Analysis
-
max time kernel
947s -
max time network
951s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 05:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Corradevr/NezurExecutor?tab=readme-ov-file#download
Resource
win10v2004-20240802-en
General
-
Target
https://github.com/Corradevr/NezurExecutor?tab=readme-ov-file#download
Malware Config
Signatures
-
Executes dropped EXE 7 IoCs
pid Process 1472 compiler.exe 1128 compiler.exe 4740 compiler.exe 4532 compiler.exe 4832 compiler.exe 2948 compiler.exe 4908 compiler.exe -
Loads dropped DLL 7 IoCs
pid Process 1472 compiler.exe 1128 compiler.exe 4740 compiler.exe 4532 compiler.exe 4832 compiler.exe 2948 compiler.exe 4908 compiler.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
flow ioc 134 pastebin.com 36 raw.githubusercontent.com 37 raw.githubusercontent.com 95 pastebin.com 96 pastebin.com 133 pastebin.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 81 ip-api.com 160 ip-api.com -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Setup\Scripts\ErrorHandler.cmd luajit.exe File opened for modification C:\Windows\Setup\Scripts\ErrorHandler.cmd compiler.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language compiler.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language compiler.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language luajit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language luajit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language luajit.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings msedge.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4936 schtasks.exe 5068 schtasks.exe 4444 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 3352 msedge.exe 3352 msedge.exe 2440 msedge.exe 2440 msedge.exe 4104 identity_helper.exe 4104 identity_helper.exe 1984 msedge.exe 1984 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 2456 msedge.exe 2456 msedge.exe 1940 msedge.exe 1940 msedge.exe 1724 msedge.exe 1724 msedge.exe 5044 identity_helper.exe 5044 identity_helper.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3764 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 19 IoCs
pid Process 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 4624 7zG.exe Token: 35 4624 7zG.exe Token: SeSecurityPrivilege 4624 7zG.exe Token: SeSecurityPrivilege 4624 7zG.exe -
Suspicious use of FindShellTrayWindow 50 IoCs
pid Process 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 4624 7zG.exe 1724 msedge.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 3764 OpenWith.exe 3764 OpenWith.exe 3764 OpenWith.exe 3764 OpenWith.exe 3764 OpenWith.exe 3764 OpenWith.exe 3764 OpenWith.exe 3764 OpenWith.exe 3764 OpenWith.exe 3764 OpenWith.exe 3764 OpenWith.exe 3764 OpenWith.exe 3764 OpenWith.exe 3764 OpenWith.exe 3764 OpenWith.exe 3764 OpenWith.exe 3764 OpenWith.exe 3764 OpenWith.exe 3764 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2440 wrote to memory of 5056 2440 msedge.exe 84 PID 2440 wrote to memory of 5056 2440 msedge.exe 84 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 1164 2440 msedge.exe 85 PID 2440 wrote to memory of 3352 2440 msedge.exe 86 PID 2440 wrote to memory of 3352 2440 msedge.exe 86 PID 2440 wrote to memory of 4360 2440 msedge.exe 87 PID 2440 wrote to memory of 4360 2440 msedge.exe 87 PID 2440 wrote to memory of 4360 2440 msedge.exe 87 PID 2440 wrote to memory of 4360 2440 msedge.exe 87 PID 2440 wrote to