Analysis
-
max time kernel
257s -
max time network
259s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
04-01-2025 23:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.mediafire.com/file/yyekffdz0swx11j/Nexol.rar/file
Resource
win11-20241007-en
General
-
Target
https://www.mediafire.com/file/yyekffdz0swx11j/Nexol.rar/file
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Signatures
-
Lumma family
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 30 IoCs
pid Process 1404 7z2409-x64.exe 4316 7z2409-x64.exe 4876 7zG.exe 2876 7zG.exe 1768 Nexol.exe 4016 Nexol.exe 2220 Nexol.exe 2312 Nexol.exe 3332 Nexol.exe 4884 Nexol.exe 2432 Nexol.exe 1100 Nexol.exe 4776 Nexol.exe 2508 Nexol.exe 3860 Nexol.exe 2288 Nexol.exe 3980 Nexol.exe 3188 Nexol.exe 4980 Nexol.exe 4800 Nexol.exe 1980 Nexol.exe 3848 Nexol.exe 2360 Nexol.exe 3960 Nexol.exe 400 Nexol.exe 1800 Nexol.exe 1596 Nexol.exe 688 Nexol.exe 4272 Nexol.exe 928 Nexol.exe -
Loads dropped DLL 4 IoCs
pid Process 3244 Process not Found 3244 Process not Found 4876 7zG.exe 2876 7zG.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 10 IoCs
description pid Process procid_target PID 1768 set thread context of 2220 1768 Nexol.exe 150 PID 2312 set thread context of 3332 2312 Nexol.exe 153 PID 4884 set thread context of 2432 4884 Nexol.exe 156 PID 1100 set thread context of 2508 1100 Nexol.exe 161 PID 3860 set thread context of 2288 3860 Nexol.exe 164 PID 3980 set thread context of 3188 3980 Nexol.exe 167 PID 4980 set thread context of 3848 4980 Nexol.exe 173 PID 4800 set thread context of 2360 4800 Nexol.exe 174 PID 3960 set thread context of 1800 3960 Nexol.exe 178 PID 1596 set thread context of 928 1596 Nexol.exe 183 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\kaa.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\kab.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ky.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ky.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\va.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\kaa.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ko.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\si.txt 7z2409-x64.exe File created C:\Program Files\7-Zip\7-zip.dll 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-cn.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spc.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sk.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\7z.sfx 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\en.ttt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-tw.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ba.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\mk.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ja.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\mng2.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sl.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ro.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\uk.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\uz-cyrl.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\fur.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spc.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\mn.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\History.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\tk.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\7zCon.sfx 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\lv.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\nb.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt 7z2409-x64.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\Crashpad\metadata setup.exe File opened for modification C:\Windows\SystemTemp\Crashpad\settings.dat setup.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File opened for modification C:\Users\Admin\Downloads\7z2409-x64.exe:Zone.Identifier chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 24 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nexol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nexol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nexol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nexol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nexol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z2409-x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z2409-x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nexol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nexol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nexol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nexol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nexol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nexol.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133805086591297187" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 44 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ = "C:\\Program Files\\7-Zip\\7-zip32.dll" 7z2409-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2409-x64.