Analysis

  • max time kernel
    257s
  • max time network
    259s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    04-01-2025 23:56

General

  • Target

    https://www.mediafire.com/file/yyekffdz0swx11j/Nexol.rar/file

Malware Config

Extracted

Family

lumma

C2

https://cloudewahsj.shop/api

https://rabidcowse.shop/api

https://noisycuttej.shop/api

https://tirepublicerj.shop/api

https://framekgirus.shop/api

https://wholersorie.shop/api

https://abruptyopsn.shop/api

https://nearycrepso.shop/api

Signatures

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Downloads MZ/PE file
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 30 IoCs
  • Loads dropped DLL 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 10 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs

    When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 24 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 44 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 28 IoCs
  • Suspicious use of SetWindowsHookEx 32 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://www.mediafire.com/file/yyekffdz0swx11j/Nexol.rar/file
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2124
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffedfe23cb8,0x7ffedfe23cc8,0x7ffedfe23cd8
      2⤵
        PID:1516
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1912,17896570201839764756,7736065884894378219,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1928 /prefetch:2
        2⤵
          PID:3560
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1912,17896570201839764756,7736065884894378219,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2356 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4368
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1912,17896570201839764756,7736065884894378219,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:8
          2⤵
            PID:4788
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,17896570201839764756,7736065884894378219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:1
            2⤵
              PID:2108
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,17896570201839764756,7736065884894378219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:1
              2⤵
                PID:768
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,17896570201839764756,7736065884894378219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:1
                2⤵
                  PID:3600
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,17896570201839764756,7736065884894378219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:1
                  2⤵
                    PID:2848
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,17896570201839764756,7736065884894378219,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5916 /prefetch:1
                    2⤵
                      PID:2844
                    • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1912,17896570201839764756,7736065884894378219,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6772 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4412
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1912,17896570201839764756,7736065884894378219,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6360 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2248
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,17896570201839764756,7736065884894378219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:1
                      2⤵
                        PID:2344
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,17896570201839764756,7736065884894378219,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6000 /prefetch:1
                        2⤵
                          PID:1772
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,17896570201839764756,7736065884894378219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6364 /prefetch:1
                          2⤵
                            PID:2220
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,17896570201839764756,7736065884894378219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5976 /prefetch:1
                            2⤵
                              PID:2120
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,17896570201839764756,7736065884894378219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6224 /prefetch:1
                              2⤵
                                PID:1724
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,17896570201839764756,7736065884894378219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6832 /prefetch:1
                                2⤵
                                  PID:2676
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1912,17896570201839764756,7736065884894378219,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6276 /prefetch:8
                                  2⤵
                                  • NTFS ADS
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:1972
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,17896570201839764756,7736065884894378219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:1
                                  2⤵
                                    PID:2344
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:3340
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:240
                                    • C:\Windows\system32\OpenWith.exe
                                      C:\Windows\system32\OpenWith.exe -Embedding
                                      1⤵
                                      • Modifies registry class
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2492
                                    • C:\Windows\system32\OpenWith.exe
                                      C:\Windows\system32\OpenWith.exe -Embedding
                                      1⤵
                                      • Modifies registry class
                                      • Suspicious use of SetWindowsHookEx
                                      PID:4628
                                    • C:\Windows\system32\OpenWith.exe
                                      C:\Windows\system32\OpenWith.exe -Embedding
                                      1⤵
                                      • Modifies registry class
                                      • Suspicious behavior: GetForegroundWindowSpam
                                      • Suspicious use of SetWindowsHookEx
                                      PID:4820
                                      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                                        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\Nexol.rar"
                                        2⤵
                                        • System Location Discovery: System Language Discovery
                                        • Checks processor information in registry
                                        • Modifies Internet Explorer settings
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of SetWindowsHookEx
                                        PID:4980
                                        • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                          "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:4820
                                          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3C044926649DDE839B2E5AEC309BDF7E --mojo-platform-channel-handle=1768 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                            4⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:2044
                                          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=8D98C0B072A2419E5D4A05146225E76C --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=8D98C0B072A2419E5D4A05146225E76C --renderer-client-id=2 --mojo-platform-channel-handle=1776 --allow-no-sandbox-job /prefetch:1
                                            4⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:3192
                                          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A0F938B3AA4A6302C2163F1355B18286 --mojo-platform-channel-handle=2332 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                            4⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:3568
                                          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=FB43558FD3D412409238BC98C6F2C049 --mojo-platform-channel-handle=1784 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                            4⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:1096
                                          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=2408D636E171B0903C733661AB7A0415 --mojo-platform-channel-handle=2544 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                            4⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:876
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe"
                                      1⤵
                                      • Drops file in Windows directory
                                      • Enumerates system info in registry
                                      • Modifies data under HKEY_USERS
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      PID:4960
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffedf78cc40,0x7ffedf78cc4c,0x7ffedf78cc58
                                        2⤵
                                          PID:5104
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1996,i,11960147699375483378,15935318008822386826,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1992 /prefetch:2
                                          2⤵
                                            PID:692
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1684,i,11960147699375483378,15935318008822386826,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2040 /prefetch:3
                                            2⤵
                                              PID:956
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2148,i,11960147699375483378,15935318008822386826,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2228 /prefetch:8
                                              2⤵
                                                PID:4056
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3080,i,11960147699375483378,15935318008822386826,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3084 /prefetch:1
                                                2⤵
                                                  PID:1812
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3104,i,11960147699375483378,15935318008822386826,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3256 /prefetch:1
                                                  2⤵
                                                    PID:4572
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4500,i,11960147699375483378,15935318008822386826,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4528 /prefetch:1
                                                    2⤵
                                                      PID:3240
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4784,i,11960147699375483378,15935318008822386826,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4788 /prefetch:8
                                                      2⤵
                                                        PID:1596
                                                      • C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe
                                                        "C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --reenable-autoupdates --system-level
                                                        2⤵
                                                        • Drops file in Windows directory
                                                        PID:4336
                                                        • C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe
                                                          "C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x244,0x248,0x24c,0x220,0x250,0x7ff66d474698,0x7ff66d4746a4,0x7ff66d4746b0
                                                          3⤵
                                                          • Drops file in Windows directory
                                                          PID:3340
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4564,i,11960147699375483378,15935318008822386826,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4524 /prefetch:8
                                                        2⤵
                                                          PID:2492
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5116,i,11960147699375483378,15935318008822386826,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5008 /prefetch:8
                                                          2⤵
                                                            PID:3276
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4984,i,11960147699375483378,15935318008822386826,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4596 /prefetch:8
                                                            2⤵
                                                              PID:2304
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4624,i,11960147699375483378,15935318008822386826,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5132 /prefetch:8
                                                              2⤵
                                                                PID:4716
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3628,i,11960147699375483378,15935318008822386826,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5084 /prefetch:8
                                                                2⤵
                                                                  PID:3980
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5364,i,11960147699375483378,15935318008822386826,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5168 /prefetch:2
                                                                  2⤵
                                                                    PID:1472
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=4348,i,11960147699375483378,15935318008822386826,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4336 /prefetch:1
                                                                    2⤵
                                                                      PID:5040
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=3316,i,11960147699375483378,15935318008822386826,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3440 /prefetch:1
                                                                      2⤵
                                                                        PID:1744
                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5744,i,11960147699375483378,15935318008822386826,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5392 /prefetch:8
                                                                        2⤵
                                                                          PID:1580
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5740,i,11960147699375483378,15935318008822386826,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5768 /prefetch:8
                                                                          2⤵
                                                                            PID:2096
                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5004,i,11960147699375483378,15935318008822386826,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5300 /prefetch:8
                                                                            2⤵
                                                                            • Subvert Trust Controls: Mark-of-the-Web Bypass
                                                                            • NTFS ADS
                                                                            PID:8
                                                                          • C:\Users\Admin\Downloads\7z2409-x64.exe
                                                                            "C:\Users\Admin\Downloads\7z2409-x64.exe"
                                                                            2⤵
                                                                            • Executes dropped EXE
                                                                            • Drops file in Program Files directory
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Modifies registry class
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:1404
                                                                        • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                          "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                          1⤵
                                                                            PID:2500
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                            1⤵
                                                                              PID:4992
                                                                            • C:\Windows\System32\rundll32.exe
                                                                              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                              1⤵
                                                                                PID:908
                                                                              • C:\Users\Admin\Downloads\7z2409-x64.exe
                                                                                "C:\Users\Admin\Downloads\7z2409-x64.exe"
                                                                                1⤵
                                                                                • Executes dropped EXE
                                                                                • Drops file in Program Files directory
                                                                                • System Location Discovery: System Language Discovery
                                                                                • Modifies registry class
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:4316
                                                                              • C:\Program Files\7-Zip\7zG.exe
                                                                                "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Nexol\" -ad -an -ai#7zMap16299:72:7zEvent30625
                                                                                1⤵
                                                                                • Executes dropped EXE
                                                                                • Loads dropped DLL
                                                                                PID:4876
                                                                              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                                                                                "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\Nexol.rar"
                                                                                1⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                • Checks processor information in registry
                                                                                • Modifies Internet Explorer settings
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:336
                                                                                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
                                                                                  2⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:2676
                                                                                  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=28C122B0AA6140F898377596CFEBAF99 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                                                                    3⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:4580
                                                                                  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=CDA7DF66C0A8EC54E2CC9CCE76CCE11E --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=CDA7DF66C0A8EC54E2CC9CCE76CCE11E --renderer-client-id=2 --mojo-platform-channel-handle=1724 --allow-no-sandbox-job /prefetch:1
                                                                                    3⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:2744
                                                                              • C:\Program Files\7-Zip\7zG.exe
                                                                                "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Nexol\" -ad -an -ai#7zMap26879:72:7zEvent31123
                                                                                1⤵
                                                                                • Executes dropped EXE
                                                                                • Loads dropped DLL
                                                                                PID:2876
                                                                              • C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe
                                                                                "C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"
                                                                                1⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious use of SetThreadContext
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:1768
                                                                                • C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe
                                                                                  "C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  PID:4016
                                                                                • C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe
                                                                                  "C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:2220
                                                                              • C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe
                                                                                "C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"
                                                                                1⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious use of SetThreadContext
                                                                                PID:2312
                                                                                • C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe
                                                                                  "C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:3332
                                                                              • C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe
                                                                                "C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"
                                                                                1⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious use of SetThreadContext
                                                                                PID:4884
                                                                                • C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe
                                                                                  "C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:2432
                                                                              • C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe
                                                                                "C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"
                                                                                1⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious use of SetThreadContext
                                                                                PID:1100
                                                                                • C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe
                                                                                  "C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  PID:4776
                                                                                • C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe
                                                                                  "C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:2508
                                                                              • C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe
                                                                                "C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"
                                                                                1⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious use of SetThreadContext
                                                                                PID:3860
                                                                                • C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe
                                                                                  "C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:2288
                                                                              • C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe
                                                                                "C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"
                                                                                1⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious use of SetThreadContext
                                                                                PID:3980
                                                                                • C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe
                                                                                  "C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:3188
                                                                              • C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe
                                                                                "C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"
                                                                                1⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious use of SetThreadContext
                                                                                PID:4980
                                                                                • C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe
                                                                                  "C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  PID:1980
                                                                                • C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe
                                                                                  "C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:3848
                                                                              • C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe
                                                                                "C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"
                                                                                1⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious use of SetThreadContext
                                                                                PID:4800
                                                                                • C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe
                                                                                  "C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:2360
                                                                              • C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe
                                                                                "C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"
                                                                                1⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious use of SetThreadContext
                                                                                PID:3960
                                                                                • C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe
                                                                                  "C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  PID:400
                                                                                • C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe
                                                                                  "C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:1800
                                                                              • C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe
                                                                                "C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"
                                                                                1⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious use of SetThreadContext
                                                                                PID:1596
                                                                                • C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe
                                                                                  "C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  PID:688
                                                                                • C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe
                                                                                  "C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  PID:4272
                                                                                • C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe
                                                                                  "C:\Users\Admin\Downloads\Nexol\Nexol\Nexol.exe"
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:928