memory of 4360 2440 msedge.exe 87 PID 2440 wrote to memory of 4360 2440 msedge.exe 87 PID 2440 wrote to memory of 4360 2440 msedge.exe 87 PID 2440 wrote to memory of 4360 2440 msedge.exe 87 PID 2440 wrote to memory of 4360 2440 msedge.exe 87 PID 2440 wrote to memory of 4360 2440 msedge.exe 87 PID 2440 wrote to memory of 4360 2440 msedge.exe 87 PID 2440 wrote to memory of 4360 2440 msedge.exe 87 PID 2440 wrote to memory of 4360 2440 msedge.exe 87 PID 2440 wrote to memory of 4360 2440 msedge.exe 87 PID 2440 wrote to memory of 4360 2440 msedge.exe 87 PID 2440 wrote to memory of 4360 2440 msedge.exe 87 PID 2440 wrote to memory of 4360 2440 msedge.exe 87 PID 2440 wrote to memory of 4360 2440 msedge.exe 87 PID 2440 wrote to memory of 4360 2440 msedge.exe 87 PID 2440 wrote to memory of 4360 2440 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/Corradevr/NezurExecutor?tab=readme-ov-file#download1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff99b1146f8,0x7ff99b114708,0x7ff99b1147182⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,7542121055112468290,11056206046205232623,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,7542121055112468290,11056206046205232623,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2424 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,7542121055112468290,11056206046205232623,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7542121055112468290,11056206046205232623,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7542121055112468290,11056206046205232623,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,7542121055112468290,11056206046205232623,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 /prefetch:82⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,7542121055112468290,11056206046205232623,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7542121055112468290,11056206046205232623,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4080 /prefetch:12⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2076,7542121055112468290,11056206046205232623,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4700 /prefetch:82⤵PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7542121055112468290,11056206046205232623,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2076,7542121055112468290,11056206046205232623,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5728 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7542121055112468290,11056206046205232623,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:12⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7542121055112468290,11056206046205232623,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7542121055112468290,11056206046205232623,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7542121055112468290,11056206046205232623,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6408 /prefetch:12⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,7542121055112468290,11056206046205232623,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4728 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7542121055112468290,11056206046205232623,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2076,7542121055112468290,11056206046205232623,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=6788 /prefetch:82⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7542121055112468290,11056206046205232623,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2268 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7542121055112468290,11056206046205232623,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7080 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2076,7542121055112468290,11056206046205232623,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1092 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7542121055112468290,11056206046205232623,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:1772
