Analysis

  • max time kernel
    178s
  • max time network
    187s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/04/2025, 10:03

General

  • Target

    https://sitehunterus.blogspot.com/2021/12/cc-combo-generator-v10-visa-msc.html

Malware Config

Extracted

Family

revengerat

Botnet

NyanCatRevenge

C2

amazon.capeturk.com:100

Mutex

eea5a83186824927836

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Revengerat family
  • Checks computer location settings 2 TTPs 7 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 19 IoCs
  • Loads dropped DLL 10 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Detects Pyinstaller 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 20 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 27 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of FindShellTrayWindow 62 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://sitehunterus.blogspot.com/2021/12/cc-combo-generator-v10-visa-msc.html
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x264,0x7ffb0d7bf208,0x7ffb0d7bf214,0x7ffb0d7bf220
      2⤵
        PID:2476
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1960,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=2224 /prefetch:3
        2⤵
          PID:3508
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2196,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=2192 /prefetch:2
          2⤵
            PID:3496
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2520,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=2680 /prefetch:8
            2⤵
              PID:3528
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3472,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=3524 /prefetch:1
              2⤵
                PID:728
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3412,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=3528 /prefetch:1
                2⤵
                  PID:2768
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4236,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=4244 /prefetch:1
                  2⤵
                    PID:1744
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4288,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=4268 /prefetch:2
                    2⤵
                      PID:4452
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3628,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=3624 /prefetch:8
                      2⤵
                        PID:1412
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5316,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=3520 /prefetch:8
                        2⤵
                          PID:4816
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --always-read-main-dll --field-trial-handle=5536,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=5484 /prefetch:1
                          2⤵
                            PID:2168
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5460,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=5176 /prefetch:8
                            2⤵
                              PID:3896
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5456,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=5712 /prefetch:8
                              2⤵
                                PID:4892
                              • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5392,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=5356 /prefetch:8
                                2⤵
                                  PID:3372
                                • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5392,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=5356 /prefetch:8
                                  2⤵
                                    PID:2308
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --always-read-main-dll --field-trial-handle=5404,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=6220 /prefetch:1
                                    2⤵
                                      PID:1432
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6368,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=6420 /prefetch:8
                                      2⤵
                                        PID:4076
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6568,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=6596 /prefetch:8
                                        2⤵
                                          PID:3372
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6612,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=6600 /prefetch:8
                                          2⤵
                                            PID:5112
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6596,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=6516 /prefetch:8
                                            2⤵
                                              PID:3396
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6872,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=6888 /prefetch:8
                                              2⤵
                                                PID:3540
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6908,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=7044 /prefetch:8
                                                2⤵
                                                  PID:5020
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7200,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=7224 /prefetch:8
                                                  2⤵
                                                    PID:5288
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7360,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=7376 /prefetch:8
                                                    2⤵
                                                      PID:5296
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --always-read-main-dll --field-trial-handle=7104,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=7144 /prefetch:1
                                                      2⤵
                                                        PID:5324
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --always-read-main-dll --field-trial-handle=7076,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=7420 /prefetch:1
                                                        2⤵
                                                          PID:5872
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --always-read-main-dll --field-trial-handle=7308,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=7368 /prefetch:1
                                                          2⤵
                                                            PID:6088
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --always-read-main-dll --field-trial-handle=5204,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=6160 /prefetch:1
                                                            2⤵
                                                              PID:6032
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --always-read-main-dll --field-trial-handle=4600,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=6512 /prefetch:1
                                                              2⤵
                                                                PID:5596
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --always-read-main-dll --field-trial-handle=7652,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=7612 /prefetch:1
                                                                2⤵
                                                                  PID:1148
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --always-read-main-dll --field-trial-handle=7616,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=120 /prefetch:1
                                                                  2⤵
                                                                    PID:2736
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --always-read-main-dll --field-trial-handle=4548,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=7716 /prefetch:1
                                                                    2⤵
                                                                      PID:5856
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --always-read-main-dll --field-trial-handle=7872,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=7480 /prefetch:1
                                                                      2⤵
                                                                        PID:5956
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --always-read-main-dll --field-trial-handle=8016,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=7148 /prefetch:1
                                                                        2⤵
                                                                          PID:5180
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=8220,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=8216 /prefetch:8
                                                                          2⤵
                                                                            PID:3340
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --always-read-main-dll --field-trial-handle=6424,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=8232 /prefetch:1
                                                                            2⤵
                                                                              PID:3984
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4604,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=8520 /prefetch:8
                                                                              2⤵
                                                                                PID:1504
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4580,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=8512 /prefetch:8
                                                                                2⤵
                                                                                  PID:3944
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=8492,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=8596 /prefetch:8
                                                                                  2⤵
                                                                                    PID:4816
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --always-read-main-dll --field-trial-handle=8660,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=8684 /prefetch:1
                                                                                    2⤵
                                                                                      PID:5584
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --always-read-main-dll --field-trial-handle=8148,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=6736 /prefetch:1
                                                                                      2⤵
                                                                                        PID:2756
                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7508,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=7944 /prefetch:8
                                                                                        2⤵
                                                                                          PID:1328
                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --always-read-main-dll --field-trial-handle=8172,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=5816 /prefetch:1
                                                                                          2⤵
                                                                                            PID:6036
                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --always-read-main-dll --field-trial-handle=2880,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=8680 /prefetch:1
                                                                                            2⤵
                                                                                              PID:2784
                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --always-read-main-dll --field-trial-handle=4596,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=5860 /prefetch:1
                                                                                              2⤵
                                                                                                PID:5316
                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --always-read-main-dll --field-trial-handle=5836,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=8132 /prefetch:1
                                                                                                2⤵
                                                                                                  PID:5844
                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --always-read-main-dll --field-trial-handle=8512,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=8264 /prefetch:1
                                                                                                  2⤵
                                                                                                    PID:4660
                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=8388,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=8156 /prefetch:8
                                                                                                    2⤵
                                                                                                      PID:408
                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=48 --always-read-main-dll --field-trial-handle=8804,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=8724 /prefetch:1
                                                                                                      2⤵
                                                                                                        PID:5168
                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=49 --always-read-main-dll --field-trial-handle=6704,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=8500 /prefetch:1
                                                                                                        2⤵
                                                                                                          PID:2368
                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=8576,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=8140 /prefetch:8
                                                                                                          2⤵
                                                                                                            PID:5472
                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=8576,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=8140 /prefetch:8
                                                                                                            2⤵
                                                                                                              PID:5820
                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=51 --always-read-main-dll --field-trial-handle=7552,i,3306285558518323992,5391299412505286785,262144 --variations-seed-version --mojo-platform-channel-handle=3620 /prefetch:1
                                                                                                              2⤵
                                                                                                                PID:2360
                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                                                                              1⤵
                                                                                                                PID:516
                                                                                                              • C:\Windows\System32\rundll32.exe
                                                                                                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                                                                1⤵
                                                                                                                  PID:1200
                                                                                                                • C:\Program Files\7-Zip\7zG.exe
                                                                                                                  "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\CC Generator\" -ad -an -ai#7zMap14347:86:7zEvent1469
                                                                                                                  1⤵
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  • Suspicious use of FindShellTrayWindow
                                                                                                                  PID:4040
                                                                                                                • C:\Users\Admin\Downloads\CC Generator\CC Generator\CC_Generator.exe
                                                                                                                  "C:\Users\Admin\Downloads\CC Generator\CC Generator\CC_Generator.exe"
                                                                                                                  1⤵
                                                                                                                  • Checks computer location settings
                                                                                                                  • Executes dropped EXE
                                                                                                                  PID:4300
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
                                                                                                                    2⤵
