Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
567s -
max time network
788s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
06/03/2025, 21:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://temp.sh/whzOx/trash_malware.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
http://temp.sh/whzOx/trash_malware.zip
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
http://temp.sh/whzOx/trash_malware.zip
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral4
Sample
http://temp.sh/whzOx/trash_malware.zip
Resource
win11-20250217-en
General
-
Target
http://temp.sh/whzOx/trash_malware.zip
Malware Config
Signatures
-
UAC bypass 3 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Illerka.C.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mbrsetup.exe -
Windows security bypass 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" antivirus-platinum.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 3 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\software\WOW6432Node\microsoft\Active Setup\Installed Components INSTALLER.exe Key created \REGISTRY\MACHINE\software\WOW6432Node\microsoft\Active Setup\Installed Components INSTALLER.exe Key created \REGISTRY\USER\S-1-5-21-3517169085-2802914951-552339849-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3517169085-2802914951-552339849-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" antivirus-platinum.exe -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Possible privilege escalation attempt 64 IoCs
pid Process 864 Process not Found 4884 Process not Found 1184 Process not Found 4324 Process not Found 4156 Process not Found 808 Process not Found 3396 Process not Found 4196 Process not Found 112 Process not Found 4304 Process not Found 744 Process not Found 3544 Process not Found 2300 Process not Found 4320 takeown.exe 2180 Process not Found 564 Process not Found 2752 Process not Found 4860 Process not Found 276 Process not Found 2992 Process not Found 2348 Process not Found 2276 Process not Found 2908 icacls.exe 440 icacls.exe 2964 takeown.exe 4848 Process not Found 2040 Process not Found 1552 Process not Found 2168 Process not Found 2764 Process not Found 1208 Process not Found 752 Process not Found 3572 Process not Found 4048 takeown.exe 996 icacls.exe 3632 Process not Found 2388 Process not Found 1620 takeown.exe 3364 Process not Found 3344 Process not Found 3824 icacls.exe 436 Process not Found 3612 Process not Found 4024 Process not Found 72 Process not Found 3644 Process not Found 3872 Process not Found 2100 Process not Found 3712 Process not Found 1020 takeown.exe 672 Process not Found 3780 Process not Found 5012 Process not Found 1448 Process not Found 4272 Process not Found 2040 Process not Found 3776 Process not Found 3008 Process not Found 72 Process not Found 3780 Process not Found 3272 Process not Found 3900 icacls.exe 1936 Process not Found 1936 Process not Found -
Executes dropped EXE 31 IoCs
pid Process 2324 svchost.exe 3712 taskhost.exe 2464 svchost.exe 3100 taskhost.exe 2088 svchost.exe 3376 taskhost.exe 1848 svchost.exe 2416 taskhost.exe 1092 svchost.exe 2656 svchost.exe 2252 taskhost.exe 3576 svchost.exe 3080 taskhost.exe 1504 svchost.exe 4068 taskhost.exe 3632 svchost.exe 3704 taskhost.exe 4280 svchost.exe 3016 taskhost.exe 760 svchost.exe 560 Free YouTube Downloader.exe 3708 302746537.exe 4864 taskhost.exe 4536 antivirus-platinum.exe 2360 rhcne3j0ejuu.exe 4604 pphcje3j0ejuu.exe 3332 INSTALLER.exe 4080 AgentSvr.exe 2260 INSTALLER.exe 3220 AgentSvr.exe 2664 mbrsetup.exe -
Loads dropped DLL 26 IoCs
pid Process 2496 XPAntivirus2008.exe 2496 XPAntivirus2008.exe 2272 regsvr32.exe 2688 regsvr32.exe 2496 XPAntivirus2008.exe 4536 antivirus-platinum.exe 2360 rhcne3j0ejuu.exe 2360 rhcne3j0ejuu.exe 2360 rhcne3j0ejuu.exe 2360 rhcne3j0ejuu.exe 3332 INSTALLER.exe 4152 regsvr32.exe 1520 regsvr32.exe 1788 regsvr32.exe 1676 regsvr32.exe 5000 regsvr32.exe 1780 regsvr32.exe 3708 regsvr32.exe 2260 INSTALLER.exe 5096 regsvr32.exe 5096 regsvr32.exe 1712 regsvr32.exe 3556 Bonzify.exe 3220 AgentSvr.exe 3220 AgentSvr.exe 3220 AgentSvr.exe -
Modifies file permissions 1 TTPs 64 IoCs
pid Process 3996 Process not Found 4896 Process not Found 1308 Process not Found 4724 Process not Found 3276 Process not Found 4124 Process not Found 2784 Process not Found 996 Process not Found 3888 Process not Found 2236 Process not Found 4632 Process not Found 2028 takeown.exe 4912 Process not Found 5076 Process not Found 3008 icacls.exe 1008 takeown.exe 3808 takeown.exe 4012 Process not Found 2040 Process not Found 3096 Process not Found 840 Process not Found 3480 icacls.exe 4852 icacls.exe 1388 Process not Found 3192 Process not Found 3616 Process not Found 5096 Process not Found 3884 Process not Found 4012 Process not Found 4236 Process not Found 4196 Process not Found 5084 Process not Found 1040 takeown.exe 3688 icacls.exe 864 Process not Found 3852 Process not Found 4000 Process not Found 3360 Process not Found 4940 Process not Found 3924 Process not Found 3924 Process not Found 3612 Process not Found 3724 Process not Found 2100 Process not Found 4076 Process not Found 4124 icacls.exe 3432 Process not Found 1400 Process not Found 2348 Process not Found 1896 Process not Found 3812 takeown.exe 2040 Process not Found 4252 Process not Found 4024 Process not Found 3692 Process not Found 3096 Process not Found 1752 Process not Found 1184 Process not Found 1756 Process not Found 2188 takeown.exe 2100 Process not Found 2824 Process not Found 1408 Process not Found 1960 takeown.exe -
Windows security modification 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" antivirus-platinum.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tv_enua = "RunDll32 advpack.dll,LaunchINFSection C:\\Windows\\INF\\tv_enua.inf, RemoveCabinet" INSTALLER.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SMrhcne3j0ejuu = "C:\\Program Files (x86)\\rhcne3j0ejuu\\rhcne3j0ejuu.exe" XPAntivirus2008.exe Set value (str) \REGISTRY\USER\S-1-5-21-3517169085-2802914951-552339849-1000\Software\Microsoft\Windows\CurrentVersion\Run\Free Youtube Downloader = "C:\\Windows\\Free Youtube Downloader\\Free Youtube Downloader\\Free YouTube Downloader.exe" FreeYoutubeDownloader.exe Set value (str) \REGISTRY\USER\S-1-5-21-3517169085-2802914951-552339849-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiVirus Pro 2017 = "C:\\Users\\Admin\\Downloads\\trash_malware\\trash malware\\AntivirusPro2017.exe" AntivirusPro2017.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled 1 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mbrsetup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mbrsetup.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: AntivirusPro2017.exe File opened (read-only) \??\M: AntivirusPro2017.exe File opened (read-only) \??\R: AntivirusPro2017.exe File opened (read-only) \??\V: AntivirusPro2017.exe File opened (read-only) \??\Y: AntivirusPro2017.exe File opened (read-only) \??\Q: AntivirusPro2017.exe File opened (read-only) \??\T: AntivirusPro2017.exe File opened (read-only) \??\U: AntivirusPro2017.exe File opened (read-only) \??\W: AntivirusPro2017.exe File opened (read-only) \??\Z: AntivirusPro2017.exe File opened (read-only) \??\G: AntivirusPro2017.exe File opened (read-only) \??\K: AntivirusPro2017.exe File opened (read-only) \??\N: AntivirusPro2017.exe File opened (read-only) \??\O: AntivirusPro2017.exe File opened (read-only) \??\X: AntivirusPro2017.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\E: AntivirusPro2017.exe File opened (read-only) \??\H: AntivirusPro2017.exe File opened (read-only) \??\I: AntivirusPro2017.exe File opened (read-only) \??\J: AntivirusPro2017.exe File opened (read-only) \??\P: AntivirusPro2017.exe File opened (read-only) \??\S: AntivirusPro2017.exe -
File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
-
Power Settings 1 TTPs 9 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 1188 Process not Found 3116 Process not Found 1400 Process not Found 1504 Process not Found 3836 icacls.exe 940 Process not Found 4188 Process not Found 2348 cmd.exe 4196 takeown.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 AntivirusPro2017.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\SET55EE.tmp INSTALLER.exe File created C:\Windows\SysWOW64\SET55EE.tmp INSTALLER.exe File opened for modification C:\Windows\SysWOW64\msvcp50.dll INSTALLER.exe File created C:\Windows\SysWOW64\pphcje3j0ejuu.exe rhcne3j0ejuu.exe -
resource yara_rule behavioral4/files/0x001300000002b689-3213.dat upx behavioral4/memory/3708-3238-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral4/memory/4536-3323-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral4/memory/3708-3365-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral4/memory/4536-3711-0x0000000000400000-0x000000000040D000-memory.dmp upx -
Drops file in Program Files directory 62 IoCs