                                                                              Network

                                                                              MITRE ATT&CK Enterprise v15

                                                                              Replay Monitor

                                                                              Loading Replay Monitor...

                                                                              Downloads

                                                                              • C:\Program Files\7-Zip\7-zip.chm

                                                                                Filesize

                                                                                121KB

                                                                                MD5

                                                                                a7ba50e8a23bf4a17f827c69bdb8f6ab

                                                                                SHA1

                                                                                17db88d7fa4bdb042897cf1b8a8d6620dc4f3b07

                                                                                SHA256

                                                                                94561a6dd2e91b42d566846270b9d8915c30dd9200e7aab3a4e37547c0042491

                                                                                SHA512

                                                                                16598f7fe5dbad5abac11bbf84fce5a26dd686c1786ddeea7b86ea239fd1fd06587755eee7d376f4ca01a0c61f8b8babf5928222009160949a332fe5e985964a

                                                                              • C:\Program Files\7-Zip\7-zip.dll

                                                                                Filesize

                                                                                99KB

                                                                                MD5

                                                                                88518dec90d627d9d455d8159cf660c5

                                                                                SHA1

                                                                                e13c305d35385e5fb7f6d95bb457b944a1d5a2ca

                                                                                SHA256

                                                                                f39996ab8eabdffe4f9a22abb1a97665816ec77b64440e0a20a80a41f0810ced

                                                                                SHA512

                                                                                7c9d7bd455064d09307d42935c57de687764cf77d3c9ba417c448f4f2c4b87bcd6fea66354dfe80842a2fa3f96c81cc25e8bf77307b4ace1bbe1346cbe68435f