                                                                                                                    • Checks computer location settings
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Adds Run key to start application
                                                                                                                    PID:520
                                                                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
                                                                                                                      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe"
                                                                                                                      3⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                      PID:4928
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
                                                                                                                    2⤵
                                                                                                                    • Checks computer location settings
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Adds Run key to start application
                                                                                                                    PID:5176
                                                                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
                                                                                                                      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe"
                                                                                                                      3⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                      PID:2740
                                                                                                                  • C:\Users\Admin\Downloads\CC Generator\CC Generator\CC_Generator .exe
                                                                                                                    "C:\Users\Admin\Downloads\CC Generator\CC Generator\CC_Generator .exe"
                                                                                                                    2⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    PID:2224
                                                                                                                    • C:\Users\Admin\Downloads\CC Generator\CC Generator\CC_Generator .exe
                                                                                                                      "C:\Users\Admin\Downloads\CC Generator\CC Generator\CC_Generator .exe"
                                                                                                                      3⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Loads dropped DLL
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                      PID:2044
                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                        C:\Windows\system32\cmd.exe /c mode 87,35
                                                                                                                        4⤵
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        PID:5696
                                                                                                                        • C:\Windows\SysWOW64\mode.com
                                                                                                                          mode 87,35
                                                                                                                          5⤵
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          PID:5536
                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                        C:\Windows\system32\cmd.exe /c cls
                                                                                                                        4⤵
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        PID:4280
                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                        C:\Windows\system32\cmd.exe /c cls
                                                                                                                        4⤵
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        PID:3840
                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                        C:\Windows\system32\cmd.exe /c cls
                                                                                                                        4⤵
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        PID:4964
                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                        C:\Windows\system32\cmd.exe /c cls
                                                                                                                        4⤵
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        PID:3888
                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                        C:\Windows\system32\cmd.exe /c cls
                                                                                                                        4⤵
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        PID:228
                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                        C:\Windows\system32\cmd.exe /c cls
                                                                                                                        4⤵
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        PID:232
                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                  C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
                                                                                                                  1⤵
                                                                                                                    PID:4260
                                                                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
                                                                                                                      C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
                                                                                                                      2⤵
                                                                                                                      • Checks computer location settings
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Adds Run key to start application
                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                      PID:1356
                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
                                                                                                                        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"
                                                                                                                        3⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                        PID:3004
                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
                                                                                                                    1⤵
                                                                                                                      PID:3620
                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
                                                                                                                        C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
                                                                                                                        2⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                        PID:1556
                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
                                                                                                                      1⤵
                                                                                                                        PID:1788
                                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
                                                                                                                          C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
                                                                                                                          2⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:5920
                                                                                                                      • C:\Windows\system32\NOTEPAD.EXE
                                                                                                                        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\CC Generator\CC Generator\Execute\Cards.txt
                                                                                                                        1⤵
                                                                                                                          PID:1608
                                                                                                                        • C:\Users\Admin\Downloads\CC Generator\CC Generator\CC_Generator.exe
                                                                                                                          "C:\Users\Admin\Downloads\CC Generator\CC Generator\CC_Generator.exe"
                                                                                                                          1⤵
                                                                                                                          • Checks computer location settings
                                                                                                                          • Executes dropped EXE
                                                                                                                          PID:3920
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Setup.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
                                                                                                                            2⤵
                                                                                                                            • Checks computer location settings
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Adds Run key to start application
                                                                                                                            PID:2192
                                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
                                                                                                                              "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe"
                                                                                                                              3⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                              PID:516
                                                                                                                          • C:\Users\Admin\Downloads\CC Generator\CC Generator\CC_Generator .exe
                                                                                                                            "C:\Users\Admin\Downloads\CC Generator\CC Generator\CC_Generator .exe"
                                                                                                                            2⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            PID:6048
                                                                                                                            • C:\Users\Admin\Downloads\CC Generator\CC Generator\CC_Generator .exe
                                                                                                                              "C:\Users\Admin\Downloads\CC Generator\CC Generator\CC_Generator .exe"
                                                                                                                              3⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Loads dropped DLL
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                              PID:2088
                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                C:\Windows\system32\cmd.exe /c mode 87,35
                                                                                                                                4⤵
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:5332
                                                                                                                                • C:\Windows\SysWOW64\mode.com
                                                                                                                                  mode 87,35
                                                                                                                                  5⤵
                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                  PID:1564
                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                C:\Windows\system32\cmd.exe /c cls
                                                                                                                                4⤵
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:2784
                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                C:\Windows\system32\cmd.exe /c cls
                                                                                                                                4⤵
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:892
                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                C:\Windows\system32\cmd.exe /c cls
                                                                                                                                4⤵
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:5924
                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                C:\Windows\system32\cmd.exe /c cls
                                                                                                                                4⤵
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:4352
                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                C:\Windows\system32\cmd.exe /c cls
                                                                                                                                4⤵
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:3180
                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                C:\Windows\system32\cmd.exe /c cls
                                                                                                                                4⤵
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:2924
                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
                                                                                                                          1⤵
                                                                                                                            PID:5320
                                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
                                                                                                                              C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe
                                                                                                                              2⤵
                                                                                                                              • Checks computer location settings
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Adds Run key to start application
                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                              PID:1268
                                                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
                                                                                                                                "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"
                                                                                                                                3⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                PID:3036
                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
                                                                                                                            1⤵
                                                                                                                              PID:1484
                                                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
                                                                                                                                C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
                                                                                                                                2⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                PID:2032
                                                                                                                            • C:\Windows\system32\NOTEPAD.EXE
                                                                                                                              "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\CC Generator\CC Generator\Execute\Cards.txt
                                                                                                                              1⤵
                                                                                                                                PID:2712