description ioc Process File created C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe Zika.exe File created C:\Program Files (x86)\rhcne3j0ejuu\MFC71.dll XPAntivirus2008.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe Zika.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe Zika.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe Zika.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe\:Zone.Identifier:$DATA Zika.exe File opened for modification C:\Program Files\7-Zip\7z.exe Zika.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe\:Zone.Identifier:$DATA Zika.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.dll.sys.exe Zika.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe Zika.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe Zika.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.dll.sys.exe Zika.exe File created C:\Program Files (x86)\rhcne3j0ejuu\license.txt XPAntivirus2008.exe File created C:\Program Files\7-Zip\7zG.exe\:Zone.Identifier:$DATA Zika.exe File created C:\Program Files (x86)\rhcne3j0ejuu\database.dat XPAntivirus2008.exe File created C:\Program Files (x86)\rhcne3j0ejuu\rhcne3j0ejuu.exe.local XPAntivirus2008.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.dll.sys.exe Zika.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.dll.sys.exe Zika.exe File created C:\Program Files (x86)\rhcne3j0ejuu\rhcne3j0ejuu.exe XPAntivirus2008.exe File created C:\Program Files (x86)\rhcne3j0ejuu\msvcp71.dll XPAntivirus2008.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe Zika.exe File created C:\Program Files (x86)\rhcne3j0ejuu\MFC71ENU.DLL XPAntivirus2008.exe File created C:\Program Files (x86)\rhcne3j0ejuu\msvcr71.dll XPAntivirus2008.exe File opened for modification C:\Program Files\7-Zip\7zG.dll.sys.exe Zika.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe\:Zone.Identifier:$DATA Zika.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.dll.sys.exe Zika.exe File created C:\Program Files\7-Zip\7zG.exe Zika.exe File opened for modification C:\Program Files\7-Zip\Uninstall.dll.sys.exe Zika.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe Zika.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe Zika.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe Zika.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe\:Zone.Identifier:$DATA Zika.exe File opened for modification C:\Program Files\7-Zip\7zFM.dll.sys.exe Zika.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe svchost.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe\:Zone.Identifier:$DATA Zika.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe Zika.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.dll.sys.exe Zika.exe File created C:\Program Files\7-Zip\7zFM.exe Zika.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe Zika.exe File created C:\Program Files (x86)\rhcne3j0ejuu\Uninstall.exe XPAntivirus2008.exe File opened for modification C:\Program Files\7-Zip\7z.dll.sys.exe Zika.exe File created C:\Program Files\7-Zip\Uninstall.exe\:Zone.Identifier:$DATA Zika.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe\:Zone.Identifier:$DATA Zika.exe File created C:\Program Files\7-Zip\7z.dll.sys.exe Zika.exe File created C:\Program Files\7-Zip\7zFM.exe\:Zone.Identifier:$DATA Zika.exe File created C:\Program Files\7-Zip\7zG.dll.sys.exe Zika.exe File created C:\Program Files\7-Zip\7z.exe Zika.exe File created C:\Program Files\7-Zip\7z.exe\:Zone.Identifier:$DATA Zika.exe File opened for modification C:\Program Files\7-Zip\7zG.exe Zika.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe Zika.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.dll.sys.exe Zika.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.dll.sys.exe Zika.exe File created C:\Program Files\7-Zip\7zFM.dll.sys.exe Zika.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.dll.sys.exe Zika.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.dll.sys.exe Zika.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.dll.sys.exe Zika.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.dll.sys.exe Zika.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe Zika.exe File created C:\Program Files\7-Zip\Uninstall.dll.sys.exe Zika.exe File created C:\Program Files\7-Zip\Uninstall.exe Zika.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.dll.sys.exe Zika.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.dll.sys.exe Zika.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\msagent\AgentSR.dll INSTALLER.exe File opened for modification C:\Windows\msagent\SET4F1A.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\mslwvtts.dll INSTALLER.exe File opened for modification C:\Windows\lhsp\help\SET55EB.tmp INSTALLER.exe File opened for modification C:\Windows\System32 wscript.exe File opened for modification C:\Windows\lhsp\tv\tvenuax.dll INSTALLER.exe File opened for modification C:\Windows\msagent\SET4EFA.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\SET4F1C.tmp INSTALLER.exe File created C:\Windows\antivirus-platinum.exe AntivirusPlatinum.exe File opened for modification C:\Windows\msagent\AgentSvr.exe INSTALLER.exe File created C:\Windows\lhsp\tv\SET55EA.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\AgentMPx.dll INSTALLER.exe File opened for modification C:\Windows\msagent\SET4EF9.tmp INSTALLER.exe File created C:\Windows\msagent\SET4EF9.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\intl\Agt0409.dll INSTALLER.exe File created C:\Windows\notepad.dll.sys.exe Zika.exe File opened for modification C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Uninstall.exe FreeYoutubeDownloader.exe File created C:\Windows\MSCOMCTL.OCX AntivirusPlatinum.exe File opened for modification C:\Windows\msagent\AgentDPv.dll INSTALLER.exe File opened for modification C:\Windows\notepad.dll.sys.exe Zika.exe File opened for modification C:\windows\antivirus-platinum.exe attrib.exe File opened for modification C:\Windows\lhsp\tv\SET55E9.tmp INSTALLER.exe File opened for modification C:\Windows\lhsp\tv\SET55EA.tmp INSTALLER.exe File opened for modification C:\Windows\fonts\andmoipa.ttf INSTALLER.exe File created C:\Windows\INF\SET55ED.tmp INSTALLER.exe File opened for modification C:\Windows\INF\tv_enua.inf INSTALLER.exe File opened for modification C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe FreeYoutubeDownloader.exe File created C:\Windows\msagent\SET4EE6.tmp INSTALLER.exe File created C:\Windows\msagent\SET4EF7.tmp INSTALLER.exe File opened for modification C:\Windows\help\Agt0409.hlp INSTALLER.exe File opened for modification C:\Windows\msagent\AgtCtl15.tlb INSTALLER.exe File opened for modification C:\Windows\msagent\intl\SET4F2E.tmp INSTALLER.exe File opened for modification C:\Windows\fonts\SET55EC.tmp INSTALLER.exe File created C:\Windows\finalDestruction.bin Bonzify.exe File created C:\Windows\__tmp_rar_sfx_access_check_241116562 AntivirusPlatinum.exe File opened for modification C:\Windows\msagent\AgentPsh.dll INSTALLER.exe File created C:\Windows\lhsp\tv\SET55E9.tmp INSTALLER.exe File created C:\Windows\fonts\SET55EC.tmp INSTALLER.exe File opened for modification C:\Windows\INF\SET55ED.tmp INSTALLER.exe File created C:\Windows\COMCTL32.OCX AntivirusPlatinum.exe File opened for modification C:\Windows\302746537.exe AntivirusPlatinum.exe File opened for modification C:\Windows\msagent\SET4EF8.tmp INSTALLER.exe File created C:\Windows\msagent\chars\Bonzi.acs Bonzify.exe File created C:\Windows\executables.bin Bonzify.exe File opened for modification C:\Windows\MSCOMCTL.OCX AntivirusPlatinum.exe File opened for modification C:\Windows\INF\agtinst.inf INSTALLER.exe File created C:\Windows\lhsp\help\SET55EB.tmp INSTALLER.exe File created C:\Windows\msagent\SET4F1A.tmp INSTALLER.exe File opened for modification C:\Windows\lhsp\help\tv_enua.hlp INSTALLER.exe File opened for modification C:\Windows\INF\SET4F1B.tmp INSTALLER.exe File created C:\Windows\msagent\intl\SET4F2E.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\SET4EF7.tmp INSTALLER.exe File created C:\Windows\302746537.exe AntivirusPlatinum.exe File opened for modification C:\Windows\msagent\SET4EE5.tmp INSTALLER.exe File created C:\Windows\msagent\SET4EF8.tmp INSTALLER.exe File created C:\Windows\msagent\SET4EFA.tmp INSTALLER.exe File created C:\Windows\INF\SET4F1B.tmp INSTALLER.exe File created C:\Windows\help\SET4F2D.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\SET4F2F.tmp INSTALLER.exe File created C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Uninstall.ini FreeYoutubeDownloader.exe File created C:\Windows\msagent\SET4EE5.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\SET4EE6.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\AgentDp2.dll INSTALLER.exe File created C:\Windows\msagent\SET4F1C.tmp INSTALLER.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 6 IoCs
pid Process 1740 Process not Found 3780 Process not Found 4128 Process not Found 1400 cmd.exe 3996 Process not Found 3612 Process not Found -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Program crash 3 IoCs
pid pid_target Process procid_target 4272 5004 Process not Found 4790 4916 4472 Process not Found 5917 1572 3044 Process not Found 7389 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 14 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1760 Process not Found 3396 Process not Found 2812 Process not Found 4156 cmd.exe 3808 cmd.exe 1996 Process not Found 1032 Process not Found 1688 Process not Found 2040 Process not Found 4296 Process not Found 564 Process not Found 3476 cmd.exe 4120 Process not Found 4840 Process not Found -
Checks SCSI registry key(s) 3 TTPs 58 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Capabilities explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchHost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchHost.exe -
Kills process with taskkill 1 IoCs
pid Process 1400 taskkill.exe -