                                                                              • C:\Program Files\7-Zip\7zFM.exe

                                                                                Filesize

                                                                                967KB

                                                                                MD5

                                                                                4eaae49d718451ec5442d4c8ef42b88b

                                                                                SHA1

                                                                                bbac4f5d69a0a778db567e6978d4dabf2d763167

                                                                                SHA256

                                                                                dc4fdcd96efe7b41e123c4cba19059162b08449627d908570b534e7d6ec7bf58

                                                                                SHA512

                                                                                41595b67c8506c054c28ce2b5dec9d304651449464c6e1eb092a049d49326594584900cff4e9b8210ca3ad8a23e9c22d8df1ae8af15f44a69f784cc546fcced3

                                                                              • C:\Program Files\7-Zip\Lang\ar.txt

                                                                                Filesize

                                                                                12KB

                                                                                MD5

                                                                                5747381dc970306051432b18fb2236f2

                                                                                SHA1

                                                                                20c65850073308e498b63e5937af68b2e21c66f3

                                                                                SHA256

                                                                                85a26c7b59d6d9932f71518ccd03eceeba42043cb1707719b72bfc348c1c1d72

                                                                                SHA512

                                                                                3306e15b2c9bb2751b626f6f726de0bcafdc41487ba11fabfcef0a6a798572b29f2ee95384ff347b3b83b310444aaeec23e12bb3ddd7567222a0dd275b0180ff

                                                                              • C:\Program Files\7-Zip\Lang\ast.txt

                                                                                Filesize

                                                                                4KB

                                                                                MD5

                                                                                1cf6411ff9154a34afb512901ba3ee02

                                                                                SHA1

                                                                                958f7ff322475f16ca44728349934bc2f7309423

                                                                                SHA256

                                                                                f5f2174daf36e65790c7f0e9a4496b12e14816dad2ee5b1d48a52307076be35f

                                                                                SHA512

                                                                                b554c1ab165a6344982533cceed316d7f73b5b94ce483b5dc6fb1f492c6b1914773027d31c35d60ab9408669520ea0785dc0d934d3b2eb4d78570ff7ccbfcf9c

                                                                              • C:\Program Files\7-Zip\Lang\ba.txt

                                                                                Filesize

                                                                                10KB

                                                                                MD5

                                                                                387ff78cf5f524fc44640f3025746145

                                                                                SHA1

                                                                                8480e549d00003de262b54bc342af66049c43d3b

                                                                                SHA256

                                                                                8a85c3fcb5f81157490971ee4f5e6b9e4f80be69a802ebed04e6724ce859713f

                                                                                SHA512

                                                                                7851633ee62c00fa2c68f6f59220a836307e6dde37eae5e5dca3ca254d167e305fe1eb342f93112032dadafe9e9608c97036ac489761f7bdc776a98337152344

                                                                              • C:\Program Files\7-Zip\Lang\be.txt

                                                                                Filesize

                                                                                11KB

                                                                                MD5

                                                                                b1dd654e9d8c8c1b001f7b3a15d7b5d3

                                                                                SHA1

                                                                                5a933ae8204163c90c00d97ba0c589f4d9f3f532

                                                                                SHA256

                                                                                32071222af04465a3d98bb30e253579aa4beceaeb6b21ac7c15b25f46620bf30

                                                                                SHA512

                                                                                0137900aeb21f53e4af4027ea15eed7696ed0156577fe6194c2b2097f5fb9d201e7e9d52a51a26ae9a426f8137692154d80676f8705f335fed9ae7e0e1d0a10e

                                                                              • C:\Program Files\7-Zip\Lang\bg.txt

                                                                                Filesize

                                                                                17KB

                                                                                MD5

                                                                                2d0c8197d84a083ef904f8f5608afe46

                                                                                SHA1

                                                                                5ae918d2bb3e9337538ef204342c5a1d690c7b02

                                                                                SHA256

                                                                                62c6f410d011a109abecb79caa24d8aeb98b0046d329d611a4d07e66460eef3f

                                                                                SHA512

                                                                                3243d24bc9fdb59e1964e4be353c10b6e9d4229ef903a5ace9c0cb6e1689403173b11db022ca2244c1ef0f568be95f21915083a8c5b016f07752026d332878a4

                                                                              • C:\Program Files\7-Zip\Lang\bn.txt

                                                                                Filesize

                                                                                14KB

                                                                                MD5

                                                                                771c8b73a374cb30df4df682d9c40edf

                                                                                SHA1

                                                                                46aa892c3553bddc159a2c470bd317d1f7b8af2a

                                                                                SHA256

                                                                                3f55b2ec5033c39c159593c6f5ece667b92f32938b38fcaf58b4b2a98176c1fc

                                                                                SHA512

                                                                                8dcc9cc13322c4504ee49111e1f674809892900709290e58a4e219053b1f78747780e1266e1f4128c0c526c8c37b1a5d1a452eefba2890e3a5190eebe30657ba

                                                                              • C:\Program Files\7-Zip\Lang\br.txt

                                                                                Filesize

                                                                                4KB

                                                                                MD5

                                                                                07504a4edab058c2f67c8bcb95c605dd

                                                                                SHA1

                                                                                3e2ae05865fb474f10b396bfefd453c074f822fa

                                                                                SHA256

                                                                                432bdb3eaa9953b084ee14eee8fe0abbc1b384cbdd984ccf35f0415d45aabba8

                                                                                SHA512

                                                                                b3f54d695c2a12e97c93af4df09ce1800b49e40302bec7071a151f13866edfdfafc56f70de07686650a46a8664608d8d3ea38c2939f2f1630ce0bf968d669ccc

                                                                              • C:\Program Files\7-Zip\Lang\ca.txt

                                                                                Filesize

                                                                                9KB

                                                                                MD5

                                                                                a77210be2527533d1eceb8f0ea49607a

                                                                                SHA1

                                                                                807e36fce4dbe269601939a8579ffb43fe43f381

                                                                                SHA256

                                                                                da4df6490c7bc8afd804509f696f9afa6f709b7a327044e2781fa6c95770b239

                                                                                SHA512

                                                                                54096f332f2a9bd5690c973eae19ef4199a6acb5243133b9065f433830984f91b62a9f1d71efeed5952cff0bbcb1befdce321cbb090c620bfc13a98bcc1dc14e

                                                                              • C:\Program Files\7-Zip\Lang\co.txt

                                                                                Filesize

                                                                                11KB

                                                                                MD5

                                                                                de64842f09051e3af6792930a0456b16

                                                                                SHA1

                                                                                498b92a35f2a14101183ebe8a22c381610794465

                                                                                SHA256

                                                                                dcfb95b47a4435eb7504b804da47302d8a62bbe450dadf1a34baea51c7f60c77

                                                                                SHA512

                                                                                5dabeed739a753fd20807400dfc84f7bf1eb544704660a74afcf4e0205b7c71f1ddcf9f79ac2f7b63579735a38e224685b0125c49568cbde2d9d6add4c7d0ed8