                                                                                                                              Network

                                                                                                                              MITRE ATT&CK Enterprise v15

                                                                                                                              Replay Monitor

                                                                                                                              Loading Replay Monitor...

                                                                                                                              Downloads

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\Setup.exe.log

                                                                                                                                Filesize

                                                                                                                                408B

                                                                                                                                MD5

                                                                                                                                8e1e19a5abcce21f8a12921d6a2eeeee

                                                                                                                                SHA1

                                                                                                                                b5704368dfd8fc7aeafb15c23b69895e809fe20e

                                                                                                                                SHA256

                                                                                                                                22cf24d10cc11a9bb23268f18afbc8f3481c27e1feb4cb42ba5c8775e12720e3

                                                                                                                                SHA512

                                                                                                                                48365f858592d677ef5d0e2948f672234898e47a153eec32592a2e079353702a64e41e1aa59250f05bd690690b9edfb8455dfac90c6695fb7c0b6907a057fe78

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                Filesize

                                                                                                                                280B

                                                                                                                                MD5

                                                                                                                                0db1d88802048ff847bfcf47035335bd

                                                                                                                                SHA1

                                                                                                                                bb54059e5b145da464f6521ae67353889ce00771

                                                                                                                                SHA256

                                                                                                                                416525d2bfeaeab0950175c0eab55ad35e84518ef5299f10565023800788cf9a

                                                                                                                                SHA512

                                                                                                                                32c5b42febdb38c3a30eb5179b8aa20a5e731b0e83aab16ec73d27b4108bfc89eb6316f71a988388cb5df19267ba823f6d0220fab5584667ba0adb0da1152a30