Modifies Control Panel 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3517169085-2802914951-552339849-1000\Control Panel\International wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3517169085-2802914951-552339849-1000\Control Panel\International\s1159 = "Bolbi" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3517169085-2802914951-552339849-1000\Control Panel\International\s2359 = "Bolbi" wscript.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main antivirus-platinum.exe Key created \REGISTRY\USER\S-1-5-21-3517169085-2802914951-552339849-1000\Software\Microsoft\Internet Explorer\Main antivirus-platinum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3517169085-2802914951-552339849-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "YOUR PC MAY BE INFECTED WITH SPYWARE OR OTHER MALICIOUS ITEMS" antivirus-platinum.exe Key created \REGISTRY\USER\S-1-5-21-3517169085-2802914951-552339849-1000\Software\Microsoft\Internet Explorer\GPU SearchHost.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Start Page = "http://secureservices2010.webs.com/scan" antivirus-platinum.exe Set value (str) \REGISTRY\USER\S-1-5-21-3517169085-2802914951-552339849-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://secureservices2010.webs.com/scan" antivirus-platinum.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2334D2B1-713E-11CF-8AE5-00AA00C00905}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7791BA60-E020-11CF-8E74-00A0C90F26F8}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7791BA62-E020-11CF-8E74-00A0C90F26F8}\TypeLib\ = "{6B7E6392-850A-101B-AFC0-4210102A8DA7}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BDD1F051-858B-11D1-B16A-00C0F0283628} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C8A3DC00-8593-11D1-B16A-00C0F0283628} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6BA90C01-3910-11D1-ACB3-00C04FD97575}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8B77181C-D3EF-11D1-8500-00C04FA34A14} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0713E8D8-850A-101B-AFC0-4210102A8DA7}\ = "Progress Bar General Property Page Object" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E6E17E86-DF38-11CF-8E74-00A0C90F26F8}\TypeLib\ = "{6B7E6392-850A-101B-AFC0-4210102A8DA7}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D45FD300-5C6E-11D1-9EC1-00C04FD7081F}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95A893C3-543A-11D0-AC45-00C04FD97575}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F5BE8BC2-7DE6-11D0-91FE-00C04FD701A5}\1.5\HELPDIR AgentSvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A7B93C91-7B81-11D0-AC5F-00C04FD97575} AgentSvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0713E8A2-850A-101B-AFC0-4210102A8DA7}\Implemented Categories\{0DE86A53-2BAA-11CF-A229-00AA003D7352} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0713E953-850A-101B-AFC0-4210102A8DA7}\TypeLib\ = "{6B7E6392-850A-101B-AFC0-4210102A8DA7}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6B7E6390-850A-101B-AFC0-4210102A8DA7}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0713E8A3-850A-101B-AFC0-4210102A8DA7}\ = "ITreeView10" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66833FE6-8583-11D1-B16A-00C0F0283628}\ = "Microsoft Toolbar Control 6.0 (SP4)" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.ImageListCtrl\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8B77181C-D3EF-11D1-8500-00C04FA34A14}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D45FD31D-5C6E-11D1-9EC1-00C04FD7081F} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{612A8628-0FB3-11CE-8747-524153480004}\InprocServer32\ = "c:\\windows\\comctl32.ocx" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.Slider\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{35053A22-8589-11D1-B16A-00C0F0283628}\Control regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Agent.Control.2\CLSID\ = "{D45FD31B-5C6E-11D1-9EC1-00C04FD7081F}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6B7E6392-850A-101B-AFC0-4210102A8DA7} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0713E451-850A-101B-AFC0-4210102A8DA7}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F4D83600-895E-11D0-B0A6-000000000000}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BF877890-E026-11CF-8E74-00A0C90F26F8} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E6E17E86-DF38-11CF-8E74-00A0C90F26F8}\TypeLib\ = "{6B7E6392-850A-101B-AFC0-4210102A8DA7}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C74190B8-8589-11D1-B16A-00C0F0283628}\TypeLib\ = "{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{143A62C8-C33B-11D1-84FE-00C04FA34A14}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A7B93CA0-7B81-11D0-AC5F-00C04FD97575}\TypeLib\ = "{A7B93C73-7B81-11D0-AC5F-00C04FD97575}" AgentSvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{612A8624-0FB3-11CE-8747-524153480004}\Implemented Categories\{0DE86A57-2BAA-11CF-A229-00AA003D7352} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7791BA40-E020-11CF-8E74-00A0C90F26F8}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0713E8A4-850A-101B-AFC0-4210102A8DA7} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BF877892-E026-11CF-8E74-00A0C90F26F8}\TypeLib\ = "{6B7E6392-850A-101B-AFC0-4210102A8DA7}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.Slider\CurVer\ = "MSComctlLib.Slider.2" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.Slider.2 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{35053A22-8589-11D1-B16A-00C0F0283628}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8E3867A2-8586-11D1-B16A-00C0F0283628}\TypeLib\Version = "2.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\COMCTL.ProgCtrl\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2C787A50-E01C-11CF-8E74-00A0C90F26F8}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{58DA8D8C-9D6A-101B-AFC0-4210102A8DA7}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{58DA8D94-9D6A-101B-AFC0-4210102A8DA7}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BDD1F04B-858B-11D1-B16A-00C0F0283628}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66833FE6-8583-11D1-B16A-00C0F0283628}\ToolboxBitmap32 regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C27CCE40-8596-11D1-B16A-00C0F0283628} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1EFB6595-857C-11D1-B16A-00C0F0283628}\TypeLib\ = "{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E6E17E8C-DF38-11CF-8E74-00A0C90F26F8}\ = "IToolbar" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EC0AB1C0-6CAB-11CF-8998-00AA00688B10}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66833FEB-8583-11D1-B16A-00C0F0283628}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8E3867A4-8586-11D1-B16A-00C0F0283628}\TypeLib\ = "{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D6589123-FC70-11D0-AC94-00C04FD97575}\2.0\0\win32\ = "C:\\Windows\\msagent\\AgentSvr.exe\\2" AgentSvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0713E8AF-850A-101B-AFC0-4210102A8DA7} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B0913412-3B44-11D1-ACBA-00C04FD97575}\TypeLib\ = "{A7B93C73-7B81-11D0-AC5F-00C04FD97575}" AgentSvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{66833FE6-8583-11D1-B16A-00C0F0283628}\Implemented Categories\{0DE86A57-2BAA-11CF-A229-00AA003D7352} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{35053A20-8589-11D1-B16A-00C0F0283628}\TypeLib\Version = "2.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DD9DA662-8594-11D1-B16A-00C0F0283628}\TypeLib\ = "{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F5BE8BDD-7DE6-11D0-91FE-00C04FD701A5}\ = "IAgentCtlSpeechInput" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A7B93CA0-7B81-11D0-AC5F-00C04FD97575}\TypeLib\Version = "2.0" AgentSvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{612A8624-0FB3-11CE-8747-524153480004}\Implemented Categories\{0DE86A53-2BAA-11CF-A229-00AA003D7352} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7791BA62-E020-11CF-8E74-00A0C90F26F8}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BF877896-E026-11CF-8E74-00A0C90F26F8}\TypeLib regsvr32.exe -
NTFS ADS 50 IoCs
description ioc Process File created C:\Users\Admin\Downloads\trash_malware\trash malware\Circles.exe\:Zone.Identifier:$DATA Illerka.C.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\RotateScreen.exe\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe\:Zone.Identifier:$DATA Zika.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\Blur.exe\:Zone.Identifier:$DATA Illerka.C.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\Interop.WMPLib.dll\:Zone.Identifier:$DATA Illerka.C.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\mbrsetup.exe\:Zone.Identifier:$DATA Illerka.C.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\FreeYoutubeDownloader.exe\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\Trippy.exe\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Program Files\7-Zip\7z.exe\:Zone.Identifier:$DATA Zika.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe\:Zone.Identifier:$DATA Zika.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe\:Zone.Identifier:$DATA Zika.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\AxInterop.WMPLib.dll\:Zone.Identifier:$DATA Illerka.C.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\FreeYoutubeDownloader.exe\:Zone.Identifier:$DATA Illerka.C.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\SOCIAL CREDIT TEST.exe\:Zone.Identifier:$DATA Illerka.C.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\Trippy.exe\:Zone.Identifier:$DATA Illerka.C.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\Bolbi.vbs\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\stupidy fuckity malware.bat\:Zone.Identifier:$DATA Illerka.C.