                                                                              • C:\Program Files\7-Zip\Lang\cs.txt

                                                                                Filesize

                                                                                9KB

                                                                                MD5

                                                                                1130abf0e51093dc7edd2c0c334be5d8

                                                                                SHA1

                                                                                260a373c4df2ec71dcd343ce4cd97b65d18efa82

                                                                                SHA256

                                                                                da788d30aa74b3f8b3d920e98c535e4544756e9e4e235ed0221654f3177d3d2a

                                                                                SHA512

                                                                                0f7242992c990085b8332c7e072928a17f4fa4e729451600f1abf58158eb1b782ac4a3c200c1db510bf70f13e6790dadf897e1d1c6effb77187ad41b02e16dbc

                                                                              • C:\Program Files\7-Zip\Lang\cy.txt

                                                                                Filesize

                                                                                4KB

                                                                                MD5

                                                                                6bdf25354b531370754506223b146600

                                                                                SHA1

                                                                                c2487c59eeeaa5c0bdb19d826fb1e926d691358e

                                                                                SHA256

                                                                                470eaf5e67f5ead5b8c3ecc1b5b21b29d16c73591eb0047b681660346e25b3fb

                                                                                SHA512

                                                                                c357b07c176175cc36a85c42d91b0cada79dbfb584bdf57f22a6cb11898f88aecf4392037d5cea3e1bc02df7493bb27b9509226f810f1875105bbc33c6ae3f20

                                                                              • C:\Program Files\7-Zip\Lang\da.txt

                                                                                Filesize

                                                                                7KB

                                                                                MD5

                                                                                c397e8ac4b966e1476adbce006bb49e4

                                                                                SHA1

                                                                                3e473e3bc11bd828a1e60225273d47c8121f3f2c

                                                                                SHA256

                                                                                5ccd481367f7d8c544de6177187aff53f1143ae451ae755ce9ed9b52c5f5d478

                                                                                SHA512

                                                                                cbbece415d16b9984c82bd8fa4c03dbd1fec58ed04e9ef0a860b74d451d03d1c7e07b23b3e652374a3b9128a7987414074c2a281087f24a77873cc45ec5aadd2

                                                                              • C:\Program Files\7-Zip\Lang\de.txt

                                                                                Filesize

                                                                                9KB

                                                                                MD5

                                                                                1e30a705da680aaeceaec26dcf2981de

                                                                                SHA1

                                                                                965c8ed225fb3a914f63164e0df2d5a24255c3d0

                                                                                SHA256

                                                                                895f76bfa4b1165e4c5a11bdab70a774e7d05d4bbdaec0230f29dcc85d5d3563

                                                                                SHA512

                                                                                ff96e6578a1ee38db309e72a33f5de7960edcc260ca1f5d899a822c78595cc761fedbdcdd10050378c02d8a36718d76c18c6796498e2574501011f9d988da701

                                                                              • C:\Program Files\7-Zip\Lang\el.txt

                                                                                Filesize

                                                                                17KB

                                                                                MD5

                                                                                5894a446df1321fbdda52a11ff402295

                                                                                SHA1

                                                                                a08bf21d20f8ec0fc305c87c71e2c94b98a075a4

                                                                                SHA256

                                                                                2dd2130f94d31262b12680c080c96b38ad55c1007f9e610ec8473d4bb13d2908

                                                                                SHA512

                                                                                0a2c3d24e7e9add3ca583c09a63ba130d0088ed36947b9f7b02bb48be4d30ef8dc6b8d788535a941f74a7992566b969adf3bd729665e61bfe22b67075766f8de

                                                                              • C:\Users\Admin\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Cache\data_1

                                                                                Filesize

                                                                                264KB

                                                                                MD5

                                                                                8e469a025da84eaaabd3fb939715a3e2

                                                                                SHA1

                                                                                101b74ec653229778d043eb076dba4c25092a643

                                                                                SHA256

                                                                                14c76b69df2443c4b3bb179c5ef628b5a76323131099f18339fe91c4265603f0

                                                                                SHA512

                                                                                78f3c312fa51b429c959aa8315c630d4ffe983eec679e51c25949a85c7bf29efdf6360a69ed4d3a4de507928146986ec497146ddac032eb6dd183a2db27ed9ab

                                                                              • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                                                                                Filesize

                                                                                36KB

                                                                                MD5

                                                                                b30d3becc8731792523d599d949e63f5

                                                                                SHA1

                                                                                19350257e42d7aee17fb3bf139a9d3adb330fad4

                                                                                SHA256

                                                                                b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3

                                                                                SHA512

                                                                                523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e

                                                                              • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                                                                                Filesize

                                                                                56KB

                                                                                MD5

                                                                                752a1f26b18748311b691c7d8fc20633

                                                                                SHA1

                                                                                c1f8e83eebc1cc1e9b88c773338eb09ff82ab862

                                                                                SHA256

                                                                                111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131

                                                                                SHA512

                                                                                a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5

                                                                              • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                                                                                Filesize

                                                                                64KB

                                                                                MD5

                                                                                a7e76f87fad8bc410d5fac5e19b00b41

                                                                                SHA1

                                                                                b1e27369f113e45ce557349890dd6c078949def1

                                                                                SHA256

                                                                                4ab494821a16b965f361482b43c154756968fd080ff12b63aa12a778e19bb412

                                                                                SHA512

                                                                                bdd031a2904540450a280ea9cc38b6c55f53d7e9f89c185e7596067f4463df3ac84f0c0d9714b7cf83b60734f42a738322a6cc6284672946bff4e00816b7359e

                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                                Filesize

                                                                                649B

                                                                                MD5

                                                                                4c058f660d6355736231b8415b3f1a40

                                                                                SHA1

                                                                                90508ed7a298185e2faf3652a44380dc5aac3321

                                                                                SHA256

                                                                                940cbd0d69f50221a0cf13d0d1f518e006c3fe3331d5a841766ebf4674e5707c

                                                                                SHA512

                                                                                5c62af6ca7c136abf54ce3a254e11c3ba6fed8a337d4ef259287686cb838337742a68a9a0196bb1f1b503fbba39201b8045fa728558cf40154ea125a763416e0

                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000005

                                                                                Filesize

                                                                                215KB

                                                                                MD5

                                                                                d79b35ccf8e6af6714eb612714349097

                                                                                SHA1

                                                                                eb3ccc9ed29830df42f3fd129951cb8b791aaf98

                                                                                SHA256

                                                                                c8459799169b81fdab64d028a9ebb058ea2d0ad5feb33a11f6a45a54a5ccc365

                                                                                SHA512

                                                                                f4be1c1e192a700139d7cff5059af81c0234ed5f032796036a1a4879b032ce4eedd16a121bbf776f17bc84a0012846f467ad48b46db4008841c25b779c7d8f5a

                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                Filesize

                                                                                552B

                                                                                MD5

                                                                                3955f094e02e8f278609db2fca8f42c0

                                                                                SHA1

                                                                                c01a0be20847a089acf16029643b01f96f5a202c

                                                                                SHA256

                                                                                af6b4387ad445a87a0d942596334c5d377b72869b370c6b6887503a9bc09f89e

                                                                                SHA512

                                                                                c55da7316845f9c727101af87b400fd1163cd1a8913ed65330fa1c5ede8256c75ce00b7a73ce03119743c112124d95c63304c29fd41bfb868f88f136d3544299