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                Filesize

                                                                                                                                280B

                                                                                                                                MD5

                                                                                                                                8734b4a181214bb62f91cfa36c7e2c98

                                                                                                                                SHA1

                                                                                                                                9cff323f10778a23d73ac3dcffc038d3bf661b78

                                                                                                                                SHA256

                                                                                                                                e06afe980fa56c8dad3e7c6b8d0d8f1e7eb9a4860ac715e966026fb7631c3ba5

                                                                                                                                SHA512

                                                                                                                                e8648a54da9aa24b6cba1f0377a0ce33979ea097554bb6347f252cad894ad4134e1fe839abc80eb48e2510061d5c6937e80374d32f95afd4cc8567b57694ac36

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                Filesize

                                                                                                                                280B

                                                                                                                                MD5

                                                                                                                                0d5b7a5f9fce37954e00acaedab5f345

                                                                                                                                SHA1

                                                                                                                                da9ec2c88afeb9e6119a8ab9a9527847ad7f6112

                                                                                                                                SHA256

                                                                                                                                521dfad632df5f151fd11c4203e9543dbbc8221a944d29c7dfdc0ab31366418d

                                                                                                                                SHA512

                                                                                                                                97399e7bd7fe16cf085b8b03a2c20de43a3bdfc9c7b83ea049ac0aff5a7618614b7b8db02bd6ac3fc2f2bec82fa18cec6a5ca7194702394383cad69b60553a26

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_000088

                                                                                                                                Filesize

                                                                                                                                216KB

                                                                                                                                MD5

                                                                                                                                50a7159ff34dea151d624f07e6cb1664

                                                                                                                                SHA1

                                                                                                                                e13fe30db96dcee328efda5cc78757b6e5b9339c

                                                                                                                                SHA256

                                                                                                                                e990d9d31c4c7d57dd4795e43baea05501fb6ea8b7760f89001be660425dd01b

                                                                                                                                SHA512

                                                                                                                                a7768dd7e315b07754a305080e0fc023765e5a224b2c3824e8e10f29286df63bbdefef379e069941fd8cd9c7c3befce976779ae2efdfb6e7da697b09d7f07250

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                Filesize

                                                                                                                                6KB

                                                                                                                                MD5

                                                                                                                                865c22f638c94926d905045c75e4b513

                                                                                                                                SHA1

                                                                                                                                7a50e5d0904e46bbe38b46f3649bfe3e00a8fb6a

                                                                                                                                SHA256

                                                                                                                                716da0b14b17d1ee5b8eeba8b427dbf76a9365b4171a82a0d5522d122ea3b69a

                                                                                                                                SHA512

                                                                                                                                683cbb4e0d85779dc7265928ab0bca9e90c9eeabd98ed22f482449f3e8ca9b352b14a01952b65f713e3eaa093070f70a6fd515b9932d8cbd1cd6f8fcdaa69f0e

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe585f80.TMP

                                                                                                                                Filesize

                                                                                                                                3KB

                                                                                                                                MD5

                                                                                                                                9ec24ee58e61601322f96b8066f9ca8c

                                                                                                                                SHA1

                                                                                                                                55f0de95e9b88361eac27b71a4932cd4910cbbb4

                                                                                                                                SHA256

                                                                                                                                0ec1032cf0de577aeb2144557635ed303d07165a50b29622509f81af807ca252

                                                                                                                                SHA512

                                                                                                                                27881e522c6871d4e553bfab8673f3dbd8435a34fb682b7af1bd5cece2cfed60aaa16c57d378bb362284c94817f148a741eb96933dc0374577652fa12480e98d

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\DawnWebGPUCache\data_1

                                                                                                                                Filesize

                                                                                                                                264KB

                                                                                                                                MD5

                                                                                                                                a76ab08009db2e0a26fbfbae14613bb6

                                                                                                                                SHA1

                                                                                                                                f4654560bde244397e62d4f2c8730780edef0be6

                                                                                                                                SHA256

                                                                                                                                4289c7922802041d35a1b84c709e5d1c9d82a26a0edba9a00cbf2744e3cdc3e5

                                                                                                                                SHA512

                                                                                                                                b0e4980b38ba3f478792da5a1689f8ec4a4c65c82a3ae8d09f4f0e1b9fdfe95cb91500f47354ede60495ebe43721751c05fd8019a9d8186c324a85a8ad02cc69

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico

                                                                                                                                Filesize

                                                                                                                                69KB

                                                                                                                                MD5

                                                                                                                                164a788f50529fc93a6077e50675c617

                                                                                                                                SHA1

                                                                                                                                c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48

                                                                                                                                SHA256

                                                                                                                                b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17

                                                                                                                                SHA512

                                                                                                                                ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\content.js

                                                                                                                                Filesize

                                                                                                                                9KB

                                                                                                                                MD5

                                                                                                                                3d20584f7f6c8eac79e17cca4207fb79

                                                                                                                                SHA1

                                                                                                                                3c16dcc27ae52431c8cdd92fbaab0341524d3092

                                                                                                                                SHA256

                                                                                                                                0d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643

                                                                                                                                SHA512

                                                                                                                                315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State

                                                                                                                                Filesize

                                                                                                                                26KB

                                                                                                                                MD5

                                                                                                                                cedc818584439f952ee9df7897f2f637

                                                                                                                                SHA1

                                                                                                                                4d8973843ffca608c71969be18185f666040f5e2

                                                                                                                                SHA256

                                                                                                                                3b14cecd875e09d0d70ad356fc3fe662a784b24a2813f3f7304ce8e0e1b198bc

                                                                                                                                SHA512

                                                                                                                                4d5ad44192982543bd74ba148b2d7e3487bf387a1aaf92e55207806947b1b824e5092f340492029ae6c0cbf60e71b5685556d66a936b6943a4049cfcfcbdd7cc

