52b6deb1dbb0225a16f2
SHA512 67cd939e068f4d709064aa22e4b0141a024caeda07d738505eac7b55e03c35d5b9413dc4a014d291c9e02ce7b5590fc14b8caf55799f0002cc3a0653201aeaed

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache

MD5 b9e6d95320de34cee84f331e8ede7072
SHA1 2ecd7f65d27e9368e8271e20ca9c88598573c81b
SHA256 b99f8b98a5067afadd0b2731d31e4acb7d0d1e5025ff41ed26a3f509431c1dab
SHA512 27dc13d06a6e3127f2b92b288d130dffa3b4eb0289d51ca5dcbabfb7245acfaa807158d832b7cd586b8771de2272d185c1b90cdfa5cb809ebe51d297e58c9b5e

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 99137de0e7fd6086e48dfbf86215c5cf
SHA1 a4d6665c7bda000bd7af8d786eb346e8b931f43b
SHA256 847900076c799b3023b767c594d2e1c620d0fc8c09270a78e4d14957ad947626
SHA512 5d5fdb74d2261536280bdd51c4c46610588eeaef0c6c7df279c785a042f7c85fa526a15441cdeee1d49994b2250aa20b03c708deb843803749e9bc1ea6cf5a6c

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 764fa04fbe73a864b113ba5e4e29062e
SHA1 0859e7c382c27c3da8b1fad6ac83ecb40f8b1ec3
SHA256 9c594d40e2a7eedf5896120e98ec6808aeaaaa06e157e03eaf008dfcf1dd5c24
SHA512 d077b40838e885ef1775ae12c6e43e3a672f2b3ad9192214f5cea469fd9f04a6a951a2f446bd7fd963817e4b1694c524e65e0c5af8c647e9e837bd4159cf8926

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

MD5 913021538db5a16ff28bb00e0a0557ee
SHA1 ae0cc5ea2a3308374d3dfd7d39f1846b26a3e1f2
SHA256 0740e94f2a67011a37864a8d242ca4bae67ec0235abcb6addb36b9a45e28e3f6
SHA512 eb655efba41cfecb29434be49d34c47604585652995fca207dc77ea3e963840f14235394f3cb88d07d9d0670e3978249f88a0ffc58877163f9b4e5b4dc757e7d

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 7afa8ddba50aa2070b41ce2516248cd8
SHA1 c0a90f45578ea3e2994e8d39eed887528db9bd7a
SHA256 35a1d572d2d56542cc169a45397e3b50a246f39d275f06c5ca37c4f163ff892e
SHA512 cb9b7a3614cd4176dd3a258613e3bc72d5fd45b1057b2eecdefb9d0bf64f930e0d13143190c2d837fd461c0ea4d7d733cb69e235f01f3629926de3d3dbd10a63