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000} 7z2409-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\7-Zip 7z2409-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 7z2409-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2409-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\ = "7-Zip Shell Extension" 7z2409-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ThreadingModel = "Apartment" 7z2409-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000} 7z2409-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\ = "7-Zip Shell Extension" 7z2409-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\ShellEx\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2409-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2409-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ = "C:\\Program Files\\7-Zip\\7-zip.dll" 7z2409-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\ShellEx\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2409-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\7-Zip 7z2409-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2409-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2409-x64.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000} 7z2409-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\ = "7-Zip Shell Extension" 7z2409-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2409-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\7-Zip 7z2409-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2409-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ThreadingModel = "Apartment" 7z2409-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000} 7z2409-x64.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 7z2409-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ = "C:\\Program Files\\7-Zip\\7-zip32.dll" 7z2409-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\7-Zip 7z2409-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\7-Zip 7z2409-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ThreadingModel = "Apartment" 7z2409-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\7-Zip 7z2409-x64.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\7-Zip 7z2409-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ = "C:\\Program Files\\7-Zip\\7-zip.dll" 7z2409-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2409-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\7-Zip 7z2409-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 7z2409-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\7-Zip 7z2409-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\7-Zip 7z2409-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ThreadingModel = "Apartment" 7z2409-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\ = "7-Zip Shell Extension" 7z2409-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 7z2409-x64.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Nexol.rar:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\7z2409-x64.exe:Zone.Identifier chrome.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 4368 msedge.exe 4368 msedge.exe 2124 msedge.exe 2124 msedge.exe 4412 identity_helper.exe 4412 identity_helper.exe 2248 msedge.exe 2248 msedge.exe 1972 msedge.exe 1972 msedge.exe 4960 chrome.exe 4960 chrome.exe 4980 AcroRd32.exe 4980 AcroRd32.exe 4980 AcroRd32.exe 4980 AcroRd32.exe 4980 AcroRd32.exe 4980 AcroRd32.exe 4980 AcroRd32.exe 4980 AcroRd32.exe 4980 AcroRd32.exe 4980 AcroRd32.exe 4980 AcroRd32.exe 4980 AcroRd32.exe 4980 AcroRd32.exe 4980 AcroRd32.exe 4980 AcroRd32.exe 4980 AcroRd32.exe 4980 AcroRd32.exe 4980 AcroRd32.exe 4980 AcroRd32.exe 4980 AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4820 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 18 IoCs
pid Process 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe Token: SeShutdownPrivilege 4960 chrome.exe Token: SeCreatePagefilePrivilege 4960 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe -
Suspicious use of SendNotifyMessage 28 IoCs
pid Process 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe 4960 chrome.exe -
Suspicious use of SetWindowsHookEx 32 IoCs
pid Process 2492 OpenWith.exe 4628 OpenWith.exe 4820 OpenWith.exe 4628 OpenWith.exe 4628 OpenWith.exe 4820 OpenWith.exe 4820 OpenWith.exe 4820 OpenWith.exe 4820 OpenWith.exe 4820 OpenWith.exe 4820 OpenWith.exe 4820 OpenWith.exe 4820 OpenWith.exe 4820 OpenWith.exe 4820 OpenWith.exe 4820 OpenWith.exe 4820 OpenWith.exe 4820 OpenWith.exe 4820 OpenWith.exe 4820 OpenWith.exe 4820 OpenWith.exe 4980 AcroRd32.exe 4980 AcroRd32.exe 4980 AcroRd32.exe 4980 AcroRd32.exe 4980 AcroRd32.exe 1404 7z2409-x64.exe 4316 7z2409-x64.exe 336 AcroRd32.exe 336 AcroRd32.exe 336 AcroRd32.exe 336 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2124 wrote to memory of 1516 2124 msedge.exe 77 PID 2124 wrote to memory of 1516 2124 msedge.exe 77 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 3560 2124 msedge.exe 78 PID 2124 wrote to memory of 4368 2124 msedge.exe 79 PID 2124 wrote to memory of 4368 2124 msedge.exe 79 PID 2124 wrote to memory of 4788 2124 msedge.exe 80 PID 2124 wrote to memory of 4788 2124 msedge.exe 80 PID 2124 wrote to memory of 4788 2124 msedge.exe 80 PID 2124 wrote to memory of 4788 2124 msedge.exe 80 PID 2124 wrote to memory of 4788 2124 msedge.exe 80 PID 2124 wrote to memory of 4788 2124 