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State

                                                                                                                                Filesize

                                                                                                                                111B

                                                                                                                                MD5

                                                                                                                                285252a2f6327d41eab203dc2f402c67

                                                                                                                                SHA1

                                                                                                                                acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                                                                                                                SHA256

                                                                                                                                5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                                                                                                                SHA512

                                                                                                                                11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                                Filesize

                                                                                                                                2B

                                                                                                                                MD5

                                                                                                                                d751713988987e9331980363e24189ce

                                                                                                                                SHA1

                                                                                                                                97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                                SHA256

                                                                                                                                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                                SHA512

                                                                                                                                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                Filesize

                                                                                                                                15KB

                                                                                                                                MD5

                                                                                                                                6b930a95fa606030a7345bcd5ae82754

                                                                                                                                SHA1

                                                                                                                                bcada2aba39282f8639eb17182d2230a6911d343

                                                                                                                                SHA256

                                                                                                                                7dbd452839123ca250f10708c0d87e36a1c9b8522a083f040ab5a60968525ddd

                                                                                                                                SHA512

                                                                                                                                508cdbf1c49b991ec5dd85cc84b09015a2f50d24c9fc840f974f33425218a4e0953de414764ce051ef452317b43c427c71415f21f371b464ddd021b65e581274

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                Filesize

                                                                                                                                15KB

                                                                                                                                MD5

                                                                                                                                417d5b687acab8e9cc946bbee99d80e9

                                                                                                                                SHA1

                                                                                                                                46bd6b3b39ebd5bf106719dc735e9ea5758cb800

                                                                                                                                SHA256

                                                                                                                                c2db036160ee1bb30943ab8b63aca09a318d1c7ee4a8a3468276421d2c7f2c0c

                                                                                                                                SHA512

                                                                                                                                7ee69d818affbf6ec9d15167e21912b3a3efa6fcdc7b0bd247f763629ba1f2764fb5bc82d40b4eff7050bb1ab4b5c3646be006238cfc01b1022d8f6d1fd4b53a

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                Filesize

                                                                                                                                22KB

                                                                                                                                MD5

                                                                                                                                df9a69dfcc0602ba9d437cd6929e0b0f

                                                                                                                                SHA1

                                                                                                                                8e3855523ffa2cd9b3a05c0c3a141a9b909e86f7

                                                                                                                                SHA256

                                                                                                                                831ba839c1429d0694abdd22da302f5d47ba4058f73f39b055d3ab8e9f8f96b5

                                                                                                                                SHA512

                                                                                                                                5952aa85c3ef8f08c2266c206869e08b1c1c2ce5764f487c46cf60cf3997ed7b988498ac9197f076e4dcb9ce22c5849fd328fdbaf96465f45e2e2b600e673ee2

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                Filesize

                                                                                                                                21KB

                                                                                                                                MD5

                                                                                                                                919def2c9346d725250678da2ce62011

                                                                                                                                SHA1

                                                                                                                                486b45fe5d487371363b63528df8773db7ede574

                                                                                                                                SHA256

                                                                                                                                bea2318501bb5acdb000f39040f78675f0bb9da01f71cb6d28e7a5183ffe2116

                                                                                                                                SHA512

                                                                                                                                b1bd3f6380b154e28373021a8528777843baeeeb65ee566ba005c251c1a79d2196040f0db975ab6506a1f4ec4c7017a87a4c992cc2f220db6274dca26184b682

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                Filesize

                                                                                                                                23KB

                                                                                                                                MD5

                                                                                                                                432c4d6c63b28270a2ff8401a8f986c1

                                                                                                                                SHA1

                                                                                                                                69c3cc2f8a8861a1c6c90d7430a49ff10f8de1cc

                                                                                                                                SHA256

                                                                                                                                30804964f4021f56b2fbe22c0ab0e0a2180831bf32dcb1e11884bc93b462b904

                                                                                                                                SHA512

                                                                                                                                24b5d5fe55f953b454a1792d14ad21f0c6fb5b16ec31023717e20c5949eb05dd64fc088bc9b04143e59280d196b8b4f3c413afc0fbda8c5c3a5c96333f527c03

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                                                                                                Filesize

                                                                                                                                36KB

                                                                                                                                MD5

                                                                                                                                ee7b9dc285b24ac4e3a6a0d56eae6d59

                                                                                                                                SHA1

                                                                                                                                f2a21071ae10783064b23a2f0f13315be22f7872

                                                                                                                                SHA256

                                                                                                                                d6c04398d1fbc8a4c9cc1e9cec08413ee1e6877598e526da0bc6a0cdb878d8b8

                                                                                                                                SHA512

                                                                                                                                c052e679ab0cb9d6d2820b4ccdd6acd6969d7f9b4e334c108ca103dbc6f960661e51294ee0fb9df60626a10ac357f30727a6d57ad02bf0e58c4b9177ce3abe29