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4408
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3708
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3176
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\Nezur\Launcher.bat" "1⤵PID:3712
-
C:\Windows\system32\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"2⤵PID:4988
-
-
C:\Users\Admin\Downloads\Nezur\luajit.exeluajit.exe conf2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1388 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc daily /st 14:00 /f /tn WindowsSetup /tr "C:/Windows/System32/oobe/Setup.exe" /rl highest3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5068
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\Nezur\Launcher.bat" "1⤵PID:64
-
C:\Windows\system32\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"2⤵PID:412
-
-
C:\Users\Admin\Downloads\Nezur\luajit.exeluajit.exe conf2⤵PID:4292
-
-
C:\Users\Admin\Downloads\Nezur\luajit.exe"C:\Users\Admin\Downloads\Nezur\luajit.exe"1⤵
- System Location Discovery: System Language Discovery
PID:1620
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3764 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Nezur\conf2⤵PID:4788
-
-
C:\Users\Admin\Downloads\Nezur\luajit.exe"C:\Users\Admin\Downloads\Nezur\luajit.exe"1⤵PID:892
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\Nezur\Launcher.bat" "1⤵PID:2560
-
C:\Windows\system32\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"2⤵PID:3536
-
-
C:\Users\Admin\Downloads\Nezur\luajit.exeluajit.exe conf2⤵
- System Location Discovery: System Language Discovery
PID:4540
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Downloads\Nezur\Launcher.bat"1⤵PID:3932
-
C:\Windows\system32\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"2⤵PID:4752
-
-
C:\Users\Admin\Downloads\Nezur\luajit.exeluajit.exe conf2⤵PID:3764
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x328 0x3181⤵PID:2612
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\Nezur (1)\" -spe -an -ai#7zMap24909:76:7zEvent71061⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4624
-
C:\Users\Admin\Desktop\Nezur (1)\compiler.exe"C:\Users\Admin\Desktop\Nezur (1)\compiler.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1472
-
C:\Users\Admin\Desktop\Nezur (1)\compiler.exe"C:\Users\Admin\Desktop\Nezur (1)\compiler.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1128
-
C:\Users\Admin\Desktop\Nezur (1)\compiler.exe"C:\Users\Admin\Desktop\Nezur (1)\compiler.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4740
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Desktop\Nezur (1)\Launcher.bat"1⤵PID:3164
-
C:\Users\Admin\Desktop\Nezur (1)\compiler.execompiler.exe conf.txt2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4532 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc daily /st 10:48 /f /tn EmailCleanupTask_ODA1 /tr ""C:\Users\Admin\AppData\Local\OWYsN2YsN2YsYTAsOWUsODYsOGMsOTYsNjQsN2Ms\ODA1.exe" "C:\Users\Admin\AppData\Local\OWYsN2YsN2YsYTAsOWUsODYsOGMsOTYsNjQsN2Ms\conf.txt""3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4444