msedge.exe 80 PID 2124 wrote to memory of 4788 2124 msedge.exe 80 PID 2124 wrote to memory of 4788 2124 msedge.exe 80 PID 2124 wrote to memory of 4788 2124 msedge.exe 80 PID 2124 wrote to memory of 4788 2124 msedge.exe 80 PID 2124 wrote to memory of 4788 2124 msedge.exe 80 PID 2124 wrote to memory of 4788 2124 msedge.exe 80 PID 2124 wrote to memory of 4788 2124 msedge.exe 80 PID 2124 wrote to memory of 4788 2124 msedge.exe 80 PID 2124 wrote to memory of 4788 2124 msedge.exe 80 PID 2124 wrote to memory of 4788 2124 msedge.exe 80 PID 2124 wrote to memory of 4788 2124 msedge.exe 80 PID 2124 wrote to memory of 4788 2124 msedge.exe 80 PID 2124 wrote to memory of 4788 2124 msedge.exe 80 PID 2124 wrote to memory of 4788 2124 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://www.mediafire.com/file/yyekffdz0swx11j/Nexol.rar/file1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffedfe23cb8,0x7ffedfe23cc8,0x7ffedfe23cd82⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1912,17896570201839764756,7736065884894378219,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1928 /prefetch:22⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1912,17896570201839764756,7736065884894378219,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2356 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1912,17896570201839764756,7736065884894378219,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,17896570201839764756,7736065884894378219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,17896570201839764756,7736065884894378219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,17896570201839764756,7736065884894378219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,17896570201839764756,7736065884894378219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:12⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,17896570201839764756,7736065884894378219,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5916 /prefetch:12⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1912,17896570201839764756,7736065884894378219,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6772 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1912,17896570201839764756,7736065884894378219,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6360 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,17896570201839764756,7736065884894378219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:12⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,17896570201839764756,7736065884894378219,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6000 /prefetch:12⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,17896570201839764756,7736065884894378219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6364 /prefetch:12⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,17896570201839764756,7736065884894378219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5976 /prefetch:12⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,17896570201839764756,7736065884894378219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6224 /prefetch:12⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,17896570201839764756,7736065884894378219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6832 /prefetch:12⤵PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1912,17896570201839764756,7736065884894378219,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6276 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,17896570201839764756,7736065884894378219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:2344
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3340
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:240
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2492
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4628
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4820 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\Nexol.rar"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4980 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- System Location Discovery: System Language Discovery
PID:4820 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3C044926649DDE839B2E5AEC309BDF7E --mojo-platform-channel-handle=1768 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:2044
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=8D98C0B072A2419E5D4A05146225E76C --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=8D98C0B072A2419E5D4A05146225E76C --renderer-client-id=2 --mojo-platform-channel-handle=1776 --allow-no-sandbox-job /prefetch:14⤵
- System Location Discovery: System Language Discovery
PID:3192
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A0F938B3AA4A6302C2163F1355B18286 --mojo-platform-channel-handle=2332 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:3568
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=FB43558FD3D412409238BC98C6F2C049 --mojo-platform-channel-handle=1784 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:1096
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=2408D636E171B0903C733661AB7A0415 --mojo-platform-channel-handle=2544 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:876