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\Logs\sync_diagnostic.log

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                                MD5

                                                                                                                                3fd8f08915e9852156d08d3d51d44e23

                                                                                                                                SHA1

                                                                                                                                6f8606c2d09bcecf80bcf5c9c2cb83de1ea0dfdd

                                                                                                                                SHA256

                                                                                                                                ca26faa48ba471083efd514ed99e6536433278ba7e1c79b83794c610b999bf61

                                                                                                                                SHA512

                                                                                                                                856edfff8f692bde9f5688e83c457a7f8ad72a5ee5a54604ea36b0d7c8d62e291b2378f54a2e1aba1f521be366cefc330d696c07786d22211651c0c227459a42

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                Filesize

                                                                                                                                30KB

                                                                                                                                MD5

                                                                                                                                56bf2304719e2e8e48e8decd78e84800

                                                                                                                                SHA1

                                                                                                                                543cdf0babdb4e42dfb5159adfd12c91b09c5fbf

                                                                                                                                SHA256

                                                                                                                                bf59efade679e820cd84c3cda3047c40b7f39b44800a1ccb32d4948bc63d3a56

                                                                                                                                SHA512

                                                                                                                                7d3dea9aa4c441d0a20a3941e76df0ae153ccb9f1f3ceae81c2fee5a4dda7f5f5cee958978b9f4218fb59ea0233a8e69b779edeef3ec004dd6d46b314165620a

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                Filesize

                                                                                                                                6KB

                                                                                                                                MD5

                                                                                                                                f5760c0f32ada116bca73d8b3ed0ebf6

                                                                                                                                SHA1

                                                                                                                                5c3cfb7a25a88b611882408e228ed4cf363f644d

                                                                                                                                SHA256

                                                                                                                                e1c0afe32e25d426614a5f09ad79199fa7946e64e842446b6e289101ce0f2444

                                                                                                                                SHA512

                                                                                                                                79c60fdd5984f425b5bf8670b5cf505756d57fd6179a03a4b784449e90579cb2b083de3c3bf3125fc6e4f5ca15dece9970c64ffb17eca7897b979c5acd9d7d4e

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                Filesize

                                                                                                                                7KB

                                                                                                                                MD5

                                                                                                                                2c91aabc740d26def571b2be9e29183e

                                                                                                                                SHA1

                                                                                                                                07f8c79881d32c64eca47fe4691075baf04d39d4

                                                                                                                                SHA256

                                                                                                                                6b0a11281fa6ab643a86727dd1a5bd4c69c8a12f5707fa6bf49afddf96989557

                                                                                                                                SHA512

                                                                                                                                29fe5bcd0905364f08e3446cfacd606739e5d3fe502c4b2dd5a9aefb98cce3e9036bd043de20041b85f83940235fed0b230307b6d011eab3ad7d1dc7a807273f

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                Filesize

                                                                                                                                37KB

                                                                                                                                MD5

                                                                                                                                95f0a08d00c92595a28fd4a31177292f

                                                                                                                                SHA1

                                                                                                                                0aed0af1a9f4bc2ccf407dd8fd501591ece1af8e

                                                                                                                                SHA256

                                                                                                                                ecc1ed1b46c01693c060063a35667a44e19f77a212b2e359e4a5a7d24f822ec0

                                                                                                                                SHA512

                                                                                                                                07f92184d160775a937ac1e1241ffa8cb73056c730166169dbace2a8628ee75de0aee50241eb17f5b5467382e9ebd125304e253182b4ea62ecf2f55318e8de71

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\RevisitationBloomfilter

                                                                                                                                Filesize

                                                                                                                                392B

                                                                                                                                MD5

                                                                                                                                be20f17d415c92c31fb2c6c11c83490f

                                                                                                                                SHA1

                                                                                                                                17599c9a3259278faff8b08ff343b886996b10ea

                                                                                                                                SHA256

                                                                                                                                7dec51e450100e2e51751f1f1c171dc3f8d2031403a81be25a51ff56dd1a8372

                                                                                                                                SHA512

                                                                                                                                76f885d30167c1e3a2676203dfaae0d0d3429b231b2a3b6a6ff6688ebd7ea0bdf998be66f6f8f7c5b655a093aeb36790223217792f96611af69c2157dccb5039

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\RevisitationBloomfilter

                                                                                                                                Filesize

                                                                                                                                392B

                                                                                                                                MD5

                                                                                                                                5cce2308438c6583e7b3535fffaa3cff

                                                                                                                                SHA1

                                                                                                                                2b92c9600f9b69b239a3ea0ffd2e8b2ca4306254

                                                                                                                                SHA256

                                                                                                                                008799fe41557895556764c76eaa3d1a67def719a0e7a8ee4b630ee8710507bf

                                                                                                                                SHA512

                                                                                                                                20b4d5af5b1a2ad217253f409edd9d8a126cbce11ff8497de9ab28b085ca5495db2406547da6bc1fc19595e83b04a37fa253e46c820b8b6e8238b7b73aad6ecc