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\Blur.exe\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\PixelateScreen.exe\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\SOCIAL CREDIT TEST.exe\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\stupidy fuckity malware.bat\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\Zika.exe\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Users\Admin\Downloads\trash_malware.zip:Zone.Identifier firefox.exe File created C:\Program Files\7-Zip\7zFM.exe\:Zone.Identifier:$DATA Zika.exe File created C:\Program Files\7-Zip\7zG.exe\:Zone.Identifier:$DATA Zika.exe File created C:\Program Files\7-Zip\Uninstall.exe\:Zone.Identifier:$DATA Zika.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\putin.exe\:Zone.Identifier:$DATA Illerka.C.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\AntivirusPlatinum.exe\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\gaben64.exe\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\Illerka.C.exe\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\sweeney64.exe\:Zone.Identifier:$DATA Illerka.C.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe\:Zone.Identifier:$DATA Zika.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe\:Zone.Identifier:$DATA Zika.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\ColorChange.exe\:Zone.Identifier:$DATA Illerka.C.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\gaben64.exe\:Zone.Identifier:$DATA Illerka.C.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\RotateScreen.exe\:Zone.Identifier:$DATA Illerka.C.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\Circles.exe\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\Interop.WMPLib.dll\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe\:Zone.Identifier:$DATA Zika.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\Trojan.VBS.Bolbi v2.exe\:Zone.Identifier:$DATA Illerka.C.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\AxInterop.WMPLib.dll\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\Jigsaw.exe\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\sweeney64.exe\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\Jigsaw.exe\:Zone.Identifier:$DATA Illerka.C.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\PixelateScreen.exe\:Zone.Identifier:$DATA Illerka.C.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\ColorChange.exe\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\putin.exe\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\Trojan.VBS.Bolbi v2.exe\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\XPAntivirus2008.exe\:Zone.Identifier:$DATA mbrsetup.exe File created C:\Users\Admin\Downloads\trash_malware\trash malware\Bolbi.vbs\:Zone.Identifier:$DATA Illerka.C.exe -
Suspicious behavior: EnumeratesProcesses 45 IoCs
pid Process 2260 Illerka.C.exe 2260 Illerka.C.exe 2260 Illerka.C.exe 2260 Illerka.C.exe 2260 Illerka.C.exe 2260 Illerka.C.exe 2260 Illerka.C.exe 2260 Illerka.C.exe 2260 Illerka.C.exe 2260 Illerka.C.exe 2260 Illerka.C.exe 2260 Illerka.C.exe 2260 Illerka.C.exe 2260 Illerka.C.exe 2260 Illerka.C.exe 2260 Illerka.C.exe 2260 Illerka.C.exe 2260 Illerka.C.exe 2360 rhcne3j0ejuu.exe 2360 rhcne3j0ejuu.exe 2664 mbrsetup.exe 2664 mbrsetup.exe 2664 mbrsetup.exe 2664 mbrsetup.exe 2664 mbrsetup.exe 2664 mbrsetup.exe 2664 mbrsetup.exe 2664 mbrsetup.exe 2664 mbrsetup.exe 2664 mbrsetup.exe 2664 mbrsetup.exe 2664 mbrsetup.exe 2664 mbrsetup.exe 2664 mbrsetup.exe 2664 mbrsetup.exe 2664 mbrsetup.exe 2664 mbrsetup.exe 2664 mbrsetup.exe 2664 mbrsetup.exe 2664 mbrsetup.exe 2664 mbrsetup.exe 3556 Bonzify.exe 3556 Bonzify.exe 4748 explorer.exe 4748 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2360 rhcne3j0ejuu.exe 4748 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2672 firefox.exe Token: SeDebugPrivilege 2672 firefox.exe Token: SeDebugPrivilege 2672 firefox.exe Token: SeDebugPrivilege 2672 firefox.exe Token: SeDebugPrivilege 2672 firefox.exe Token: SeDebugPrivilege 2672 firefox.exe Token: SeDebugPrivilege 2672 firefox.exe Token: SeDebugPrivilege 2776 Zika.exe Token: SeDebugPrivilege 2260 Illerka.C.exe Token: SeDebugPrivilege 1400 taskkill.exe Token: SeDebugPrivilege 2360 rhcne3j0ejuu.exe Token: SeTakeOwnershipPrivilege 5032 takeown.exe Token: SeTakeOwnershipPrivilege 4744 takeown.exe Token: SeTakeOwnershipPrivilege 5116 takeown.exe Token: SeTakeOwnershipPrivilege 5076 takeown.exe Token: SeTakeOwnershipPrivilege 2964 takeown.exe Token: SeTakeOwnershipPrivilege 4740 takeown.exe Token: SeTakeOwnershipPrivilege 1420 takeown.exe Token: SeTakeOwnershipPrivilege 1080 takeown.exe Token: SeTakeOwnershipPrivilege 2736 takeown.exe Token: SeTakeOwnershipPrivilege 2324 takeown.exe Token: SeTakeOwnershipPrivilege 764 takeown.exe Token: SeTakeOwnershipPrivilege 4296 takeown.exe Token: SeTakeOwnershipPrivilege 3352 takeown.exe Token: SeTakeOwnershipPrivilege 4816 takeown.exe Token: SeTakeOwnershipPrivilege 3156 takeown.exe Token: SeTakeOwnershipPrivilege 4072 takeown.exe Token: SeTakeOwnershipPrivilege 2632 takeown.exe Token: SeTakeOwnershipPrivilege 4992 takeown.exe Token: SeTakeOwnershipPrivilege 4152 takeown.exe Token: 33 3220 AgentSvr.exe Token: SeIncBasePriorityPrivilege 3220 AgentSvr.exe Token: SeTakeOwnershipPrivilege 1128 takeown.exe Token: SeTakeOwnershipPrivilege 2160 takeown.exe Token: SeTakeOwnershipPrivilege 2496 takeown.exe Token: SeTakeOwnershipPrivilege 676 takeown.exe Token: SeTakeOwnershipPrivilege 2824 takeown.exe Token: SeTakeOwnershipPrivilege 5116 takeown.exe Token: SeTakeOwnershipPrivilege 1332 takeown.exe Token: SeTakeOwnershipPrivilege 2720 takeown.exe Token: SeTakeOwnershipPrivilege 1020 takeown.exe Token: 33 908 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 908 AUDIODG.EXE Token: SeTakeOwnershipPrivilege 4864 takeown.exe Token: SeTakeOwnershipPrivilege 3156 takeown.exe Token: SeTakeOwnershipPrivilege 244 takeown.exe Token: SeTakeOwnershipPrivilege 644 takeown.exe Token: SeTakeOwnershipPrivilege 1608 takeown.exe Token: SeTakeOwnershipPrivilege 3012 takeown.exe Token: SeTakeOwnershipPrivilege 4648 takeown.exe Token: SeTakeOwnershipPrivilege 3600 takeown.exe Token: SeTakeOwnershipPrivilege 5000 takeown.exe Token: SeTakeOwnershipPrivilege 1040 takeown.exe Token: SeTakeOwnershipPrivilege 1788 takeown.exe Token: SeTakeOwnershipPrivilege 4916 takeown.exe Token: SeTakeOwnershipPrivilege 3724 takeown.exe Token: SeTakeOwnershipPrivilege 3108 takeown.exe Token: SeTakeOwnershipPrivilege 1984 takeown.exe Token: SeTakeOwnershipPrivilege 3156 takeown.exe Token: SeTakeOwnershipPrivilege 2028 takeown.exe Token: SeTakeOwnershipPrivilege 2336 takeown.exe Token: SeTakeOwnershipPrivilege 488 takeown.exe Token: SeDebugPrivilege 2664 mbrsetup.exe Token: SeTakeOwnershipPrivilege 2968 takeown.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2672 firefox.exe 2672 firefox.exe 2672 firefox.exe 2672 firefox.exe 2672 firefox.exe 2672 firefox.exe 2672 firefox.exe 2672 firefox.exe 2672 firefox.exe 2672 firefox.exe 2672 firefox.exe 2672 firefox.exe 2672 firefox.exe 2672 firefox.exe 2672 firefox.exe 2672 firefox.exe 2672 firefox.exe 2672 firefox.exe 2672 firefox.exe 2672 firefox.exe 2672 firefox.exe 4108 AntivirusPro2017.exe 4108 AntivirusPro2017.exe 4108 AntivirusPro2017.exe 560 Free YouTube Downloader.exe 1412 HappyAntivirus.exe 2360 rhcne3j0ejuu.exe 3220 AgentSvr.exe 3220 AgentSvr.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 560 Free YouTube Downloader.exe 1412 HappyAntivirus.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4108 AntivirusPro2017.exe 4108 AntivirusPro2017.exe 4108 AntivirusPro2017.exe 560 Free YouTube Downloader.exe 1412 HappyAntivirus.exe 2360 rhcne3j0ejuu.exe 3220 AgentSvr.exe 3220 AgentSvr.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe 4748 explorer.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 2672 firefox.exe 2672 firefox.exe 2672 firefox.exe 2672 firefox.exe 4108 AntivirusPro2017.exe 4108 AntivirusPro2017.exe 4536 antivirus-platinum.exe 2360 rhcne3j0ejuu.exe 2360 rhcne3j0ejuu.exe 2360 rhcne3j0ejuu.exe 5112 MiniSearchHost.exe 4748 explorer.exe 4312 StartMenuExperienceHost.exe 3788 SearchHost.exe 4748 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2672 1936 firefox.exe 81 PID 1936 wrote to memory of 2672 1936 firefox.exe 81 PID 1936 wrote to memory of 2672 1936 firefox.exe 81 PID 1936 wrote to memory of 2672 1936 firefox.exe 81 PID 1936 wrote to memory of 2672 1936 firefox.exe 81 PID 1936 wrote to memory of 2672 1936 firefox.exe 81 PID 1936 wrote to memory of 2672 1936 firefox.exe 81 PID 1936 wrote to memory of 2672 1936 firefox.exe 81 PID 1936 wrote to memory of 2672 1936 firefox.exe 81 PID 1936 wrote to memory of 2672 1936 firefox.exe 81 PID 1936 wrote to memory of 2672 1936 firefox.exe 81 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 2772 2672 firefox.exe 82 PID 2672 wrote to memory of 3900 2672 firefox.exe 83 PID 2672 wrote to memory of 3900 2672 firefox.exe 83 PID 2672 wrote to memory of 3900 2672 firefox.exe 83 PID 2672 wrote to memory of 3900 2672 firefox.exe 83 PID 2672 wrote to memory of 3900 2672 firefox.exe 83 PID 2672 wrote to memory of 3900 2672 firefox.exe 83 PID 2672 wrote to memory of 3900 2672 firefox.exe 83 PID 2672 wrote to memory of 3900 2672 firefox.exe 83 -
System policy modification 1 TTPs 8 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mbrsetup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\legalnoticecaption = "ATTENTION!" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\legalnoticetext = "Your PC has been wrecked by Bolbi!" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDrives = "67108863" antivirus-platinum.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System antivirus-platinum.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 484 attrib.exe
Processes