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4960 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffedf78cc40,0x7ffedf78cc4c,0x7ffedf78cc582⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1996,i,11960147699375483378,15935318008822386826,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1992 /prefetch:22⤵PID:692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1684,i,11960147699375483378,15935318008822386826,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2040 /prefetch:32⤵PID:956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2148,i,11960147699375483378,15935318008822386826,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2228 /prefetch:82⤵PID:4056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3080,i,11960147699375483378,15935318008822386826,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3084 /prefetch:12⤵PID:1812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3104,i,11960147699375483378,15935318008822386826,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4500,i,11960147699375483378,15935318008822386826,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4528 /prefetch:12⤵PID:3240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4784,i,11960147699375483378,15935318008822386826,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4788 /prefetch:82⤵PID:1596
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --reenable-autoupdates --system-level2⤵
- Drops file in Windows directory
PID:4336 -
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x244,0x248,0x24c,0x220,0x250,0x7ff66d474698,0x7ff66d4746a4,0x7ff66d4746b03⤵
- Drops file in Windows directory
PID:3340
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4564,i,11960147699375483378,15935318008822386826,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4524 /prefetch:82⤵PID:2492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5116,i,11960147699375483378,15935318008822386826,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5008 /prefetch:82⤵PID:3276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4984,i,11960147699375483378,15935318008822386826,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4596 /prefetch:82⤵PID:2304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4624,i,11960147699375483378,15935318008822386826,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5132 /prefetch:82⤵PID:4716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3628,i,11960147699375483378,15935318008822386826,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5084 /prefetch:82⤵PID:3980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5364,i,11960147699375483378,15935318008822386826,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5168 /prefetch:22⤵PID:1472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=4348,i,11960147699375483378,15935318008822386826,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4336 /prefetch:12⤵PID:5040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=3316,i,11960147699375483378,15935318008822386826,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:1744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5744,i,11960147699375483378,15935318008822386826,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5392 /prefetch:82⤵PID:1580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5740,i,11960147699375483378,15935318008822386826,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5768 /prefetch:82⤵PID:2096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5004,i,11960147699375483378,15935318008822386826,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5300 /prefetch:82⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
PID:8
-
-
C:\Users\Admin\Downloads\7z2409-x64.exe"C:\Users\Admin\Downloads\7z2409-x64.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1404
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2500
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4992
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:908
-
C:\Users\Admin\Downloads\7z2409-x64.exe"C:\Users\Admin\Downloads\7z2409-x64.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4316
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Nexol\" -ad -an -ai#7zMap16299:72:7zEvent306251⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4876
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\Nexol.rar"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:336 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- System Location Discovery: System Language Discovery
PID:2676 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=28C122B0AA6140F898377596CFEBAF99 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:4580
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=CDA7DF66C0A8EC54E2CC9CCE76CCE11E --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=CDA7DF66C0A8EC54E2CC9CCE76CCE11E --renderer-client-id=2 --mojo-platform-channel-handle=1724 --allow-no-sandbox-job /prefetch:13⤵
- System Location Discovery: System Language Discovery
PID:2744
-
-
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Nexol\" -ad -an -ai#7zMap26879:72:7zEvent311231⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2876