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\RevisitationBloomfilter

                                                                                                                                Filesize

                                                                                                                                392B

                                                                                                                                MD5

                                                                                                                                aab76c3ca8db52a2e2371081206eb33f

                                                                                                                                SHA1

                                                                                                                                91afc11d9c3b34b8dce5ae791987b28b9a6db5de

                                                                                                                                SHA256

                                                                                                                                80f9c49d6191ec58ac3c62d7631b70a8cde3fee409a9eb5aa8096ed642b59f71

                                                                                                                                SHA512

                                                                                                                                da28d9bc1f2577c2f9b7d66eae3f3ce4ae4d335437512e69e10d57f921826954c956309915eb864c4410db6d624a65154f1766194cc4fbefe48c96533d65d599

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\RevisitationBloomfilter~RFe57f83b.TMP

                                                                                                                                Filesize

                                                                                                                                392B

                                                                                                                                MD5

                                                                                                                                302a2e6d2f7b1671f0aae0101a198b73

                                                                                                                                SHA1

                                                                                                                                50203482ca1767a04e903aa03eca82f205c04fc2

                                                                                                                                SHA256

                                                                                                                                eea30aecefbd34cdb833cb124fdaf762f905b3f32d2cc81e571d41341fd575a7

                                                                                                                                SHA512

                                                                                                                                993abae9bb2cece79df178364f3f26ebdd213548893c1be3448c7a3360a8ee4f4eea2ed87356da32e70abac12fe228166bf2a68eb5e5de389bac88a38ceb2aed

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres

                                                                                                                                Filesize

                                                                                                                                2KB

                                                                                                                                MD5

                                                                                                                                cb7e87c43d66bf5fe686df8c6d7ced0e

                                                                                                                                SHA1

                                                                                                                                6d82b2eafd4ae1e01643d623744aa57dbee9a824

                                                                                                                                SHA256

                                                                                                                                8c07efdd68f254ee0fb638cd85452375baeec3da3626187db64212f7527dbd67

                                                                                                                                SHA512

                                                                                                                                e26809a55ed6f3b591b2c503c08c052825c880859df0ea0a07bd88791a10d0c52683f49b918299e7d7fca79a2880afa8d10144450c839179a344796e92dbd3ab

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\5f1bbe00-5542-4eb1-84db-32565b843f57.tmp

                                                                                                                                Filesize

                                                                                                                                152KB

                                                                                                                                MD5

                                                                                                                                dd9bf8448d3ddcfd067967f01e8bf6d7

                                                                                                                                SHA1

                                                                                                                                d7829475b2bd6a3baa8fabfaf39af57c6439b35e

                                                                                                                                SHA256

                                                                                                                                fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72

                                                                                                                                SHA512

                                                                                                                                65347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Setup.exe

                                                                                                                                Filesize

                                                                                                                                356KB

                                                                                                                                MD5

                                                                                                                                fa0b327abd82686bb9d676a30fa89b46

                                                                                                                                SHA1

                                                                                                                                a5521f5e8e500f67b183542ffad65b83ebcb186f

                                                                                                                                SHA256

                                                                                                                                d01728070486e1abbf024db0eeeacf232e02fe326c4c0b762af73f728fc9392d

                                                                                                                                SHA512

                                                                                                                                ead84a6cbe44be5cb213154cf11f8cbe7cc992563549201500f11cf770e3b57b02da027fc982b436f8eebbfa60088f4dad8e10de1086dbb5781b2b3da004790d

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\d64c9f84-d7ea-4a1f-80eb-72ac718d10a6.tmp

                                                                                                                                Filesize

                                                                                                                                10KB

                                                                                                                                MD5

                                                                                                                                78e47dda17341bed7be45dccfd89ac87

                                                                                                                                SHA1

                                                                                                                                1afde30e46997452d11e4a2adbbf35cce7a1404f

                                                                                                                                SHA256

                                                                                                                                67d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550

                                                                                                                                SHA512

                                                                                                                                9574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ed78e9e5-d564-4ec4-86c2-22d691284582.tmp

                                                                                                                                Filesize

                                                                                                                                1B

                                                                                                                                MD5

                                                                                                                                5058f1af8388633f609cadb75a75dc9d

                                                                                                                                SHA1

                                                                                                                                3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                                                                SHA256

                                                                                                                                cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                                                                SHA512

                                                                                                                                0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe

                                                                                                                                Filesize

                                                                                                                                63KB

                                                                                                                                MD5

                                                                                                                                d298454882caac154fc9217fc7e90499

                                                                                                                                SHA1

                                                                                                                                11970a2f8b9d1153fbc7fe925a846bd95e07e96f

                                                                                                                                SHA256

                                                                                                                                badaa2312457f3d08ca1f72287989456f9e62d6b417af6fb9b5e39ca1e8c8100

                                                                                                                                SHA512

                                                                                                                                e28a4d7c827b5c816503ddba4fee0bc82b16a0acb2eed9c81b20bb1b043d69b89cd3a1cf2beafb27a2471b6172f707d53e3c90568636b0c65e484e051dfde86f