                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                Filesize

                                                                                216B

                                                                                MD5

                                                                                88eae2a1b90471c278a59c619a600773

                                                                                SHA1

                                                                                c02ab36dd69adc44f9c9c1ceba6c1806ebc342fe

                                                                                SHA256

                                                                                9ad80e73809a6de59aaf97f1517b3145c855b1e653dd01d2ee226cf375377899

                                                                                SHA512

                                                                                5f6817f7fc32528618928050fc7c61a6d292315088ad39d978c3ac39829ae5029e62a6b275ec81a2ee56d72912f9c0f039b2b6a96adf858827096b01f12c9af8

                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json

                                                                                Filesize

                                                                                851B

                                                                                MD5

                                                                                07ffbe5f24ca348723ff8c6c488abfb8

                                                                                SHA1

                                                                                6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                                                                SHA256

                                                                                6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                                                                SHA512

                                                                                7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json

                                                                                Filesize

                                                                                854B

                                                                                MD5

                                                                                4ec1df2da46182103d2ffc3b92d20ca5

                                                                                SHA1

                                                                                fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                                                SHA256

                                                                                6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                                                SHA512

                                                                                939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                                                Filesize

                                                                                3KB

                                                                                MD5

                                                                                499655a26dd338412c7963efc3718afe

                                                                                SHA1

                                                                                62a90f40a60fcf07439e3a66faee2cb967ab3672

                                                                                SHA256

                                                                                c82c54548f2229af265e1e94b11ed37931b4bee07bf07cfe03cb5f2b5f65571e

                                                                                SHA512

                                                                                837f22044c4536541bb3318f163ff4a277909512c8c74d6c9ae249b7f9ef620cfcf4c45478230eabc5135e1811e1e80de256c751609c8a7313320e8a136709d4

                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                                                Filesize

                                                                                4KB

                                                                                MD5

                                                                                a573ad7041a77c1c0e8c16e07f86ee98

                                                                                SHA1

                                                                                83b7bbc6d9effc719156633babe96f2519948eaa

                                                                                SHA256

                                                                                31865d96ed13cbd3899e5add97b4cf9ecf9c0cf988cc70d361d988fcc4639279

                                                                                SHA512

                                                                                8b42b1ad423a182fd97b9974c7bad61cfb145c09990eefd48ce94c8fa3bacfa55cc5205b64536a4cc1e47c44224cdaca2cbd3457963b7fedf3394554a35585e8

                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                Filesize

                                                                                2B

                                                                                MD5

                                                                                d751713988987e9331980363e24189ce

                                                                                SHA1

                                                                                97d170e1550eee4afc0af065b78cda302a97674c

                                                                                SHA256

                                                                                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                SHA512

                                                                                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                Filesize

                                                                                521B

                                                                                MD5

                                                                                61cd20118734457f17d60b27c0082118

                                                                                SHA1

                                                                                ab38588e9dbabae85c39de376c19ff30d5a982fd

                                                                                SHA256

                                                                                bd135db4baa359d82a10880bee9ee9c7896eef24c7c0550446a5f17880097acc

                                                                                SHA512

                                                                                3dfac9d0ef442a0705abc1d0b17387defcaed3594d57e40aae2b34466c2f0b10082fcbef388b81cc8fc741e94c7b8c97dbdffdbdf84e71d8a2877f691678d399

                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                Filesize

                                                                                354B

                                                                                MD5

                                                                                f3b72e4e7573f6386f209bb7efe2d0c9

                                                                                SHA1

                                                                                99bfb82720b3033fc3778c37c66856b568574405

                                                                                SHA256

                                                                                d7fcf95243015de89bc3875edba6cc8089f2c3628660d6eb710fd14ea1fb77ce

                                                                                SHA512

                                                                                b26c36ce14ad822b3f4bdcb1e611c4db4dcff9c233d08bf9d8346a532b39da8f79d26d1a39d3c0b42072247a0a9b5bf341dd7d877f0eea37b133c2097d686682

                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Platform Notifications\MANIFEST-000001

                                                                                Filesize

                                                                                41B

                                                                                MD5

                                                                                5af87dfd673ba2115e2fcf5cfdb727ab

                                                                                SHA1

                                                                                d5b5bbf396dc291274584ef71f444f420b6056f1

                                                                                SHA256

                                                                                f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                                                SHA512

                                                                                de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                Filesize

                                                                                10KB

                                                                                MD5

                                                                                56cf275391ab7ef886c6d26a086462d0

                                                                                SHA1

                                                                                b25da3e725ce3d9705ab6655f76c58ee803a0e74

                                                                                SHA256

                                                                                817bc24381ad2ca7729855e22d6958f0aa26b1ba7865b6fa3adf88a9f3146bab

                                                                                SHA512

                                                                                f169e8ccb5ba9966c4a4a293399322ab53b68cdb8cbc8a4368267de3b2b9cbc77937c0ed5e5df967b74134f64f72fb08d72f32704355243d3cd54e81de9608f6

                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                Filesize

                                                                                10KB

                                                                                MD5

                                                                                9438532ef99cdab8664f3120a19fb398

                                                                                SHA1

                                                                                fcf927dc54d66d8e0f7cd782ddc59492a7094238

                                                                                SHA256

                                                                                f2f4fac71123a0df29f01ac927411b1202bfee6d14d9b1b32c7f9c5b81a7123e

                                                                                SHA512

                                                                                a1a089fc17970ed16d72a6c533d58c869a8b709cddb5e3f1f23f06fd08ac920c44ae6c77f1aa288cd8d4ea013add86b4c2de7ef9e6c16b026b474fc736191bd5

                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                Filesize

                                                                                9KB

                                                                                MD5

                                                                                8aa3cef4aafd5f9bc10c282de5e7be8b

                                                                                SHA1

                                                                                09590b0092d41e1f4c75c40acdad66895a3cec01

                                                                                SHA256

                                                                                da47ea8e68e413a1a3a7eef5175fc4c80224e6209901d0fb9b47657520c78179

                                                                                SHA512

                                                                                646802f34fe506d36565dda7515911d88b16061989e2f73e42b2684112633ca5f4678b29c05ea73b051f8a83e2fc830916ddb97b55ceb141465c33a82285fec8

                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                Filesize

                                                                                9KB

                                                                                MD5

                                                                                ac7462ea0386c1f02e437fbf2469dcbd

                                                                                SHA1

                                                                                388eb24685c085e10c7f285adf10e9f528b966b6

                                                                                SHA256

                                                                                18eca8fd6c3ed6114c492975ac49a682bf58a1cb00b9a11d6cad2994f161e358

                                                                                SHA512

                                                                                25333b485424abdf645918eb297dd259c54c61d0df6d11803a26eddde8c08810037a5bbf2ddd63b6e3b1a6da0b1286674c21bc661bad1b452a3024b921122808