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "http://temp.sh/whzOx/trash_malware.zip"1⤵
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url http://temp.sh/whzOx/trash_malware.zip2⤵
- Checks processor information in registry
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1932 -parentBuildID 20240401114208 -prefsHandle 1860 -prefMapHandle 1852 -prefsLen 27661 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {188d9f22-8f9a-4441-b5a4-b2a5cef059e6} 2672 "\\.\pipe\gecko-crash-server-pipe.2672" gpu3⤵PID:2772
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2348 -parentBuildID 20240401114208 -prefsHandle 2340 -prefMapHandle 2336 -prefsLen 28581 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d03907e1-208a-45c6-a912-de5c9bde3bda} 2672 "\\.\pipe\gecko-crash-server-pipe.2672" socket3⤵
- Checks processor information in registry
PID:3900
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3176 -childID 1 -isForBrowser -prefsHandle 3168 -prefMapHandle 3164 -prefsLen 22746 -prefMapSize 244658 -jsInitHandle 1300 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f31941a0-e184-487e-8fd6-9ccec3af0354} 2672 "\\.\pipe\gecko-crash-server-pipe.2672" tab3⤵PID:1420
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3716 -childID 2 -isForBrowser -prefsHandle 3684 -prefMapHandle 3712 -prefsLen 33071 -prefMapSize 244658 -jsInitHandle 1300 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ecf6c75b-23e1-4e91-b658-d2b1d28c5134} 2672 "\\.\pipe\gecko-crash-server-pipe.2672" tab3⤵PID:1976
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4088 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4208 -prefMapHandle 4164 -prefsLen 33071 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1aa1b097-9554-4e87-88b6-f60a3f3d52d0} 2672 "\\.\pipe\gecko-crash-server-pipe.2672" utility3⤵
- Checks processor information in registry
PID:1684
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5448 -childID 3 -isForBrowser -prefsHandle 5440 -prefMapHandle 4200 -prefsLen 27145 -prefMapSize 244658 -jsInitHandle 1300 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a76c1d98-76cc-4d90-bf9f-eefe50c7f636} 2672 "\\.\pipe\gecko-crash-server-pipe.2672" tab3⤵PID:1072
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5656 -childID 4 -isForBrowser -prefsHandle 5576 -prefMapHandle 5580 -prefsLen 27145 -prefMapSize 244658 -jsInitHandle 1300 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9a5525d1-b1a6-4704-9224-eca011ea872c} 2672 "\\.\pipe\gecko-crash-server-pipe.2672" tab3⤵PID:3320
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5472 -childID 5 -isForBrowser -prefsHandle 5792 -prefMapHandle 5796 -prefsLen 27145 -prefMapSize 244658 -jsInitHandle 1300 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cbe2d532-7170-4ce9-9ee8-a9608c52c936} 2672 "\\.\pipe\gecko-crash-server-pipe.2672" tab3⤵PID:4028
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4424 -childID 6 -isForBrowser -prefsHandle 4272 -prefMapHandle 3416 -prefsLen 27226 -prefMapSize 244658 -jsInitHandle 1300 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3092900e-b80a-4baf-bc7c-d8038de1a48b} 2672 "\\.\pipe\gecko-crash-server-pipe.2672" tab3⤵PID:3352
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4320
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\trash_malware\trash malware\stupidy fuckity malware.bat" "1⤵PID:2884
-
C:\Windows\system32\msg.exemsg * you did a mistake...2⤵PID:3104
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\Zika.exeZika.exe2⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\svchost.exe"C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\svchost.exe" -extract C:\Program Files\7-Zip\7z.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\icons.rc, icongroup,,3⤵
- Executes dropped EXE
PID:2324
-
-
C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\icons.rc, C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\icons.res3⤵
- Executes dropped EXE
PID:3712
-
-
C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\svchost.exe"C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\svchost.exe" -extract C:\Program Files\7-Zip\7zFM.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\icons.rc, icongroup,,3⤵
- Executes dropped EXE
PID:2464
-
-
C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\icons.rc, C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\icons.res3⤵
- Executes dropped EXE
PID:3100
-
-
C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\svchost.exe"C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\svchost.exe" -extract C:\Program Files\7-Zip\7zG.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\icons.rc, icongroup,,3⤵
- Executes dropped EXE
PID:2088
-
-
C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\icons.rc, C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\icons.res3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3376
-
-
C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\svchost.exe"C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\svchost.exe" -extract C:\Program Files\7-Zip\Uninstall.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\icons.rc, icongroup,,3⤵
- Executes dropped EXE
PID:1848
-
-
C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\icons.rc, C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\icons.res3⤵
- Executes dropped EXE
PID:2416
-
-
C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\svchost.exe"C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\svchost.exe" -addoverwrite C:\Program Files\7-Zip\Uninstall.exe", "C:\Program Files\7-Zip\Uninstall.exe, C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\icons.res, icongroup,,3⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1092
-
-
C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\svchost.exe"C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\svchost.exe" -extract C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\icons.rc, icongroup,,3⤵
- Executes dropped EXE
PID:2656
-
-
C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\icons.rc, C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\icons.res3⤵
- Executes dropped EXE
PID:2252
-
-
C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\svchost.exe"C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\svchost.exe" -extract C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\icons.rc, icongroup,,3⤵
- Executes dropped EXE
PID:3576
-
-
C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\icons.rc, C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\icons.res3⤵
- Executes dropped EXE
PID:3080
-
-
C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\svchost.exe"C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\svchost.exe" -extract C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\icons.rc, icongroup,,3⤵
- Executes dropped EXE
PID:1504
-
-
C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\icons.rc, C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\icons.res3⤵
- Executes dropped EXE
PID:4068
-
-
C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\svchost.exe"C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\svchost.exe" -extract C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\icons.rc, icongroup,,3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3632
-
-
C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\icons.rc, C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\icons.res3⤵
- Executes dropped EXE
PID:3704
-
-
C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\svchost.exe"C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\svchost.exe" -extract C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\icons.rc, icongroup,,3⤵
- Executes dropped EXE
PID:4280
-
-
C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\icons.rc, C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\icons.res3⤵
- Executes dropped EXE
PID:3016
-
-
C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\svchost.exe"C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\svchost.exe" -extract C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\icons.rc, icongroup,,3⤵
- Executes dropped EXE
PID:760
-
-
C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\icons.rc, C:\Users\Admin\AppData\Local\Temp\a055e5896586452b8fec4ce17d254979\icons.res3⤵
- Executes dropped EXE
PID:4864
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\trash_malware\trash malware\Bolbi.vbs"2⤵PID:3924
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" "C:\Users\Admin\Downloads\trash_malware\trash malware\Bolbi.vbs" /elevated3⤵
- Drops file in Windows directory
- Modifies Control Panel
- System policy modification
PID:2240
-
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\IconDance.exeIconDance.exe2⤵PID:4500
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\Illerka.C.exeIllerka.C.exe2⤵
- UAC bypass
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\FreeYoutubeDownloader.exeFreeYoutubeDownloader.exe2⤵
- Adds Run key to start application
- Drops file in Windows directory
PID:3696 -
C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe"C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:560
-
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\XPAntivirus2008.exeXPAntivirus2008.exe2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
PID:2496 -
C:\Windows\SysWOW64\wscript.exewscript //B C:\Users\Admin\AppData\Local\Temp\pin.vbs "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Antivirus XP 2008" "Antivirus XP 2008.lnk"3⤵PID:1984
-
-
C:\Windows\SysWOW64\wscript.exewscript //B C:\Users\Admin\AppData\Local\Temp\pin.vbs "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Antivirus XP 2008" "Register Antivirus XP 2008.lnk"3⤵PID:5064