                                                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe

                                                                                                                                Filesize

                                                                                                                                256KB

                                                                                                                                MD5

                                                                                                                                c4e4407b5fcf49586ddd5d5573ae4b95

                                                                                                                                SHA1

                                                                                                                                0f60aaaaac09d4f9273207114fcc78c0bfb250eb

                                                                                                                                SHA256

                                                                                                                                8f1e6eb0269fbe449678ce4863d494fda78bc648f27ad1c129270575efce4f7a

                                                                                                                                SHA512

                                                                                                                                95a89aae7f135b3355f2f0f751607742d8dfa5dfb04bf86cad0fff99d6c687a18a2f0be30d92a79d004cba49823c73f0208f40bb5e9cff3b26f72d1fe5f3d47b

                                                                                                                              • C:\Users\Admin\Downloads\CC Generator.zip

                                                                                                                                Filesize

                                                                                                                                4.9MB

                                                                                                                                MD5

                                                                                                                                68ed86581a318c9e7278b3822b7fbeff

                                                                                                                                SHA1

                                                                                                                                df8d5d2f399e276a4c1c19aece2f7a7af3cb0d99

                                                                                                                                SHA256

                                                                                                                                f2e1f9ba48a8304bf36725aba51e6b3f461e5899e06ba626fdc8a73652fe9d5e

                                                                                                                                SHA512

                                                                                                                                a96d697280cf1b4f74734add0da6b250d147da9692dae991e531e7d3bd96ea2ca75a4f29c8098aa728bc32a1255cd81943c9307ced744cb53dc15633df5c95b4

                                                                                                                              • C:\Users\Admin\Downloads\CC Generator\CC Generator\CC_Generator .exe

                                                                                                                                Filesize

                                                                                                                                4.9MB

                                                                                                                                MD5

                                                                                                                                a12aebc4a455dd226047ceae5590b73f

                                                                                                                                SHA1

                                                                                                                                23994217e28120ea87c8bc713610d273b69c5a9a

                                                                                                                                SHA256

                                                                                                                                765f8c0f0d1802297cf12294da89232c789506ff8c2ab06478eeddbffaf10a78

                                                                                                                                SHA512

                                                                                                                                5e9e2e290377b7e6877fc3cf6c94a428150fefee943b6e01ad5ffaaa5e531db642312b1aebe1164964c6e2ee1b37953392ee751f6028ddddd7cea444ac43c415

                                                                                                                              • C:\Users\Admin\Downloads\CC Generator\CC Generator\CC_Generator.exe

                                                                                                                                Filesize

                                                                                                                                5.3MB

                                                                                                                                MD5

                                                                                                                                35058d8cfb8232610118db5d237be4bb

                                                                                                                                SHA1

                                                                                                                                801290f68cf19c66b362bf5ecdc67c9e36b21a4b

                                                                                                                                SHA256

                                                                                                                                eefce9820bd7d8e0c47dafa9332a979ae6b4dfc41cc0603e8a846f07368be3f8

                                                                                                                                SHA512

                                                                                                                                cbf7666396d88a121d7768c209d6ae06d212ae311f59edc2f85d86bc6ec3f5aa592e6ab05a7f0dbfb5807a05e40ed000ca79dfec8f4f48a4b6114e18e28a1921

                                                                                                                              • C:\Users\Admin\Downloads\CC Generator\CC Generator\Execute\Cards.txt

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                                MD5

                                                                                                                                54b71e07ae7ae73328fb49861b38507d

                                                                                                                                SHA1

                                                                                                                                3a5d6ecc1cbcfa986c356459ec55c91c0314449d

                                                                                                                                SHA256

                                                                                                                                4f8838d6d66b9d0828d3dc8fdfa9f15dd733c42673367fcca9b9b1ac592d0650

                                                                                                                                SHA512

                                                                                                                                dda0beae29792a6019d6d762d5752801c7d328925623cc9cf4abf695c9acf7c7725ce7cce81008f0ec8ce3b7f9c6e0bf14dfa0fce932134662c83272ee8f35cd

                                                                                                                              • C:\Users\Admin\Downloads\CC Generator\Password.txt

                                                                                                                                Filesize

                                                                                                                                79B

                                                                                                                                MD5

                                                                                                                                2e0a168682fadf1654cb2068cf326d51

                                                                                                                                SHA1

                                                                                                                                36c61dafe8a7134614f94e047781b1938163050e

                                                                                                                                SHA256

                                                                                                                                883b28febe1e0fbe99cc3b085b7ccdaa840609566026718775c547085f4e8fa0

                                                                                                                                SHA512

                                                                                                                                2d07c3737d09d7b92e4760018bd499050e30cef3a8fdd2c3ce4236b9183e3f50346f693fb3aa4f940028a42f6fdb643ba9b655df44d11d56b12ca368b617304c

                                                                                                                              • memory/4300-1373-0x000000001CAE0000-0x000000001CB7C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                624KB

                                                                                                                              • memory/4300-1372-0x000000001C570000-0x000000001CA3E000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4.8MB

                                                                                                                              • memory/4300-1371-0x000000001BFF0000-0x000000001C096000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                664KB

                                                                                                                              • memory/5920-1432-0x0000000001320000-0x000000000132A000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                40KB