                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                Filesize

                                                                                10KB

                                                                                MD5

                                                                                6d2719550bb0e09215e4f9044d2d3337

                                                                                SHA1

                                                                                7da1704226488b5980ba415e725a41fbc36e319f

                                                                                SHA256

                                                                                293aceb0e173333b56a0c33987f1f9aaa66661bf5e3e7d41428ec80788451315

                                                                                SHA512

                                                                                372f834ec854a5aa74c9325bab64bad7cf7f795e4491da9407785c326a2253a537907272f120262bec74281c17035d635a764bd83f0c725ed87b863abe1747c9

                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                Filesize

                                                                                9KB

                                                                                MD5

                                                                                90b15763e711e3bfc6e490950cd25ba1

                                                                                SHA1

                                                                                c0d0b7007ab84369d9718de57f25b7a6773416b7

                                                                                SHA256

                                                                                f493dda6da9164c84c62dd687e1c83179a9ded6fd1ddc03a072a15e755c0d09c

                                                                                SHA512

                                                                                ea3c3b44e77c5e3ce22b89e36ebfa73db917428be1237a542ad88e83a9780128c67c67763484f5033844500dec30c5439862ad348637936e0e0961fef36d452c

                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                Filesize

                                                                                10KB

                                                                                MD5

                                                                                e7e9ab85ed1986afd02e76cc01eabd10

                                                                                SHA1

                                                                                a8884a1197b651536dea6b27cfa6f56d3e151304

                                                                                SHA256

                                                                                97ac7cf8961a4be501f946280cd9fd66067e774c8db583cc93a3757e67d78a66

                                                                                SHA512

                                                                                729d3cfc8439ce0aeb090ab9f391b8be8d1dd67c7195aa43a8504077d7961adc2083c3dab2ecc54c277ed87a211034798ea333281be21c712f847fb11c7ba8fe

                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                Filesize

                                                                                9KB

                                                                                MD5

                                                                                1c38d64808152fdc0e8b3ee2e90e6c5a

                                                                                SHA1

                                                                                79faf7e4663cd6de55c721b69656906b379032a0

                                                                                SHA256

                                                                                5e4972167ac07cd4ba252d855d51ea2845887ef87d408146e8bb804cf0748999

                                                                                SHA512

                                                                                8bd8deb6e351aa04e57aa75424520ba9e3fd3d6305497d7d9593c1ea677b2256bd2891eb0b356497f13d4dda8647c94acb32256837b9a52ff0e6854a21a94982

                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                Filesize

                                                                                15KB

                                                                                MD5

                                                                                659a0b49d8f08591764573b057c1a699

                                                                                SHA1

                                                                                53ad0b46e5e5493571771f1f4403a2a02046dc02

                                                                                SHA256

                                                                                a9771acb8b2368f48f12d8fa77ad04946178dee52b8243e45b30b279d50d1b11

                                                                                SHA512

                                                                                8bb8bfec7dfc8a0b8ba3880c8191e5f57e0c5ae02c7d9a23fa9571eb79ff5060be8019fb67f8805b31756727f0748f9b93afa94cee74ea293fb63e95ca86cc18

                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                                Filesize

                                                                                72B

                                                                                MD5

                                                                                032bfe80c732a12a15ca8fb047d2ed75

                                                                                SHA1

                                                                                15a949f0818c1df7565201cc7845fc6aeb2e5f93

                                                                                SHA256

                                                                                6a1670b1890d7e44bb2fcecde43d398f0a7320ae01b76fbbbd5943d05f119f96

                                                                                SHA512

                                                                                deee0d577fdbaa19c6554660787e5b0f00448c895cc469647777105bbd930925b1beab893be702415048cd740dcf7cb532ee537d29a27270a7dcd5b221d09bab

                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                Filesize

                                                                                231KB

                                                                                MD5

                                                                                2f5d2a266ba87df05fb1ac900e9c8796

                                                                                SHA1

                                                                                5532ffbe6dd69b5bddb6e74005d4efefab68454d

                                                                                SHA256

                                                                                f0ecdb41b675c8b4e31cb27e7595e81c275e8f22116f8787cd4c2d3143bc1c14

                                                                                SHA512

                                                                                25816d37ba8bc0e75749668937742f66c55ba03b2a678834a9091833b04ae06a6087883380585f61cd962fa23ca68ae92465ad8f6563eaa04ccf508aa17e3398

                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                Filesize

                                                                                231KB

                                                                                MD5

                                                                                4ee605fac4622bd7b764437adc7f92f0

                                                                                SHA1

                                                                                e880083424ef800e75e9eb0760324eafcad8ba9c

                                                                                SHA256

                                                                                ed6ece51d8e16813cd83af0e062eb2e8752d22757da3b295c2c28604d5a1e9d4

                                                                                SHA512

                                                                                da763e83028c4dc5b6e5a2e93decfe3cddf006bc0402228a9dde34656e63ace0c7fef8e40a473d63a9b6220cb62f18c43864d950304daaa854565851883c35f5

                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                Filesize

                                                                                231KB

                                                                                MD5

                                                                                1278f66144ef9a7442335533e4255627

                                                                                SHA1

                                                                                38421844611ad6e5611db326db5ca5ceda3395b6

                                                                                SHA256

                                                                                de2b5ebb61c413f66082c8d54cae72107c862d324d0ea00d89bbbbb3d14aaf39

                                                                                SHA512

                                                                                379338c9a8f7ec71928db08c87d24f30d95a57254bac5ce1b5e86f9e911e24405628d1311c77e30bd8df036cbb5b031f066cdfbf7848cf895c4e80f0b6052b4c

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                Filesize

                                                                                152B

                                                                                MD5

                                                                                826c7cac03e3ae47bfe2a7e50281605e

                                                                                SHA1

                                                                                100fbea3e078edec43db48c3312fbbf83f11fca0

                                                                                SHA256

                                                                                239b1d7cc6f76e1d1832b0587664f114f38a21539cb8548e25626ed5053ea2ab

                                                                                SHA512

                                                                                a82f3c817a6460fd8907a4ac6ab37c2129fb5466707edcfb565c255680d7f7212a5669fe2a42976150f16e4e549ea8310078f22ed35514ee1b7b45b46d8cc96e

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                Filesize

                                                                                152B

                                                                                MD5

                                                                                02a4b762e84a74f9ee8a7d8ddd34fedb

                                                                                SHA1

                                                                                4a870e3bd7fd56235062789d780610f95e3b8785

                                                                                SHA256

                                                                                366e497233268d7cdf699242e4b2c7ecc1999d0a84e12744f5af2b638e9d86da

                                                                                SHA512

                                                                                19028c45f2e05a0cb32865a2554513c1536bf9da63512ff4e964c94a3e171f373493c7787d2d2a6df8012648bbefab63a9de924f119c50c39c727cf81bdc659f

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                Filesize

                                                                                1KB

                                                                                MD5

                                                                                344dd2fd114cf6d4d7da07a23d3ff3a0

                                                                                SHA1

                                                                                81e7ebdd0bec5f9a3d72ed59ed2903d6aa56a8c9

                                                                                SHA256

                                                                                a382f73399f3c71584a0cdeff1415adf280c831cba7f070fb270b1bcc8261fd8

                                                                                SHA512

                                                                                f178f27c3c10616a0d045c16fbb4f93bef86ca0b9d1a3704824ea1e0fa46fc14ad4eea298e19d79c9022f74accffc5d0d8734eb6a3330044153f56a4c26d96c5