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc daily /st 10:48 /f /tn Setup /tr "C:/Windows/System32/oobe/Setup.exe" /rl highest3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4936
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Desktop\Nezur (1)\Launcher.bat"1⤵PID:3000
-
C:\Users\Admin\Desktop\Nezur (1)\compiler.execompiler.exe conf.txt2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4832
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Nezur (1)\conf.txt1⤵PID:4868
-
C:\Users\Admin\Desktop\Nezur (1)\compiler.exe"C:\Users\Admin\Desktop\Nezur (1)\compiler.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2948
-
C:\Users\Admin\Desktop\Nezur (1)\compiler.exe"C:\Users\Admin\Desktop\Nezur (1)\compiler.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4908
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:1724 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff99b1146f8,0x7ff99b114708,0x7ff99b1147182⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,9376749935962183081,7052430484059803932,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,9376749935962183081,7052430484059803932,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,9376749935962183081,7052430484059803932,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9376749935962183081,7052430484059803932,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9376749935962183081,7052430484059803932,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9376749935962183081,7052430484059803932,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4504 /prefetch:12⤵PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9376749935962183081,7052430484059803932,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4588 /prefetch:12⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,9376749935962183081,7052430484059803932,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3636 /prefetch:82⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,9376749935962183081,7052430484059803932,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3636 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9376749935962183081,7052430484059803932,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9376749935962183081,7052430484059803932,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4084 /prefetch:12⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9376749935962183081,7052430484059803932,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4492 /prefetch:12⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,9376749935962183081,7052430484059803932,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1304 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5068
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3164
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57fb5fa1534dcf77f2125b2403b30a0ee
SHA1365d96812a69ac0a4611ea4b70a3f306576cc3ea
SHA25633a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f
SHA512a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A
Filesize471B
MD56d3b5ceb8dd3e03a6620b230634c6f6c
SHA17a2648d0eee22a2743a62423d4793c251964c6fd
SHA25603e4a0ffd3bed9bce36db00f7ba17660ef589fdedd8136800035437bc792a345