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c pbae.bat "C:\Users\Admin\Downloads\trash_malware\trash malware\XPAntivirus2008.exe"3⤵PID:2636
-
-
C:\Program Files (x86)\rhcne3j0ejuu\rhcne3j0ejuu.exe"C:\Program Files (x86)\rhcne3j0ejuu\rhcne3j0ejuu.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2360 -
C:\Windows\SysWOW64\pphcje3j0ejuu.exe"C:\Windows\system32\pphcje3j0ejuu.exe"4⤵
- Executes dropped EXE
PID:4604
-
-
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\AntivirusPro2017.exeAntivirusPro2017.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4108
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\HappyAntivirus.exeHappyAntivirus.exe2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1412
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\AntivirusPlatinum.exeAntivirusPlatinum.exe2⤵
- Drops file in Windows directory
PID:4260 -
C:\WINDOWS\302746537.exe"C:\WINDOWS\302746537.exe"3⤵
- Executes dropped EXE
PID:3708 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2DFE.tmp\302746537.bat" "4⤵PID:3572
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s c:\windows\comctl32.ocx5⤵
- Loads dropped DLL
- Modifies registry class
PID:2272
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s c:\windows\mscomctl.ocx5⤵
- Loads dropped DLL
- Modifies registry class
PID:2688
-
-
\??\c:\windows\antivirus-platinum.exec:\windows\antivirus-platinum.exe5⤵
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4536
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h c:\windows\antivirus-platinum.exe5⤵
- Drops file in Windows directory
- Views/modifies file attributes
PID:484
-
-
-
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\icons.exeicons.exe2⤵PID:1860
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\Bonzify.exeBonzify.exe2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:3556 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\KillAgent.bat"3⤵PID:5052
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im AgentSvr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1400
-
-
C:\Windows\SysWOW64\takeown.exetakeown /r /d y /f C:\Windows\MsAgent4⤵PID:2484
-
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\MsAgent /c /t /grant "everyone":(f)4⤵PID:1020
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-scripting_31bf3856ad364e35_10.0.22000.194_none_4dda7ffaba1d5c31\f\cscript.exe"3⤵PID:2280
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-scripting_31bf3856ad364e35_10.0.22000.194_none_4dda7ffaba1d5c31\f\cscript.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5032
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-scripting_31bf3856ad364e35_10.0.22000.194_none_4dda7ffaba1d5c31\f\cscript.exe" /grant "everyone":(f)4⤵PID:4336
-
-
-
C:\Users\Admin\AppData\Local\Temp\INSTALLER.exeINSTALLER.exe /q3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:3332 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\AgentCtl.dll"4⤵
- Loads dropped DLL
- Modifies registry class
PID:4152
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\AgentDPv.dll"4⤵
- Loads dropped DLL
- Modifies registry class
PID:1520
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\mslwvtts.dll"4⤵
- Loads dropped DLL
- Modifies registry class
PID:1788
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\AgentDP2.dll"4⤵
- Loads dropped DLL
PID:1676
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\AgentMPx.dll"4⤵
- Loads dropped DLL
- Modifies registry class
PID:5000
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\AgentSR.dll"4⤵
- Loads dropped DLL
PID:1780
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\AgentPsh.dll"4⤵
- Loads dropped DLL
- Modifies registry class
PID:3708
-
-
C:\Windows\msagent\AgentSvr.exe"C:\Windows\msagent\AgentSvr.exe" /regserver4⤵
- Executes dropped EXE
- Modifies registry class
PID:4080
-
-
C:\Windows\SysWOW64\grpconv.exegrpconv.exe -o4⤵PID:800
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-scripting_31bf3856ad364e35_10.0.22000.194_none_4dda7ffaba1d5c31\f\wscript.exe"3⤵PID:2900
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-scripting_31bf3856ad364e35_10.0.22000.194_none_4dda7ffaba1d5c31\f\wscript.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4744
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-scripting_31bf3856ad364e35_10.0.22000.194_none_4dda7ffaba1d5c31\f\wscript.exe" /grant "everyone":(f)4⤵PID:1548
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-security-tokenbroker_31bf3856ad364e35_10.0.22000.282_none_a92d755764592be1\f\TokenBrokerCookies.exe"3⤵PID:1532
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-security-tokenbroker_31bf3856ad364e35_10.0.22000.282_none_a92d755764592be1\f\TokenBrokerCookies.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-security-tokenbroker_31bf3856ad364e35_10.0.22000.282_none_a92d755764592be1\f\TokenBrokerCookies.exe" /grant "everyone":(f)4⤵PID:1040
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-setupapi_31bf3856ad364e35_10.0.22000.469_none_3a8cfd7d7fe46760\f\wowreg32.exe"3⤵PID:3544
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-setupapi_31bf3856ad364e35_10.0.22000.469_none_3a8cfd7d7fe46760\f\wowreg32.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5076
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-setupapi_31bf3856ad364e35_10.0.22000.469_none_3a8cfd7d7fe46760\f\wowreg32.exe" /grant "everyone":(f)4⤵PID:1872
-
-
-
C:\Users\Admin\AppData\Local\Temp\INSTALLER.exeINSTALLER.exe /q3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
PID:2260 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s C:\Windows\lhsp\tv\tv_enua.dll4⤵
- Loads dropped DLL
PID:5096
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s C:\Windows\lhsp\tv\tvenuax.dll4⤵
- Loads dropped DLL
PID:1712
-
-
C:\Windows\SysWOW64\grpconv.exegrpconv.exe -o4⤵PID:4120
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-speechcommon-onecore_31bf3856ad364e35_10.0.22000.348_none_790557e9d75b5a9c\f\SpeechModelDownload.exe"3⤵PID:1896
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-speechcommon-onecore_31bf3856ad364e35_10.0.22000.348_none_790557e9d75b5a9c\f\SpeechModelDownload.exe"4⤵
- Possible privilege escalation attempt
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-speechcommon-onecore_31bf3856ad364e35_10.0.22000.348_none_790557e9d75b5a9c\f\SpeechModelDownload.exe" /grant "everyone":(f)4⤵PID:2920
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-t..minalservicesclient_31bf3856ad364e35_10.0.22000.282_none_53574bb7dad4a93c\f\mstsc.exe"3⤵PID:484
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-t..minalservicesclient_31bf3856ad364e35_10.0.22000.282_none_53574bb7dad4a93c\f\mstsc.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4740
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-t..minalservicesclient_31bf3856ad364e35_10.0.22000.282_none_53574bb7dad4a93c\f\mstsc.exe" /grant "everyone":(f)4⤵PID:5112
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-t..sionagent-uachelper_31bf3856ad364e35_10.0.22000.120_none_c073b3a01f4d4399\f\RdpSaUacHelper.exe"3⤵PID:676
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-t..sionagent-uachelper_31bf3856ad364e35_10.0.22000.120_none_c073b3a01f4d4399\f\RdpSaUacHelper.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1420
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-t..sionagent-uachelper_31bf3856ad364e35_10.0.22000.120_none_c073b3a01f4d4399\f\RdpSaUacHelper.exe" /grant "everyone":(f)4⤵PID:4908
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-tpm-tool_31bf3856ad364e35_10.0.22000.282_none_03b4c900a639c980\f\TpmTool.exe"3⤵PID:232
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-tpm-tool_31bf3856ad364e35_10.0.22000.282_none_03b4c900a639c980\f\TpmTool.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1080
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-tpm-tool_31bf3856ad364e35_10.0.22000.282_none_03b4c900a639c980\f\TpmTool.exe" /grant "everyone":(f)4⤵PID:2276
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-twinui_31bf3856ad364e35_10.0.22000.493_none_7918a9fd73257276\f\LaunchWinApp.exe"3⤵PID:4760
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-twinui_31bf3856ad364e35_10.0.22000.493_none_7918a9fd73257276\f\LaunchWinApp.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-twinui_31bf3856ad364e35_10.0.22000.493_none_7918a9fd73257276\f\LaunchWinApp.exe" /grant "everyone":(f)4⤵PID:2464
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-u..etry-client-wowonly_31bf3856ad364e35_10.0.22000.318_none_92049afacb4417d8\f\dtdump.exe"3⤵PID:2172
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-u..etry-client-wowonly_31bf3856ad364e35_10.0.22000.318_none_92049afacb4417d8\f\dtdump.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2324
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-u..etry-client-wowonly_31bf3856ad364e35_10.0.22000.318_none_92049afacb4417d8\f\dtdump.exe" /grant "everyone":(f)4⤵
- Possible privilege escalation attempt
PID:3900
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-userinit_31bf3856ad364e35_10.0.22000.37_none_c87c050022130145\f\userinit.exe"3⤵PID:3688
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-userinit_31bf3856ad364e35_10.0.22000.37_none_c87c050022130145\f\userinit.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:764
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-userinit_31bf3856ad364e35_10.0.22000.37_none_c87c050022130145\f\userinit.exe" /grant "everyone":(f)4⤵PID:1376
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-w..for-management-core_31bf3856ad364e35_10.0.22000.282_none_cfe0738266c4e593\f\WSManHTTPConfig.exe"3⤵PID:576