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                Filesize

                                                                                4KB

                                                                                MD5

                                                                                5876dd53fefbe13a373df4a2ae0f6324

                                                                                SHA1

                                                                                30008b1cf16fe754dcd4113cf841221de7ac166f

                                                                                SHA256

                                                                                ee31c33d1487860f3532ba53be02890d413f02533e9c004459770de3b5965caf

                                                                                SHA512

                                                                                105d75b86e7b58dd9ecfa4ae2cb217925d96d1ef6b130272d1fdf2294fea36a64c21eb5e9503bc23a1d99f2fadc326a8512865001489cda1a1667c7b5cb29b41

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                Filesize

                                                                                5KB

                                                                                MD5

                                                                                2d31b3fcbadb15d8bf25a97113d784c2

                                                                                SHA1

                                                                                f9484d15dd3d2a111cae0f52f2f9af6632b90379

                                                                                SHA256

                                                                                821ac060d4e841a6111fe87bf6667676847f7cf8bf8c6dd14548cc5f609b002a

                                                                                SHA512

                                                                                85b2c580ccb34a40c176b8575fb03a3a23aa172cec81241c5b87a0de09297cff1ce5285bac0d7a3c32467f1e4c2a827ef3a2f40e00cbedebf46b8e18285d984e

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                Filesize

                                                                                7KB

                                                                                MD5

                                                                                f505f20eb3c199653c68df6ad9919878

                                                                                SHA1

                                                                                e2c98f212c434bb06b68957dbcdcedee69a8e273

                                                                                SHA256

                                                                                e54b168b1fad22b201f1ae7d954ec9a26f9bd67a21b60678cc3a865f68128202

                                                                                SHA512

                                                                                6ffd356d9b4fc3e4fd09f6e9555d6706442d1264f8edc5bdcb63349838860a0e87c818a9384da30d2fb32d11c9775b3f0efcdc997348b47e813e2cf71e33c5b8

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                Filesize

                                                                                6KB

                                                                                MD5

                                                                                62611baa61d7db1c74360711be31d694

                                                                                SHA1

                                                                                da7a4b76a8b076a6ee756ea03b1bf7f2d83f47ea

                                                                                SHA256

                                                                                57dc15d773b58efc02b2c1408845c6a39c6842bb760d1718bbc85aedf68d311c

                                                                                SHA512

                                                                                76cd5f7d2688c828ee85389ba0d91b2f682df1130fdc0d021b9b7c8cdcb70c1124ce8e833ae37bf14c39b78807379654e15531781f275c12750eed1d59d26aca

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                Filesize

                                                                                7KB

                                                                                MD5

                                                                                a4fbdcb527ae8c87195c57a1963f1eb3

                                                                                SHA1

                                                                                e2f7d6567550f30cb53e966389e49e39bd42907a

                                                                                SHA256

                                                                                8eea1113bd74f3ffe6d4311ab602e4c43ab8ffbf92f92ce9459ede7dc18f8835

                                                                                SHA512

                                                                                7ee148c3c68406e9de21dd2b437119213c6f5a150384fa9ad262b89af8fec68f2abce4e685bf1bf46b804c3e4ea501bc36b527a201abb0fda702d36d85e425c6

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                Filesize

                                                                                1KB

                                                                                MD5

                                                                                3e56d5075cf3158c22daf21075f6c57d

                                                                                SHA1

                                                                                f4dc931b2dfab60e5da6c9a637338e4f1081fa9b

                                                                                SHA256

                                                                                125e48ba0f91e42909d80648a26a5d1ffb5945cf5a15636dcc2602dc82f73aba

                                                                                SHA512

                                                                                bc0d8366c7a098cb37559c5eb3bb6e692c98b7f676fc0718a98d2c085cee87902c1c47e798c668071a0799f9f9ad45dba32e6ee5f49b3de712a206c2b343e960

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57f1f1.TMP

                                                                                Filesize

                                                                                706B

                                                                                MD5

                                                                                6a9fd097c82d56175220f305b3c94f03

                                                                                SHA1

                                                                                cdd9737f2dca57e98b3650ea0e0fc5efdce50de2

                                                                                SHA256

                                                                                21c01062d20fff907fcb8a18ca7dd23a0aadc86ca0870ccbde380701689c7c27

                                                                                SHA512

                                                                                308419088b21f54e2568f70ef1f460b1a88b70a88fcd3ccc15d053f7bae62367f42e5c231303aa0f2f4a32f2fbf9876e26744734b477a281f66134a44a00c989

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                Filesize

                                                                                16B

                                                                                MD5

                                                                                46295cac801e5d4857d09837238a6394

                                                                                SHA1

                                                                                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                SHA256

                                                                                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                SHA512

                                                                                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                Filesize

                                                                                16B

                                                                                MD5

                                                                                206702161f94c5cd39fadd03f4014d98

                                                                                SHA1

                                                                                bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                                SHA256

                                                                                1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                                SHA512

                                                                                0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                Filesize

                                                                                10KB

                                                                                MD5

                                                                                dbab57b1cecabcb46fc20b4786de70a3

                                                                                SHA1

                                                                                0717316f1eaa6b6ce362f1e9157f8f4de40750a0

                                                                                SHA256

                                                                                e1f8d8fe2e32aa1698d1e5f56a607cce8aa5b22b823c4ef4e966244a82d14f3a

                                                                                SHA512

                                                                                6d55dd7fbe7492c72ef4bc1820b4b3925810eba4c8af624dd249fdd2cf9bd8d8ade3d49ef4b6f111453d604daf81ad165db6024a6a47cb22c9e041b73afe8525

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                Filesize

                                                                                10KB

                                                                                MD5

                                                                                4643adcaea3f241c8d1815713350b011

                                                                                SHA1

                                                                                8a681420e33de8f137599d6439f70d18f7df5e50

                                                                                SHA256

                                                                                ad620c8bd7e18990f8f900b4a67d32c229995b98fa52639d5210ccd1108cf56a

                                                                                SHA512

                                                                                2261851778fa9e65945c413b5c1493b80c99e1166e233a8cb7859869e0536d5377035128159d88d128ff8d1713d1111f328f46a73dae31853f32c7387914ac56

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                Filesize

                                                                                10KB

                                                                                MD5

                                                                                e7bc96dbee9912ada3f17812222a5bfd

                                                                                SHA1

                                                                                87fcc5c6a3f54139f0451246bafcac475243953b

                                                                                SHA256

                                                                                bcd53e483a17afcaceb153cf5d38c4369179c86c06ac6c95169bbabf1558f5c1

                                                                                SHA512

                                                                                4b1409e6f6368bf51f87aec20e4de4221b94b76f60638e490c22485ab56fc2efd115e8b77c76654acc8c8cbc8e400206d1512c5d613cd62223d25c5240e71524