SHA51248ec5999060beb45191ed57e0383a84211ac6e3128c2370fc7be4f364d2b36c34ce76442f783560402d3b62ce0fa65a12a7d32d539c9d06b78892a849805b8eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD5d76017a533f0c96cf659ae6b54ceb46e
SHA14d43c8a48eda6c373098db2144497fc7927aded7
SHA256c22dfe9a9fc200134383d379fafc1ee3776d36aadc122dedf7ff09ecfd2a3f93
SHA512350086a36358f6d4ee55b286aabaf066ec084b209b040be3a9ce62d360a5e3e38d50563b278d8048be538dd1b885ac4b243eb08595f04289e5ab2eba62a4ae26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD54fcc15c277abc2b419e58c41c59e55ff
SHA194c28f4d14975b56851830fd2a15a8909ba21811
SHA256e47e2e1196fa1dcf4de96e6eec67debf0b728ae83762542d635c75c7e02c9fbd
SHA512ed35f6f3f2364589a983d54991a970f8bc395f67e385041b8771343e677da9b935650c4f32d088275f5b518db8ef529b9d399015b5649db141465b60fd8445cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A
Filesize412B
MD554c680bb2247589954fb1a9aff16c453
SHA151ae1de044efddc679eff0311e0c6e1da13188fc
SHA256cf2409695436b4889fe06fe1073756c1c9508ebdd01292ed49e768ee99544c74
SHA51248343774810a8476a4be2443118ef0b00300b0a47fc25cf03126ff3bd6932203940fc0dc1d83d4672ada3e91076e01d18c5ad54800bb2f0842d76c5fe9bcf93e
-
Filesize
152B
MD55fef0b5ab8f5829bc2b9878b832b0ebe
SHA13e1c646926b836bc365c02526a406dd78ec00ab3
SHA256ce832369a5b0dba3e5e6ceebb3fe3690466d42fe1677c5db24f50da8aa001335
SHA512cafef56fefda6ca94c4ba065d43ac2173adad7d190ac48804c574fc7f572dfdb727c6bfe83ad06a021ff94f6c7898145602dd9fb2fb33ba71ee67db6ff0e0d15
-
Filesize
152B
MD5a4d8f93efb376254dc9f75aec600a55e
SHA161595d4bd7af4b7a61a67b9f7403259d392ff4ca
SHA256c33868782ef130001d26f06303467603608de647e3518beb5d0b03accbbdbcc1
SHA51231f8609b30a479510b8d1891191ee46c6f5d45797f77408e44f1565901ec1c83b2b1264012ca1fae4a2e5c72ac27af885f7769d9a772483da1b00bcf17991401
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
1024KB
MD5e939686d1b13ff668463fc40ab24933d
SHA1fff26873fe5813ba0e3496cd196a1b4a40068a91
SHA256bd3eea5151765468c6ff116dc9fb6dc54c09b8fb034414a7203b43c7b6b6e786
SHA512587d32f3fdf4f7df2f793050c6632a840517841006ba4791516a6b3043cc7985ee52f000390c780b042f3da8a5077bb2de924f735d5a4f1269a6aaf9ee3093ae
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD561575104a85852d699ea4d22eda492b8
SHA1727a4c72eb20746e6bab35114b2f25b40a7c279e
SHA2567b119ed6e1845a605a1ffff21dd9a451df502dc6c9d934c5fcc3dac8bbd90126
SHA512d5217ead7433812b3cc2bd60c3bf38a6da59e84d60e735bd833b285f35174772b6d6c00042ff5b8bf6866fdd16e48d2fd43ff8068c8d829563f7c1ea5d740048
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD593300b7e902f71d89a69c955ac467089
SHA12fac5f9ab32a0950f832478caa017cb45e92c4dc
SHA25650163b53463d08a6a5adb32d8aaa38b96e9aeca69dcc3e55f9f0f501ba890b38
SHA512fd9e237cc9254e8d261f208a67ef84533a9bd4c37e83e34973a82e9f8bb6a8686859c01f8a5f3ad904943a503c914efde1bdf950fe5cf5d999e654e257a69114
-
Filesize
24KB
MD5d543bb65b2bf27386fd5c9f664d265bd
SHA12693c6af58c5ec340c9d7f264aedef0c17a51121
SHA256ce36842bf388316cf3e4ac63e95b2c7088a7239aa788b9d86c8e9e2a84de0959
SHA5127d2957fd3ebe225a3b7cb9577bf61e3acb1074f119c768e3d6c2ea74d87b7427daeeef4ceca076016708703665ce4b78703820a80decd17a3003df9ccfa211f4
-
Filesize
124KB
MD5c70ae4d20c2dd2ffeee715ad9a9da424
SHA1f9582ce64e2706787697b6465a0fcd664624dafe
SHA2564de008850d852ccb68314daca23fd0e77dfa1ef39def4ae85750a91638c2f438
SHA512054ddc746e255d73b53999f11feb36890e618f506e28fc5179a4ee48869eff6ae8eed4813d2711ac5a507739424fa2868f05dbff7323d690ba4289073847b5df
-
Filesize
647B
MD542f053f16c29b3d1be002e083c21bbda
SHA12d8f60549da0c6ef84f3f846fd019b23b88642e5