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-w..for-management-core_31bf3856ad364e35_10.0.22000.282_none_cfe0738266c4e593\f\WSManHTTPConfig.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4296
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-w..for-management-core_31bf3856ad364e35_10.0.22000.282_none_cfe0738266c4e593\f\WSManHTTPConfig.exe" /grant "everyone":(f)4⤵PID:4892
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-w..for-management-core_31bf3856ad364e35_10.0.22000.282_none_cfe0738266c4e593\f\wsmprovhost.exe"3⤵PID:124
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-w..for-management-core_31bf3856ad364e35_10.0.22000.282_none_cfe0738266c4e593\f\wsmprovhost.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3352
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-w..for-management-core_31bf3856ad364e35_10.0.22000.282_none_cfe0738266c4e593\f\wsmprovhost.exe" /grant "everyone":(f)4⤵PID:3576
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-wrp-integrity-client_31bf3856ad364e35_10.0.22000.120_none_30f8a86da4d47388\f\sfc.exe"3⤵PID:1072
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-wrp-integrity-client_31bf3856ad364e35_10.0.22000.120_none_30f8a86da4d47388\f\sfc.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4816
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_microsoft-windows-wrp-integrity-client_31bf3856ad364e35_10.0.22000.120_none_30f8a86da4d47388\f\sfc.exe" /grant "everyone":(f)4⤵PID:4280
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_networking-mpssvc-netsh_31bf3856ad364e35_10.0.22000.434_none_b4a3a74a80427a96\f\CheckNetIsolation.exe"3⤵PID:3016
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_networking-mpssvc-netsh_31bf3856ad364e35_10.0.22000.434_none_b4a3a74a80427a96\f\CheckNetIsolation.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3156
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_networking-mpssvc-netsh_31bf3856ad364e35_10.0.22000.434_none_b4a3a74a80427a96\f\CheckNetIsolation.exe" /grant "everyone":(f)4⤵PID:1620
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_product-containeros__windowssearchengine_31bf3856ad364e35_7.0.22000.348_none_2b1b00237ae1bbca\f\SearchFilterHost.exe"3⤵PID:276
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_product-containeros__windowssearchengine_31bf3856ad364e35_7.0.22000.348_none_2b1b00237ae1bbca\f\SearchFilterHost.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4072
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_product-containeros__windowssearchengine_31bf3856ad364e35_7.0.22000.348_none_2b1b00237ae1bbca\f\SearchFilterHost.exe" /grant "everyone":(f)4⤵PID:2028
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_product-containeros__windowssearchengine_31bf3856ad364e35_7.0.22000.348_none_2b1b00237ae1bbca\f\SearchIndexer.exe"3⤵PID:2000
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_product-containeros__windowssearchengine_31bf3856ad364e35_7.0.22000.348_none_2b1b00237ae1bbca\f\SearchIndexer.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_product-containeros__windowssearchengine_31bf3856ad364e35_7.0.22000.348_none_2b1b00237ae1bbca\f\SearchIndexer.exe" /grant "everyone":(f)4⤵PID:3112
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_product-containeros__windowssearchengine_31bf3856ad364e35_7.0.22000.348_none_2b1b00237ae1bbca\f\SearchProtocolHost.exe"3⤵PID:2760
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_product-containeros__windowssearchengine_31bf3856ad364e35_7.0.22000.348_none_2b1b00237ae1bbca\f\SearchProtocolHost.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4992
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_product-containeros__windowssearchengine_31bf3856ad364e35_7.0.22000.348_none_2b1b00237ae1bbca\f\SearchProtocolHost.exe" /grant "everyone":(f)4⤵PID:5032
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_windowssearchengine_31bf3856ad364e35_7.0.22000.348_none_5f6e7d4cbd14f8f7\f\SearchFilterHost.exe"3⤵PID:2716
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_windowssearchengine_31bf3856ad364e35_7.0.22000.348_none_5f6e7d4cbd14f8f7\f\SearchFilterHost.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4152
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_windowssearchengine_31bf3856ad364e35_7.0.22000.348_none_5f6e7d4cbd14f8f7\f\SearchFilterHost.exe" /grant "everyone":(f)4⤵PID:3796
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_windowssearchengine_31bf3856ad364e35_7.0.22000.348_none_5f6e7d4cbd14f8f7\f\SearchIndexer.exe"3⤵PID:1640
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_windowssearchengine_31bf3856ad364e35_7.0.22000.348_none_5f6e7d4cbd14f8f7\f\SearchIndexer.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1128
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_windowssearchengine_31bf3856ad364e35_7.0.22000.348_none_5f6e7d4cbd14f8f7\f\SearchIndexer.exe" /grant "everyone":(f)4⤵PID:2280
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_windowssearchengine_31bf3856ad364e35_7.0.22000.348_none_5f6e7d4cbd14f8f7\f\SearchProtocolHost.exe"3⤵PID:4652
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_windowssearchengine_31bf3856ad364e35_7.0.22000.348_none_5f6e7d4cbd14f8f7\f\SearchProtocolHost.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2160
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\wow64_windowssearchengine_31bf3856ad364e35_7.0.22000.348_none_5f6e7d4cbd14f8f7\f\SearchProtocolHost.exe" /grant "everyone":(f)4⤵PID:3712
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\x86_microsoft-windows-bootenvironment-pxe_31bf3856ad364e35_10.0.22000.434_none_8c92a0565e9eec19\f\bootmgr.exe"3⤵PID:3036
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\x86_microsoft-windows-bootenvironment-pxe_31bf3856ad364e35_10.0.22000.434_none_8c92a0565e9eec19\f\bootmgr.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2496
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\x86_microsoft-windows-bootenvironment-pxe_31bf3856ad364e35_10.0.22000.434_none_8c92a0565e9eec19\f\bootmgr.exe" /grant "everyone":(f)4⤵PID:4744
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\x86_microsoft-windows-d..-commandline-dsdiag_31bf3856ad364e35_10.0.22000.434_none_eb6ed0d1cadda675\f\dcdiag.exe"3⤵PID:900
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\x86_microsoft-windows-d..-commandline-dsdiag_31bf3856ad364e35_10.0.22000.434_none_eb6ed0d1cadda675\f\dcdiag.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:676
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\x86_microsoft-windows-d..-commandline-dsdiag_31bf3856ad364e35_10.0.22000.434_none_eb6ed0d1cadda675\f\dcdiag.exe" /grant "everyone":(f)4⤵PID:408
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\x86_microsoft-windows-d..-commandline-dsmgmt_31bf3856ad364e35_10.0.22000.434_none_ea163a1fcbc61cc7\f\dsmgmt.exe"3⤵PID:652
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\x86_microsoft-windows-d..-commandline-dsmgmt_31bf3856ad364e35_10.0.22000.434_none_ea163a1fcbc61cc7\f\dsmgmt.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\x86_microsoft-windows-d..-commandline-dsmgmt_31bf3856ad364e35_10.0.22000.434_none_ea163a1fcbc61cc7\f\dsmgmt.exe" /grant "everyone":(f)4⤵PID:4764
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\x86_microsoft-windows-d..ommandline-repadmin_31bf3856ad364e35_10.0.22000.434_none_a003f3391feff8a5\f\repadmin.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1156 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\x86_microsoft-windows-d..ommandline-repadmin_31bf3856ad364e35_10.0.22000.434_none_a003f3391feff8a5\f\repadmin.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\x86_microsoft-windows-d..ommandline-repadmin_31bf3856ad364e35_10.0.22000.434_none_a003f3391feff8a5\f\repadmin.exe" /grant "everyone":(f)4⤵
- Modifies file permissions
PID:3480
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\x86_microsoft-windows-packagemanager_31bf3856ad364e35_10.0.22000.120_none_8c1e5976c0145439\f\PkgMgr.exe"3⤵PID:5076
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\x86_microsoft-windows-packagemanager_31bf3856ad364e35_10.0.22000.120_none_8c1e5976c0145439\f\PkgMgr.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1332
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\x86_microsoft-windows-packagemanager_31bf3856ad364e35_10.0.22000.120_none_8c1e5976c0145439\f\PkgMgr.exe" /grant "everyone":(f)4⤵PID:716
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\x86_microsoft-windows-s..or-native-serverbox_31bf3856ad364e35_10.0.22000.120_none_0f0554e930e1de1c\f\RMActivate_ssp.exe"3⤵PID:1556
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\x86_microsoft-windows-s..or-native-serverbox_31bf3856ad364e35_10.0.22000.120_none_0f0554e930e1de1c\f\RMActivate_ssp.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~22000.493.1.3\x86_microsoft-windows-s..or-native-serverbox_31bf3856ad364e35_10.0.22000.120_none_0f0554e930e1de1c\f\RMActivate_ssp.exe" /grant "everyone":(f)4⤵PID:3360
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\servicing\TrustedInstaller.exe"3⤵PID:4920
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\servicing\TrustedInstaller.exe"4⤵
- Possible privilege escalation attempt
- Suspicious use of AdjustPrivilegeToken
PID:1020
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\servicing\TrustedInstaller.exe" /grant "everyone":(f)4⤵PID:4296
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\Speech\Common\sapisvr.exe"3⤵PID:2616
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\Speech\Common\sapisvr.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4864