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                Filesize

                                                                                10KB

                                                                                MD5

                                                                                943ccfe330fe0eeec18195aa5811e8ff

                                                                                SHA1

                                                                                298e36a86660e481bc3b9e8365eaf46d2f948ed5

                                                                                SHA256

                                                                                e5bbbcb885f7349c2484f7103a259325c1531c5808bcccde5086b90cfbdcee8d

                                                                                SHA512

                                                                                5a245cf249828f823e129cca6feb11ac3b77775f5d429a974304c997f9ccc79041892ec8c0e6ee4fc36313f90a273b5f598bb2b4ba0b3af8ba6e026c58499a26

                                                                              • C:\Users\Admin\AppData\Local\Temp\46bfd48b-fc07-472b-bbd7-0cc644aa0254.tmp

                                                                                Filesize

                                                                                1B

                                                                                MD5

                                                                                5058f1af8388633f609cadb75a75dc9d

                                                                                SHA1

                                                                                3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                SHA256

                                                                                cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                SHA512

                                                                                0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                              • C:\Users\Admin\AppData\Local\Temp\scoped_dir4960_1453641644\209cf7fb-773e-4aae-a52e-d3501839fa2d.tmp

                                                                                Filesize

                                                                                150KB

                                                                                MD5

                                                                                14937b985303ecce4196154a24fc369a

                                                                                SHA1

                                                                                ecfe89e11a8d08ce0c8745ff5735d5edad683730

                                                                                SHA256

                                                                                71006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff

                                                                                SHA512

                                                                                1d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c

                                                                              • C:\Users\Admin\AppData\Local\Temp\scoped_dir4960_1453641644\CRX_INSTALL\_locales\en\messages.json

                                                                                Filesize

                                                                                711B

                                                                                MD5

                                                                                558659936250e03cc14b60ebf648aa09

                                                                                SHA1

                                                                                32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                                                                SHA256

                                                                                2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                                                                SHA512

                                                                                1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                                                              • C:\Users\Admin\Downloads\7z2409-x64.exe:Zone.Identifier

                                                                                Filesize

                                                                                26B

                                                                                MD5

                                                                                fbccf14d504b7b2dbcb5a5bda75bd93b

                                                                                SHA1

                                                                                d59fc84cdd5217c6cf74785703655f78da6b582b

                                                                                SHA256

                                                                                eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

                                                                                SHA512

                                                                                aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

                                                                              • C:\Users\Admin\Downloads\Nexol.rar

                                                                                Filesize

                                                                                2.4MB

                                                                                MD5

                                                                                f3d4dac0383100a2ab218736829401f2

                                                                                SHA1

                                                                                f3daa2eeb1c369009e7bde3a59ab38bfda57f01e

                                                                                SHA256

                                                                                16454a23ce21fba6407082739164a21cfc10677d038f507111c0f918f2aa43ab

                                                                                SHA512

                                                                                2dfa616b3a4da0e3b2ce2bf8846fdfeb6051caf61349a9bbb9cab1fa5051e19d743be667a5bc0e4e6cd8d88dc39566b8f9fe12a4b7c2212f037592243fd9ecdb

                                                                              • C:\Users\Admin\Downloads\Nexol.rar:Zone.Identifier

                                                                                Filesize

                                                                                66B

                                                                                MD5

                                                                                91a932dcd7bffe18428528359af8f18f

                                                                                SHA1

                                                                                bee30924f7cdee4b6332c7e53726c14e0e5acf36

                                                                                SHA256

                                                                                467b8610308d08ee1a4d30fd9ed93e238352b3020d19a8417c51df22eed98b3e

                                                                                SHA512

                                                                                0f2e141a64a55088b078d789159fde7bf407ebcd5583528a380cde89f573b104c29045dc1dd923fff562e4bbf1f710443a2ba5d617292cbd625030bcab074fc2

                                                                              • C:\Users\Admin\Downloads\Nexol\Nexol\Quadv.dll

                                                                                Filesize

                                                                                547KB

                                                                                MD5

                                                                                9591405073c6460e382343c75de477e3

                                                                                SHA1

                                                                                32d73c95f3a6f5470230dd21800de592c06d906a

                                                                                SHA256

                                                                                952dc4888a39c7ae027b323345996ff163af787e71103af323588df74be01f23

                                                                                SHA512

                                                                                d7cf6df8eea6128447ebd99a9c4c5823b0ae1919dfd30bb63bdaa277eb7e1a7226b0bb2da675b790cb4b6cc4262c26094a96c34b3d257439a02c80b5db0f7138

                                                                              • C:\Users\Admin\Downloads\Nexol\Nexol\Xeog.ini

                                                                                Filesize

                                                                                1.4MB

                                                                                MD5

                                                                                e2eaaa343d56c238b6dbbbf034f6d866

                                                                                SHA1

                                                                                77e6491c2fe3ad66f3ac9827d9d8f9496f366832

                                                                                SHA256

                                                                                bb8d508aa0e6ff6f33d28156abff10579c82e152c081245a78e0046e3ec2fc0d

                                                                                SHA512

                                                                                2e3ce83a06ea96985c63653ea7326133027f8dd9fcc12cb0a8383428ead7d02f74befa51d714dee1e17e8257e67c9c4d394c0901963b9973bfde3446764c5194

                                                                              • C:\Users\Admin\Downloads\Nexol\Nexol\x64\x64d3.dll

                                                                                Filesize

                                                                                4.8MB

                                                                                MD5

                                                                                b744f5976b64674d00ba08631c4a07f9

                                                                                SHA1

                                                                                66dbc4b7a5fe9e42c8da94d7a7940023bb8b50aa

                                                                                SHA256

                                                                                fea44ec1aa17a4037b5d5b6de901232fedb17e8cebaca5c85aed1a335283b5f8

                                                                                SHA512

                                                                                9a899741a20f24377ead33430c641b933c32af55e01ed825c1c7aa7e438d39d6b60027021b479d7dcac48319bf2ea19c25ddbb048508d1e56d6aa224021ca1ab

                                                                              • C:\Users\Admin\Downloads\Unconfirmed 135541.crdownload

                                                                                Filesize

                                                                                1.6MB

                                                                                MD5

                                                                                6c73cc4c494be8f4e680de1a20262c8a

                                                                                SHA1

                                                                                28b53835fe92c3fa6e0c422fc3b17c6bc1cb27e0

                                                                                SHA256

                                                                                bdd1a33de78618d16ee4ce148b849932c05d0015491c34887846d431d29f308e

                                                                                SHA512

                                                                                2e8b746c51132f933cc526db661c2cb8cee889f390e3ce19dabbad1a2e6e13bed7a60f08809282df8d43c1c528a8ce7ce28e9e39fea8c16fd3fcda5604ae0c85

                                                                              • memory/2220-1832-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                Filesize

                                                                                336KB

                                                                              • memory/2220-1833-0x0000000000400000-0x0000000000454000-memory.dmp

                                                                                Filesize

                                                                                336KB