SHA256041b3537ee5122122956b1d1f520fb2048945e75121a04e2c84d1afeffc64575
SHA5121ef3eedd58cb97ee46ea06be39bf378d075d0e5fcb042dca9c1c3b9e6c2df491337b5e2fb7c87133c4f34b5e5d239ed9e4f519e778785057618a7bd3068e87c5
-
Filesize
1KB
MD576e605de19f7cec26a6428b3ce83baef
SHA1a4ba7251d6779113e8daa2eccf55546e7ab9d42e
SHA2567801f21d080eb2ff9ed431c088bce9e190b651de92b2bcc84a81c1e04539fbb7
SHA51254a797e5eb03ae3d6ce597627a19fc3e0d9aa05339ad9dceaee3963b5afadcbbc52fdd0a9fddc73046021a2735d19c1aa3b172e409498883fc22ba242bdbc283
-
Filesize
5KB
MD57489e02153aa8084e513a7c9dc47cf9d
SHA10b720076dc2c5f0de51c731575d651e2f1a7cb25
SHA2562882025f2607942539de096c1ca216a93641fb2e51beb92c60a800dae44e8ba9
SHA5120adb519314030c1dcf48db4f7d5ef220ebf60ebc8e480d6b0d06ab4052b10af8dfa41eaebbc1e5e11a4b34bde9041c6b49d626bc1a716dace00c43888cf92dfd
-
Filesize
6KB
MD5b5bea1a9368c4f024dd111fe575d954f
SHA112213b695ec937635ba4b05a9a8714cadb71ad4a
SHA2567326badfc7709c10a291c69f51bcffcf71a13cd78c4e20b186caa576b5033dea
SHA512fd1e32b6490bb4c3bf91eb93663b9906cf86152129a7bf450fa0b314b6ef74af96b9da6470c0d556b1d4335974d1953e1acedc5f43dbc9757f351e477e8f6f87
-
Filesize
6KB
MD5787488ba45d1b3692bdfd1e9f03c7ef2
SHA102cc5ceec42a3a80f001a64ce2508464360545a7
SHA2566a849c753106c59cee617ac5ed3adb9f3aee00659a53cc92e8296f9021bedd5d
SHA512777119114e087a2e38cd4024aaaa5a1870930944899da6ce01a9bcc50388efccedd95bdd2bc24e37a6500853e1f9ca69c3f508d97d0fa86bcf2ed0e08c11d251
-
Filesize
6KB
MD55edb42d08d44a24a8984e9345b26de69
SHA12afd0576da4c69b443600c88232edb82fafe0e71
SHA2564eb1e2b023588c587f462ea7b28f3bc3d063836cc6f222479e8a73cdc484c82d
SHA51206d98d9e41cade2cd858328a2ff4173fcfcbd599ca6e3f136996c5eed82eb30c092d7d547b65b4d1d0a8a1b0d9031b86ddce8a500554a748c388fe69e507a1c9
-
Filesize
7KB
MD537198093ab52dbee079fa0a18521c45d
SHA1317ffb326658cec867163c0a8d8ec21435801ea4
SHA25661c5b42bbffb15980d82d3e4e93c0aec73a106ae3e39a3b4348623b6c7bc9835
SHA5129271f0313f7dd42c31c84acd22bf28d18c4bbe26e1db9f4799b8bae686e02bd9eae6d0dce8f90a288b034c91ecda1dbbccac2bfaad972a9248113171f80f3867
-
Filesize
7KB
MD52bccd721dce8d29140172da7c2852474
SHA1eefd811d93305e27d0503f49f587e9bb6ba8e394
SHA256ffec3a83440ff6ecaec8d5a8c913f266d73b0623bf8abe5f71e8ec1a596132ec
SHA512d719602875dd410c107a2c225e7a401b53ef5ca2f4d46dc576d1b2e605066e83e898b904883d602e88fbe5ca2de164223ca4717f596d6490ba5b2e0b11a2a959
-
Filesize
6KB
MD53ec035581d2746cc20bddf3bee656b72
SHA1d8e8db933a77d0f0422907e05623117f9fe6331b
SHA256d188d2d2fbe9bec1b35178638d1917d73464b0f884c6e33b16410df45e049e5a
SHA51298b9d94c15d94cbd5fb04e308ae005e665de6f873f0b0c87bccfa0b8586c05d5ceb15b0980132bd468af5a624e75f8432940be89a04b54da9d8eb700a944b7cb
-
Filesize
7KB
MD543789dd154d09d0fc9a86321f7b89b8d
SHA113cdd950eefb208a3a7d0764cc6f0f87e745c767
SHA2569392a86fa1a10658dd299b796077beb75518065e849bb46b0303786262eec192
SHA512ad3bd5189a9d15f1fc77b4cbf3955da95b2578a002adcc446b72a5682274f000bf183c458a46f9bcc18df93f9b7339f34f02b05be6e99711a3fcc13691441a1c
-
Filesize
4KB
MD5cb5c0f20f1f74e8686c7d09d289be1b1
SHA1b492dabc807441b300bccbaad7bd7b5466188839
SHA256247685801f1e6b37e135d883cc50dd81699e859e2ebe116f496fe3283e99483c
SHA512d200e8767e4799f97483348ef6130b6664a4f0ae74916e1e6afb69fca4561ebb1ba4bbeba82a85951024f298a50b798eaf4394178ee6df54d8d4f0f675ee2082
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\000003.log
Filesize184B
MD53b4d9b3cdb94790f08cbbe4cc3f2de84
SHA1a43c89a43c2cacc60a90b3ef755be224054f7251