-
C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1768 -
C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"2⤵
- Executes dropped EXE
PID:4016
-
-
C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2220
-
-
C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2312 -
C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3332
-
-
C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4884 -
C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2432
-
-
C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1100 -
C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"2⤵
- Executes dropped EXE
PID:4776
-
-
C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2508
-
-
C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3860 -
C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2288
-
-
C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3980 -
C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3188
-
-
C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4980 -
C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"2⤵
- Executes dropped EXE
PID:1980
-
-
C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3848
-
-
C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4800 -
C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2360
-
-
C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3960 -
C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"2⤵
- Executes dropped EXE
PID:400
-
-
C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1800
-
-
C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1596 -
C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"2⤵
- Executes dropped EXE
PID:688
-
-
C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"2⤵
- Executes dropped EXE
PID:4272
-
-
C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
121KB
MD5a7ba50e8a23bf4a17f827c69bdb8f6ab
SHA117db88d7fa4bdb042897cf1b8a8d6620dc4f3b07
SHA25694561a6dd2e91b42d566846270b9d8915c30dd9200e7aab3a4e37547c0042491
SHA51216598f7fe5dbad5abac11bbf84fce5a26dd686c1786ddeea7b86ea239fd1fd06587755eee7d376f4ca01a0c61f8b8babf5928222009160949a332fe5e985964a
-
Filesize
99KB
MD588518dec90d627d9d455d8159cf660c5
SHA1e13c305d35385e5fb7f6d95bb457b944a1d5a2ca
SHA256f39996ab8eabdffe4f9a22abb1a97665816ec77b64440e0a20a80a41f0810ced
SHA5127c9d7bd455064d09307d42935c57de687764cf77d3c9ba417c448f4f2c4b87bcd6fea66354dfe80842a2fa3f96c81cc25e8bf77307b4ace1bbe1346cbe68435f
-
Filesize
967KB
MD54eaae49d718451ec5442d4c8ef42b88b
SHA1bbac4f5d69a0a778db567e6978d4dabf2d763167
SHA256dc4fdcd96efe7b41e123c4cba19059162b08449627d908570b534e7d6ec7bf58
SHA51241595b67c8506c054c28ce2b5dec9d304651449464c6e1eb092a049d49326594584900cff4e9b8210ca3ad8a23e9c22d8df1ae8af15f44a69f784cc546fcced3
-
Filesize
12KB
MD55747381dc970306051432b18fb2236f2
SHA120c65850073308e498b63e5937af68b2e21c66f3
SHA25685a26c7b59d6d9932f71518ccd03eceeba42043cb1707719b72bfc348c1c1d72
SHA5123306e15b2c9bb2751b626f6f726de0bcafdc41487ba11fabfcef0a6a798572b29f2ee95384ff347b3b83b310444aaeec23e12bb3ddd7567222a0dd275b0180ff
-
Filesize
4KB
MD51cf6411ff9154a34afb512901ba3ee02
SHA1958f7ff322475f16ca44728349934bc2f7309423
SHA256f5f2174daf36e65790c7f0e9a4496b12e14816dad2ee5b1d48a52307076be35f
SHA512b554c1ab165a6344982533cceed316d7f73b5b94ce483b5dc6fb1f492c6b1914773027d31c35d60ab9408669520ea0785dc0d934d3b2eb4d78570ff7ccbfcf9c
-
Filesize
10KB
MD5387ff78cf5f524fc44640f3025746145
SHA18480e549d00003de262b54bc342af66049c43d3b
SHA2568a85c3fcb5f81157490971ee4f5e6b9e4f80be69a802ebed04e6724ce859713f
SHA5127851633ee62c00fa2c68f6f59220a836307e6dde37eae5e5dca3ca254d167e305fe1eb342f93112032dadafe9e9608c97036ac489761f7bdc776a98337152344
-
Filesize
11KB
MD5b1dd654e9d8c8c1b001f7b3a15d7b5d3
SHA15a933ae8204163c90c00d97ba0c589f4d9f3f532
SHA25632071222af04465a3d98bb30e253579aa4beceaeb6b21ac7c15b25f46620bf30
SHA5120137900aeb21f53e4af4027ea15eed7696ed0156577fe6194c2b2097f5fb9d201e7e9d52a51a26ae9a426f8137692154d80676f8705f335fed9ae7e0e1d0a10e
-
Filesize
17KB
MD52d0c8197d84a083ef904f8f5608afe46
SHA15ae918d2bb3e9337538ef204342c5a1d690c7b02
SHA25662c6f410d011a109abecb79caa24d8aeb98b0046d329d611a4d07e66460eef3f
SHA5123243d24bc9fdb59e1964e4be353c10b6e9d4229ef903a5ace9c0cb6e1689403173b11db022ca2244c1ef0f568be95f21915083a8c5b016f07752026d332878a4
-
Filesize
14KB
MD5771c8b73a374cb30df4df682d9c40edf
SHA146aa892c3553bddc159a2c470bd317d1f7b8af2a
SHA2563f55b2ec5033c39c159593c6f5ece667b92f32938b38fcaf58b4b2a98176c1fc
SHA5128dcc9cc13322c4504ee49111e1f674809892900709290e58a4e219053b1f78747780e1266e1f4128c0c526c8c37b1a5d1a452eefba2890e3a5190eebe30657ba
-
Filesize
4KB
MD507504a4edab058c2f67c8bcb95c605dd
SHA13e2ae05865fb474f10b396bfefd453c074f822fa
SHA256432bdb3eaa9953b084ee14eee8fe0abbc1b384cbdd984ccf35f0415d45aabba8
SHA512b3f54d695c2a12e97c93af4df09ce1800b49e40302bec7071a151f13866edfdfafc56f70de07686650a46a8664608d8d3ea38c2939f2f1630ce0bf968d669ccc
-
Filesize
9KB
MD5a77210be2527533d1eceb8f0ea49607a
SHA1807e36fce4dbe269601939a8579ffb43fe43f381
SHA256da4df6490c7bc8afd804509f696f9afa6f709b7a327044e2781fa6c95770b239
SHA51254096f332f2a9bd5690c973eae19ef4199a6acb5243133b9065f433830984f91b62a9f1d71efeed5952cff0bbcb1befdce321cbb090c620bfc13a98bcc1dc14e
-
Filesize