SHA256cf6ddec219694becddfd336b6f58c159503182b3fc803bbc4293f6a522694bad
SHA5122c99237df9a6434bae4d2d708b763a18affd6fa06606ad10052a3ff953cf31748419226f26b9cff29e6dc4ca191f028c4bd8240b4d35652e1cf9b45792ceeaa8
-
Filesize
347B
MD55a658d77da455c210ced0cacf71ac73b
SHA182adcc0ecd4fce64182b7c33b3bc4ff15c73f1fe
SHA2566db27348e91e806437774af4a3e10b974eaee7a70cd7d60b7c96eb315633ec56
SHA5128332ae6bc15b7058aba6218f919e20d52063004e4f770b71ea0aff68bc7ac40b04893b001164a44ffec197cfde21c52d5055a925ba61760f62f60dea4d03701a
-
Filesize
323B
MD56afd7aa05f5228997bdb32ed1dc837b9
SHA1a528a3b3c73e24261ae94bcd05e679a5e7537def
SHA256b49c08283e18435d57ee49da5fb4cd0b3e441d01f1476d6931a9cf23141bdcbb
SHA512af34517a7ed659ecc0288e1b87bac0f438c2991b2a7ab2cda19c398e24d330c59c6e1ee68fef47101c9f6bbdda0c3a649281f40ae613abade9b4ebfe8f8dc2bd
-
Filesize
1KB
MD5d38037e21a9450b3e22559a042ceda9d
SHA19d4dfdd7c119d5f99de600ec8d0a61d008963f47
SHA256728cc0ef13d03145dd0cefe95edb9a7ffb9dde20de56ca74fa2f3f0d4901e156
SHA512ae26d542eca89db9ee13e12f8c089b735dbd974f3d31bf650694b86d770006c1c2124c81eeca62a961f8d0496d441dcdcbb16cc9d0da7529359f9e8521368b8d
-
Filesize
1KB
MD515e8356abacce30f5eb1ee8e70167a1e
SHA1ff680332dff32867c329ec04eceabd0f0b5e2286
SHA25620b804a150f36fff16512298423af2e1eb9fe69cd27278ca0b7d98194d29ff86
SHA512581922539e017264eaeec1acdabc7bce14b3ccae3acc94f85db87327c7a1ae05198f03bf20c95a5601be6836aa4e7f07b6794d6eadfd3857c5a891b34686292a
-
Filesize
1KB
MD5b595cac84692895de264d045f881d9ee
SHA14ab5aa4f4339c4fb2625b3db9b974d2bb3237c4d
SHA25673ec1147f99c44d828f47c2c1f5a30a6a0e405812a23a297e2e6a91c410ee899
SHA5121ba12ab551086407be97793ddc14a14330ff671e4275bbdafd648e97264cf99f0e377cd77f624c37a1349d8154bbdb36af3eda190c5dadad50f6569a91849b49
-
Filesize
128KB
MD5bd6b8c7f1b40f17a62b42ed17a661a8a
SHA14a2331d64ec77358abe196cae1b9cf428203a961
SHA2564b7b7d99da36cebf780d98228a5682b50957be6a56dab94af8ba3c17b8840fc5
SHA512fcb5a1375bc8d8536641a32397142c97e9baabd6ce670611142d1ad074679181f66cf1b4a3a28910eeb7fcc65f89b09e72cd60bf597472c0821436aa330b8e91
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11B
MD5838a7b32aefb618130392bc7d006aa2e
SHA15159e0f18c9e68f0e75e2239875aa994847b8290
SHA256ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa
SHA5129e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9
-
Filesize
10KB
MD5f08b5f5cb958e702392e6bddbd95810e
SHA1d5451d9e9bea086ce589b28b2fb3ccb0f4fb4c8b
SHA256cd86e1168766cebe2ac72aaab527b645ea5671417ae6629b07dacb550d287484
SHA5122d25d0d87a5b2e876024f77ced0511e70e875049bb2c6744a0012b7b3a4f519082def314f71b0be05fe8e10b557abd7fa336bfad70b3b8dc66fc44c024bbeef8
-
Filesize
10KB
MD58fcbff42d4df2d8ef2b62155ef50ecd9
SHA1c88b171856cef54bc5dee8d0d2f9b8fbd35996ee
SHA25624661623a74fa677dd8ec5b8773587a8f00b13c7776838691f8c6a3664850bba
SHA5125bce4493b48d2b094841edeee845a911dbd23ee41df7d93738ae53f1a0118b3fb5171394316b036291cf75ab7bb892132f5713105c209b526d89ea3b83ce30f8
-
Filesize
11KB
MD5f362840878a7caf57673e6b020c5958e
SHA10635506c898027899951cce9eec7264659ac8baa
SHA2562d99a1808439e06c7d7a8d86a630bb7750bc9ac46e1aa89d91ab0be1e6c1d095
SHA51223d80b59a2014cc56ed4cbf48c9db1e142f50a12b7eec191603bd30f83cf1fa848cc36ef2df74226fd390dca1b1d3616a83f3d3fe8849908d0ed82014a97cef2
-
Filesize
11KB
MD524e48c87a48f25a74cdf41912a4a8e21
SHA15ce695aa3190b44b475b7711d54edd3c84846a15
SHA256b8803cc616f4c991f2e069106437f1f4d93c2c0d4c6abe754f566d71b4e0c708
SHA512e8f3bab5493f54dfd92c89b786e5ef2d9e8c0dcc5ae901c6d2ee681f79a2913b0514affecca746927697a12fc30d4eccf406f87e8031e96889167aceb914ef37
-
Filesize
264KB
MD53611a48cae39501d29d426c8d5816683
SHA1d8a6e01386e0a76d5c6b977f45365c78a05eea62
SHA2569a50ec8853774e85b444db85dc1c671dcc685163d8c92036db7f2f9be7019a6a
SHA51299fe1b8c5361603b64091d919d4bc0e3d5f7b0e530cb0c9015e6b8e3d51a1d9f02db3d112f142df3d1b00b7fe7841f49a5f02de9df221ae9b97dc8255c28649e
-
Filesize
311B
MD59105750f17d90587cfdb3073e3db4b41
SHA168299e57ccb94050710511c9fba7f144af55038d
SHA256325bea9d40295cd711d613b7dcb0958e04a537f751b177573a9c40303a4879f9
SHA51207fcd8e2811bc7d8a481694d32a8d220a03ec99dfd8b9f55de99ff8327d392c6afbd821358b5087e29120b5a6d706f258c723585d3c69a26c1b0c385722256de
-
Filesize
18B
MD5ff984125fd3e367bfc22759ca2e1936e
SHA14ea5c246b04035673e2dd46160d1b94d4ee5aa24
SHA25697a78efb9914eb93df0a0bce75d55a5a1d3141b3332d2e5b362acfc59ebafd21
SHA5128a45a3bc4c8301b5558991bf31fef0a0f2545d5a2d1c5e4d8dff5e70b15584e2f7861556a7d2aa079cced6960a91ebdcb6fd68c24293437423efdd82651b7725
-
Filesize
1KB
MD50ce155488691610ac271da90164c0f60
SHA12ddfde69c775f684b668d083a96e04e38c2713e5
SHA256cf31e682396556b5cfc16e660417b9c52da38e543229ccd0430c59c6a6227b79
SHA512bff899afb3fd1f1c0a31d90cce72426b50fc13d9ef327b5a9cb9e4a46cf0a9495aa17077976c9f7a5663845c3fc42240552c8e7f5cd9d5c05d468673fa3b9d98
-
Filesize
203KB
MD5e7af92d85aa8fd93e9ce76981052f0d2
SHA137a508a74043c841161dd87a8fca8da552e08344
SHA256f9127bb4981ffef3181cd574220943ab67ae8e105b2f9384a07d097fd0799b99
SHA512364e3283e8537f022fa4aab05123cc9871c51c0311145a632443677d79409aa1c96f99206cd1285e7ccc2680b7a49feb05adeabfd9d23b0f8972ce2bd4f422f4
-
Filesize
164KB
MD5656df6d7d5b36920a8b92a40d5aac820
SHA1c6429c355d5222a2864fc06060fb2babb2c58ba6
SHA25689f3810779ff691c1e8a1c4293acd4ee7a1b74a202785ecf363ca275dee942b6
SHA512d4f7db4f8a497ac9eda06c9942ad5de6beb13d4ff731ca479ed4121341f6fa0f0360c32f32738f6a4629947e5b19d28b8ecaf54e3a244b993f10b297edccdac0
-
Filesize
389KB
MD51261fcfecad381aeba01ec6102648f3d
SHA1b79bdffbfffd33ae7167234164d8f03c7d7ac511
SHA256473276ea7cd546b7d10dadbfe6d071710695e7c12d3d43d4c97e91999674b896
SHA512e638e2d676b9fc4a32b8f9e04bf41966f2a164358003c2778080792435a738f93133de4e89caca7d9253656463018bc7707fd4a20699f7c89b0c056cab9c170a
-
Filesize
392KB
MD5ca0ddcfdc2ff6c02bffa74bbb9035f50
SHA17d46d8f616c3dbd0ddc531323269d65786810892
SHA256cbd9226c470efd29143f357e9ee0f6b2d20456041a0b4cb74912ccce9e37f97d
SHA512d007d15c014483fdd7e6b84c1a62f81304dfa8eab5e27083db2e7c1f2bc419d61dccc59647488d5bc167b15d8763ed1979e5593ed43fb39f05b3d25486ca6c67
-
Filesize
460KB
MD5291dd685dd75efefce8e6f5acf073e02
SHA17f22a5c24a99e4fa9d1e70d9dfc846ba186e8cb4
SHA256f173df317a0168b9306f6167ac00bffafa15ee10a820b22f1ce0a2411a087cd2
SHA512af04fcd1ef61b31f889cf970cc00f801324f8035564becb9d4bd7e5939e13ba5baba8ce8de8586e4982655fab863fddfc20f4f69b54618a338687bcd5fdd42e3
-
Filesize
696B
MD5e9272f583ca9d4a0e7aaf0d594f491bc
SHA177474a308a2d2470bcfa03ba2e34cfe80fda9cfd
SHA25698bdfee86496046e6e8a8ca199129eaa2dceb4dea2d7ed4ef4c4145ddb1a965e
SHA51283e5858a9b1456c2d1a85c1adee0dd0de589966556cddf17a23ebd16f285a323173a820d292e515e29d2f7889444f44214e75170e972aa66e3977f5034c7df1d
-
Filesize
181B
MD58e6024e495c0fb715e0bdc9509cf4d8b
SHA118c18882166dbfef37c1c02089a45a35356f12b1
SHA256fae59031bae93566f13099f2dcdc230cf011f47a6373f64fd8b5b832fbc38620
SHA5127fd30c5cc73336cddda1acf7c32e98e319ffe66122822670142edf13e3764ba1a470d676db361f2bcb057d11e9a9384428bbab07069d8e450c1cf5fc2cd87d93