11KB
MD5de64842f09051e3af6792930a0456b16
SHA1498b92a35f2a14101183ebe8a22c381610794465
SHA256dcfb95b47a4435eb7504b804da47302d8a62bbe450dadf1a34baea51c7f60c77
SHA5125dabeed739a753fd20807400dfc84f7bf1eb544704660a74afcf4e0205b7c71f1ddcf9f79ac2f7b63579735a38e224685b0125c49568cbde2d9d6add4c7d0ed8
-
Filesize
9KB
MD51130abf0e51093dc7edd2c0c334be5d8
SHA1260a373c4df2ec71dcd343ce4cd97b65d18efa82
SHA256da788d30aa74b3f8b3d920e98c535e4544756e9e4e235ed0221654f3177d3d2a
SHA5120f7242992c990085b8332c7e072928a17f4fa4e729451600f1abf58158eb1b782ac4a3c200c1db510bf70f13e6790dadf897e1d1c6effb77187ad41b02e16dbc
-
Filesize
4KB
MD56bdf25354b531370754506223b146600
SHA1c2487c59eeeaa5c0bdb19d826fb1e926d691358e
SHA256470eaf5e67f5ead5b8c3ecc1b5b21b29d16c73591eb0047b681660346e25b3fb
SHA512c357b07c176175cc36a85c42d91b0cada79dbfb584bdf57f22a6cb11898f88aecf4392037d5cea3e1bc02df7493bb27b9509226f810f1875105bbc33c6ae3f20
-
Filesize
7KB
MD5c397e8ac4b966e1476adbce006bb49e4
SHA13e473e3bc11bd828a1e60225273d47c8121f3f2c
SHA2565ccd481367f7d8c544de6177187aff53f1143ae451ae755ce9ed9b52c5f5d478
SHA512cbbece415d16b9984c82bd8fa4c03dbd1fec58ed04e9ef0a860b74d451d03d1c7e07b23b3e652374a3b9128a7987414074c2a281087f24a77873cc45ec5aadd2
-
Filesize
9KB
MD51e30a705da680aaeceaec26dcf2981de
SHA1965c8ed225fb3a914f63164e0df2d5a24255c3d0
SHA256895f76bfa4b1165e4c5a11bdab70a774e7d05d4bbdaec0230f29dcc85d5d3563
SHA512ff96e6578a1ee38db309e72a33f5de7960edcc260ca1f5d899a822c78595cc761fedbdcdd10050378c02d8a36718d76c18c6796498e2574501011f9d988da701
-
Filesize
17KB
MD55894a446df1321fbdda52a11ff402295
SHA1a08bf21d20f8ec0fc305c87c71e2c94b98a075a4
SHA2562dd2130f94d31262b12680c080c96b38ad55c1007f9e610ec8473d4bb13d2908
SHA5120a2c3d24e7e9add3ca583c09a63ba130d0088ed36947b9f7b02bb48be4d30ef8dc6b8d788535a941f74a7992566b969adf3bd729665e61bfe22b67075766f8de
-
Filesize
264KB
MD58e469a025da84eaaabd3fb939715a3e2
SHA1101b74ec653229778d043eb076dba4c25092a643
SHA25614c76b69df2443c4b3bb179c5ef628b5a76323131099f18339fe91c4265603f0
SHA51278f3c312fa51b429c959aa8315c630d4ffe983eec679e51c25949a85c7bf29efdf6360a69ed4d3a4de507928146986ec497146ddac032eb6dd183a2db27ed9ab
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
Filesize
64KB
MD5a7e76f87fad8bc410d5fac5e19b00b41
SHA1b1e27369f113e45ce557349890dd6c078949def1
SHA2564ab494821a16b965f361482b43c154756968fd080ff12b63aa12a778e19bb412
SHA512bdd031a2904540450a280ea9cc38b6c55f53d7e9f89c185e7596067f4463df3ac84f0c0d9714b7cf83b60734f42a738322a6cc6284672946bff4e00816b7359e
-
Filesize
649B
MD54c058f660d6355736231b8415b3f1a40
SHA190508ed7a298185e2faf3652a44380dc5aac3321
SHA256940cbd0d69f50221a0cf13d0d1f518e006c3fe3331d5a841766ebf4674e5707c
SHA5125c62af6ca7c136abf54ce3a254e11c3ba6fed8a337d4ef259287686cb838337742a68a9a0196bb1f1b503fbba39201b8045fa728558cf40154ea125a763416e0
-
Filesize
215KB
MD5d79b35ccf8e6af6714eb612714349097
SHA1eb3ccc9ed29830df42f3fd129951cb8b791aaf98
SHA256c8459799169b81fdab64d028a9ebb058ea2d0ad5feb33a11f6a45a54a5ccc365
SHA512f4be1c1e192a700139d7cff5059af81c0234ed5f032796036a1a4879b032ce4eedd16a121bbf776f17bc84a0012846f467ad48b46db4008841c25b779c7d8f5a
-
Filesize
552B
MD53955f094e02e8f278609db2fca8f42c0
SHA1c01a0be20847a089acf16029643b01f96f5a202c
SHA256af6b4387ad445a87a0d942596334c5d377b72869b370c6b6887503a9bc09f89e
SHA512c55da7316845f9c727101af87b400fd1163cd1a8913ed65330fa1c5ede8256c75ce00b7a73ce03119743c112124d95c63304c29fd41bfb868f88f136d3544299
-
Filesize
216B
MD588eae2a1b90471c278a59c619a600773
SHA1c02ab36dd69adc44f9c9c1ceba6c1806ebc342fe
SHA2569ad80e73809a6de59aaf97f1517b3145c855b1e653dd01d2ee226cf375377899
SHA5125f6817f7fc32528618928050fc7c61a6d292315088ad39d978c3ac39829ae5029e62a6b275ec81a2ee56d72912f9c0f039b2b6a96adf858827096b01f12c9af8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
3KB
MD5499655a26dd338412c7963efc3718afe
SHA162a90f40a60fcf07439e3a66faee2cb967ab3672
SHA256c82c54548f2229af265e1e94b11ed37931b4bee07bf07cfe03cb5f2b5f65571e
SHA512837f22044c4536541bb3318f163ff4a277909512c8c74d6c9ae249b7f9ef620cfcf4c45478230eabc5135e1811e1e80de256c751609c8a7313320e8a136709d4
-
Filesize
4KB
MD5a573ad7041a77c1c0e8c16e07f86ee98
SHA183b7bbc6d9effc719156633babe96f2519948eaa
SHA25631865d96ed13cbd3899e5add97b4cf9ecf9c0cf988cc70d361d988fcc4639279
SHA5128b42b1ad423a182fd97b9974c7bad61cfb145c09990eefd48ce94c8fa3bacfa55cc5205b64536a4cc1e47c44224cdaca2cbd3457963b7fedf3394554a35585e8
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
521B
MD561cd20118734457f17d60b27c0082118
SHA1ab38588e9dbabae85c39de376c19ff30d5a982fd
SHA256bd135db4baa359d82a10880bee9ee9c7896eef24c7c0550446a5f17880097acc
SHA5123dfac9d0ef442a0705abc1d0b17387defcaed3594d57e40aae2b34466c2f0b10082fcbef388b81cc8fc741e94c7b8c97dbdffdbdf84e71d8a2877f691678d399
-
Filesize
354B
MD5f3b72e4e7573f6386f209bb7efe2d0c9
SHA199bfb82720b3033fc3778c37c66856b568574405
SHA256d7fcf95243015de89bc3875edba6cc8089f2c3628660d6eb710fd14ea1fb77ce
SHA512b26c36ce14ad822b3f4bdcb1e611c4db4dcff9c233d08bf9d8346a532b39da8f79d26d1a39d3c0b42072247a0a9b5bf341dd7d877f0eea37b133c2097d686682
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
10KB
MD556cf275391ab7ef886c6d26a086462d0
SHA1b25da3e725ce3d9705ab6655f76c58ee803a0e74
SHA256817bc24381ad2ca7729855e22d6958f0aa26b1ba7865b6fa3adf88a9f3146bab
SHA512f169e8ccb5ba9966c4a4a293399322ab53b68cdb8cbc8a4368267de3b2b9cbc77937c0ed5e5df967b74134f64f72fb08d72f32704355243d3cd54e81de9608f6
-
Filesize
10KB
MD59438532ef99cdab8664f3120a19fb398
SHA1fcf927dc54d66d8e0f7cd782ddc59492a7094238
SHA256f2f4fac71123a0df29f01ac927411b1202bfee6d14d9b1b32c7f9c5b81a7123e
SHA512a1a089fc17970ed16d72a6c533d58c869a8b709cddb5e3f1f23f06fd08ac920c44ae6c77f1aa288cd8d4ea013add86b4c2de7ef9e6c16b026b474fc736191bd5
-
Filesize
9KB
MD58aa3cef4aafd5f9bc10c282de5e7be8b
SHA109590b0092d41e1f4c75c40acdad66895a3cec01
SHA256da47ea8e68e413a1a3a7eef5175fc4c80224e6209901d0fb9b47657520c78179
SHA512646802f34fe506d36565dda7515911d88b16061989e2f73e42b2684112633ca5f4678b29c05ea73b051f8a83e2fc830916ddb97b55ceb141465c33a82285fec8
-
Filesize
9KB
MD5ac7462ea0386c1f02e437fbf2469dcbd
SHA1388eb24685c085e10c7f285adf10e9f528b966b6
SHA25618eca8fd6c3ed6114c492975ac49a682bf58a1cb00b9a11d6cad2994f161e358
SHA51225333b485424abdf645918eb297dd259c54c61d0df6d11803a26eddde8c08810037a5bbf2ddd63b6e3b1a6da0b1286674c21bc661bad1b452a3024b921122808
-
Filesize
10KB
MD56d2719550bb0e09215e4f9044d2d3337
SHA17da1704226488b5980ba415e725a41fbc36e319f
SHA256293aceb0e173333b56a0c33987f1f9aaa66661bf5e3e7d41428ec80788451315
SHA512372f834ec854a5aa74c9325bab64bad7cf7f795e4491da9407785c326a2253a537907272f120262bec74281c17035d635a764bd83f0c725ed87b863abe1747c9
-
Filesize
9KB
MD590b15763e711e3bfc6e490950cd25ba1
SHA1c0d0b7007ab84369d9718de57f25b7a6773416b7
SHA256f493dda6da9164c84c62dd687e1c83179a9ded6fd1ddc03a072a15e755c0d09c
SHA512ea3c3b44e77c5e3ce22b89e36ebfa73db917428be1237a542ad88e83a9780128c67c67763484f5033844500dec30c5439862ad348637936e0e0961fef36d452c
-
Filesize
10KB
MD5e7e9ab85ed1986afd02e76cc01eabd10
SHA1a8884a1197b651536dea6b27cfa6f56d3e151304
SHA25697ac7cf8961a4be501f946280cd9fd66067e774c8db583cc93a3757e67d78a66
SHA512729d3cfc8439ce0aeb090ab9f391b8be8d1dd67c7195aa43a8504077d7961adc2083c3dab2ecc54c277ed87a211034798ea333281be21c712f847fb11c7ba8fe
-
Filesize
9KB
MD51c38d64808152fdc0e8b3ee2e90e6c5a
SHA179faf7e4663cd6de55c721b69656906b379032a0
SHA2565e4972167ac07cd4ba252d855d51ea2845887ef87d408146e8bb804cf0748999
SHA5128bd8deb6e351aa04e57aa75424520ba9e3fd3d6305497d7d9593c1ea677b2256bd2891eb0b356497f13d4dda8647c94acb32256837b9a52ff0e6854a21a94982
-
Filesize
15KB
MD5659a0b49d8f08591764573b057c1a699
SHA153ad0b46e5e5493571771f1f4403a2a02046dc02
SHA256a9771acb8b2368f48f12d8fa77ad04946178dee52b8243e45b30b279d50d1b11
SHA5128bb8bfec7dfc8a0b8ba3880c8191e5f57e0c5ae02c7d9a23fa9571eb79ff5060be8019fb67f8805b31756727f0748f9b93afa94cee74ea293fb63e95ca86cc18
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5032bfe80c732a12a15ca8fb047d2ed75
SHA115a949f0818c1df7565201cc7845fc6aeb2e5f93
SHA2566a1670b1890d7e44bb2fcecde43d398f0a7320ae01b76fbbbd5943d05f119f96
SHA512deee0d577fdbaa19c6554660787e5b0f00448c895cc469647777105bbd930925b1beab893be702415048cd740dcf7cb532ee537d29a27270a7dcd5b221d09bab
-
Filesize
231KB
MD52f5d2a266ba87df05fb1ac900e9c8796
SHA15532ffbe6dd69b5bddb6e74005d4efefab68454d
SHA256f0ecdb41b675c8b4e31cb27e7595e81c275e8f22116f8787cd4c2d3143bc1c14
SHA51225816d37ba8bc0e75749668937742f66c55ba03b2a678834a9091833b04ae06a6087883380585f61cd962fa23ca68ae92465ad8f6563eaa04ccf508aa17e3398
-
Filesize
231KB
MD54ee605fac4622bd7b764437adc7f92f0
SHA1e880083424ef800e75e9eb0760324eafcad8ba9c
SHA256ed6ece51d8e16813cd83af0e062eb2e8752d22757da3b295c2c28604d5a1e9d4
SHA512da763e83028c4dc5b6e5a2e93decfe3cddf006bc0402228a9dde34656e63ace0c7fef8e40a473d63a9b6220cb62f18c43864d950304daaa854565851883c35f5
-
Filesize
231KB
MD51278f66144ef9a7442335533e4255627
SHA138421844611ad6e5611db326db5ca5ceda3395b6
SHA256de2b5ebb61c413f66082c8d54cae72107c862d324d0ea00d89bbbbb3d14aaf39
SHA512379338c9a8f7ec71928db08c87d24f30d95a57254bac5ce1b5e86f9e911e24405628d1311c77e30bd8df036cbb5b031f066cdfbf7848cf895c4e80f0b6052b4c
-
Filesize
152B
MD5826c7cac03e3ae47bfe2a7e50281605e
SHA1100fbea3e078edec43db48c3312fbbf83f11fca0
SHA256239b1d7cc6f76e1d1832b0587664f114f38a21539cb8548e25626ed5053ea2ab
SHA512a82f3c817a6460fd8907a4ac6ab37c2129fb5466707edcfb565c255680d7f7212a5669fe2a42976150f16e4e549ea8310078f22ed35514ee1b7b45b46d8cc96e
-
Filesize
152B
MD502a4b762e84a74f9ee8a7d8ddd34fedb
SHA14a870e3bd7fd56235062789d780610f95e3b8785
SHA256366e497233268d7cdf699242e4b2c7ecc1999d0a84e12744f5af2b638e9d86da
SHA51219028c45f2e05a0cb32865a2554513c1536bf9da63512ff4e964c94a3e171f373493c7787d2d2a6df8012648bbefab63a9de924f119c50c39c727cf81bdc659f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5344dd2fd114cf6d4d7da07a23d3ff3a0
SHA181e7ebdd0bec5f9a3d72ed59ed2903d6aa56a8c9
SHA256a382f73399f3c71584a0cdeff1415adf280c831cba7f070fb270b1bcc8261fd8
SHA512f178f27c3c10616a0d045c16fbb4f93bef86ca0b9d1a3704824ea1e0fa46fc14ad4eea298e19d79c9022f74accffc5d0d8734eb6a3330044153f56a4c26d96c5
-
Filesize
4KB
MD55876dd53fefbe13a373df4a2ae0f6324
SHA130008b1cf16fe754dcd4113cf841221de7ac166f
SHA256ee31c33d1487860f3532ba53be02890d413f02533e9c004459770de3b5965caf
SHA512105d75b86e7b58dd9ecfa4ae2cb217925d96d1ef6b130272d1fdf2294fea36a64c21eb5e9503bc23a1d99f2fadc326a8512865001489cda1a1667c7b5cb29b41
-
Filesize
5KB
MD52d31b3fcbadb15d8bf25a97113d784c2
SHA1f9484d15dd3d2a111cae0f52f2f9af6632b90379
SHA256821ac060d4e841a6111fe87bf6667676847f7cf8bf8c6dd14548cc5f609b002a
SHA51285b2c580ccb34a40c176b8575fb03a3a23aa172cec81241c5b87a0de09297cff1ce5285bac0d7a3c32467f1e4c2a827ef3a2f40e00cbedebf46b8e18285d984e
-
Filesize
7KB
MD5f505f20eb3c199653c68df6ad9919878
SHA1e2c98f212c434bb06b68957dbcdcedee69a8e273
SHA256e54b168b1fad22b201f1ae7d954ec9a26f9bd67a21b60678cc3a865f68128202
SHA5126ffd356d9b4fc3e4fd09f6e9555d6706442d1264f8edc5bdcb63349838860a0e87c818a9384da30d2fb32d11c9775b3f0efcdc997348b47e813e2cf71e33c5b8
-
Filesize
6KB
MD562611baa61d7db1c74360711be31d694
SHA1da7a4b76a8b076a6ee756ea03b1bf7f2d83f47ea
SHA25657dc15d773b58efc02b2c1408845c6a39c6842bb760d1718bbc85aedf68d311c
SHA51276cd5f7d2688c828ee85389ba0d91b2f682df1130fdc0d021b9b7c8cdcb70c1124ce8e833ae37bf14c39b78807379654e15531781f275c12750eed1d59d26aca
-
Filesize
7KB
MD5a4fbdcb527ae8c87195c57a1963f1eb3
SHA1e2f7d6567550f30cb53e966389e49e39bd42907a
SHA2568eea1113bd74f3ffe6d4311ab602e4c43ab8ffbf92f92ce9459ede7dc18f8835
SHA5127ee148c3c68406e9de21dd2b437119213c6f5a150384fa9ad262b89af8fec68f2abce4e685bf1bf46b804c3e4ea501bc36b527a201abb0fda702d36d85e425c6
-
Filesize
1KB
MD53e56d5075cf3158c22daf21075f6c57d
SHA1f4dc931b2dfab60e5da6c9a637338e4f1081fa9b
SHA256125e48ba0f91e42909d80648a26a5d1ffb5945cf5a15636dcc2602dc82f73aba
SHA512bc0d8366c7a098cb37559c5eb3bb6e692c98b7f676fc0718a98d2c085cee87902c1c47e798c668071a0799f9f9ad45dba32e6ee5f49b3de712a206c2b343e960
-
Filesize
706B
MD56a9fd097c82d56175220f305b3c94f03
SHA1cdd9737f2dca57e98b3650ea0e0fc5efdce50de2
SHA25621c01062d20fff907fcb8a18ca7dd23a0aadc86ca0870ccbde380701689c7c27
SHA512308419088b21f54e2568f70ef1f460b1a88b70a88fcd3ccc15d053f7bae62367f42e5c231303aa0f2f4a32f2fbf9876e26744734b477a281f66134a44a00c989
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5dbab57b1cecabcb46fc20b4786de70a3
SHA10717316f1eaa6b6ce362f1e9157f8f4de40750a0
SHA256e1f8d8fe2e32aa1698d1e5f56a607cce8aa5b22b823c4ef4e966244a82d14f3a
SHA5126d55dd7fbe7492c72ef4bc1820b4b3925810eba4c8af624dd249fdd2cf9bd8d8ade3d49ef4b6f111453d604daf81ad165db6024a6a47cb22c9e041b73afe8525
-
Filesize
10KB
MD54643adcaea3f241c8d1815713350b011
SHA18a681420e33de8f137599d6439f70d18f7df5e50
SHA256ad620c8bd7e18990f8f900b4a67d32c229995b98fa52639d5210ccd1108cf56a
SHA5122261851778fa9e65945c413b5c1493b80c99e1166e233a8cb7859869e0536d5377035128159d88d128ff8d1713d1111f328f46a73dae31853f32c7387914ac56
-
Filesize
10KB
MD5e7bc96dbee9912ada3f17812222a5bfd
SHA187fcc5c6a3f54139f0451246bafcac475243953b
SHA256bcd53e483a17afcaceb153cf5d38c4369179c86c06ac6c95169bbabf1558f5c1
SHA5124b1409e6f6368bf51f87aec20e4de4221b94b76f60638e490c22485ab56fc2efd115e8b77c76654acc8c8cbc8e400206d1512c5d613cd62223d25c5240e71524
-
Filesize
10KB
MD5943ccfe330fe0eeec18195aa5811e8ff
SHA1298e36a86660e481bc3b9e8365eaf46d2f948ed5
SHA256e5bbbcb885f7349c2484f7103a259325c1531c5808bcccde5086b90cfbdcee8d
SHA5125a245cf249828f823e129cca6feb11ac3b77775f5d429a974304c997f9ccc79041892ec8c0e6ee4fc36313f90a273b5f598bb2b4ba0b3af8ba6e026c58499a26
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir4960_1453641644\209cf7fb-773e-4aae-a52e-d3501839fa2d.tmp
Filesize150KB
MD514937b985303ecce4196154a24fc369a
SHA1ecfe89e11a8d08ce0c8745ff5735d5edad683730
SHA25671006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff
SHA5121d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
2.4MB
MD5f3d4dac0383100a2ab218736829401f2
SHA1f3daa2eeb1c369009e7bde3a59ab38bfda57f01e
SHA25616454a23ce21fba6407082739164a21cfc10677d038f507111c0f918f2aa43ab
SHA5122dfa616b3a4da0e3b2ce2bf8846fdfeb6051caf61349a9bbb9cab1fa5051e19d743be667a5bc0e4e6cd8d88dc39566b8f9fe12a4b7c2212f037592243fd9ecdb
-
Filesize
66B
MD591a932dcd7bffe18428528359af8f18f
SHA1bee30924f7cdee4b6332c7e53726c14e0e5acf36
SHA256467b8610308d08ee1a4d30fd9ed93e238352b3020d19a8417c51df22eed98b3e
SHA5120f2e141a64a55088b078d789159fde7bf407ebcd5583528a380cde89f573b104c29045dc1dd923fff562e4bbf1f710443a2ba5d617292cbd625030bcab074fc2
-
Filesize
547KB
MD59591405073c6460e382343c75de477e3
SHA132d73c95f3a6f5470230dd21800de592c06d906a
SHA256952dc4888a39c7ae027b323345996ff163af787e71103af323588df74be01f23
SHA512d7cf6df8eea6128447ebd99a9c4c5823b0ae1919dfd30bb63bdaa277eb7e1a7226b0bb2da675b790cb4b6cc4262c26094a96c34b3d257439a02c80b5db0f7138
-
Filesize
1.4MB
MD5e2eaaa343d56c238b6dbbbf034f6d866
SHA177e6491c2fe3ad66f3ac9827d9d8f9496f366832
SHA256bb8d508aa0e6ff6f33d28156abff10579c82e152c081245a78e0046e3ec2fc0d
SHA5122e3ce83a06ea96985c63653ea7326133027f8dd9fcc12cb0a8383428ead7d02f74befa51d714dee1e17e8257e67c9c4d394c0901963b9973bfde3446764c5194
-
Filesize
4.8MB
MD5b744f5976b64674d00ba08631c4a07f9
SHA166dbc4b7a5fe9e42c8da94d7a7940023bb8b50aa
SHA256fea44ec1aa17a4037b5d5b6de901232fedb17e8cebaca5c85aed1a335283b5f8
SHA5129a899741a20f24377ead33430c641b933c32af55e01ed825c1c7aa7e438d39d6b60027021b479d7dcac48319bf2ea19c25ddbb048508d1e56d6aa224021ca1ab
-
Filesize
1.6MB
MD56c73cc4c494be8f4e680de1a20262c8a
SHA128b53835fe92c3fa6e0c422fc3b17c6bc1cb27e0
SHA256bdd1a33de78618d16ee4ce148b849932c05d0015491c34887846d431d29f308e
SHA5122e8b746c51132f933cc526db661c2cb8cee889f390e3ce19dabbad1a2e6e13bed7a60f08809282df8d43c1c528a8ce7ce28e9e39fea8c16fd3fcda5604ae0c85