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\Speech\Common\sapisvr.exe" /grant "everyone":(f)4⤵PID:4016
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\splwow64.exe"3⤵PID:1072
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\splwow64.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3156
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\splwow64.exe" /grant "everyone":(f)4⤵PID:1596
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\sysmon.exe"3⤵PID:3016
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\sysmon.exe"4⤵PID:2508
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\sysmon.exe" /grant "everyone":(f)4⤵PID:4712
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\agentactivationruntimestarter.exe"3⤵PID:2484
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\agentactivationruntimestarter.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:244
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\agentactivationruntimestarter.exe" /grant "everyone":(f)4⤵PID:4868
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\appidtel.exe"3⤵PID:1824
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\appidtel.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:644
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\appidtel.exe" /grant "everyone":(f)4⤵PID:5032
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\ARP.EXE"3⤵PID:3056
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\ARP.EXE"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1608
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\ARP.EXE" /grant "everyone":(f)4⤵PID:3796
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\at.exe"3⤵PID:2688
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\at.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\at.exe" /grant "everyone":(f)4⤵PID:2280
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\AtBroker.exe"3⤵PID:4320
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\AtBroker.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4648
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\AtBroker.exe" /grant "everyone":(f)4⤵PID:2656
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\attrib.exe"3⤵PID:4748
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\attrib.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3600
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\attrib.exe" /grant "everyone":(f)4⤵PID:1776
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\auditpol.exe"3⤵PID:2968
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:3036
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\auditpol.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5000
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\auditpol.exe" /grant "everyone":(f)4⤵PID:408
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\autochk.exe"3⤵PID:1760
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:900
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\autochk.exe"4⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1040
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\autochk.exe" /grant "everyone":(f)4⤵PID:1144
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\backgroundTaskHost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1532 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\backgroundTaskHost.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1788
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\backgroundTaskHost.exe" /grant "everyone":(f)4⤵PID:3480
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\BackgroundTransferHost.exe"3⤵PID:1044
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\BackgroundTransferHost.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4916
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\BackgroundTransferHost.exe" /grant "everyone":(f)4⤵PID:716
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\bitsadmin.exe"3⤵PID:2324
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\bitsadmin.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3724
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\bitsadmin.exe" /grant "everyone":(f)4⤵PID:764
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\bthudtask.exe"3⤵PID:4000
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\bthudtask.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3108
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\bthudtask.exe" /grant "everyone":(f)4⤵PID:1872
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\ByteCodeGenerator.exe"3⤵PID:8
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\ByteCodeGenerator.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1984
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\ByteCodeGenerator.exe" /grant "everyone":(f)4⤵PID:396
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\cacls.exe"3⤵PID:1848
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\cacls.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3156
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\cacls.exe" /grant "everyone":(f)4⤵PID:2836
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\calc.exe"3⤵PID:1072
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\calc.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\calc.exe" /grant "everyone":(f)4⤵PID:4072
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\CameraSettingsUIHost.exe"3⤵PID:1644
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\CameraSettingsUIHost.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2336
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\CameraSettingsUIHost.exe" /grant "everyone":(f)4⤵PID:2784
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\CertEnrollCtrl.exe"3⤵PID:644
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\CertEnrollCtrl.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:488
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\CertEnrollCtrl.exe" /grant "everyone":(f)4⤵PID:2352
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\certreq.exe"3⤵PID:4260
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\certreq.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\certreq.exe" /grant "everyone":(f)4⤵PID:800
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\certutil.exe"3⤵PID:1760
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\certutil.exe"4⤵PID:2764
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\certutil.exe" /grant "everyone":(f)4⤵PID:4496
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\charmap.exe"3⤵PID:2900
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:1044
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\charmap.exe"4⤵PID:764
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\charmap.exe" /grant "everyone":(f)4⤵PID:1020
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\CheckNetIsolation.exe"3⤵PID:1872
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\CheckNetIsolation.exe"4⤵PID:4816
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\CheckNetIsolation.exe" /grant "everyone":(f)4⤵PID:3680
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\chkdsk.exe"3⤵PID:2836
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\chkdsk.exe"4⤵
- Modifies file permissions
PID:1960
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\chkdsk.exe" /grant "everyone":(f)4⤵PID:404
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\chkntfs.exe"3⤵PID:5092
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\chkntfs.exe"4⤵PID:1504
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\chkntfs.exe" /grant "everyone":(f)4⤵PID:2336
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\choice.exe"3⤵PID:3004
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\choice.exe"4⤵PID:1820
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\choice.exe" /grant "everyone":(f)4⤵PID:3112
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\cipher.exe"3⤵PID:4592
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:1608
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\cipher.exe"4⤵PID:3252
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\cipher.exe" /grant "everyone":(f)4⤵PID:228
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\cleanmgr.exe"3⤵PID:1824
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\cleanmgr.exe"4⤵PID:4628
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\cleanmgr.exe" /grant "everyone":(f)4⤵PID:3648
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\cliconfg.exe"3⤵PID:2752
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\cliconfg.exe"4⤵PID:4652
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\cliconfg.exe" /grant "everyone":(f)4⤵
- Modifies file permissions
PID:3008
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\clip.exe"3⤵PID:4748
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\clip.exe"4⤵PID:2804
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\clip.exe" /grant "everyone":(f)4⤵PID:408
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\CloudNotifications.exe"3⤵PID:3052
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4908
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\CloudNotifications.exe"4⤵PID:232
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\CloudNotifications.exe" /grant "everyone":(f)4⤵PID:1040
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\cmd.exe"3⤵PID:3632
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\cmd.exe"4⤵PID:2968
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\cmd.exe" /grant "everyone":(f)4⤵PID:800
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\cmdkey.exe"3⤵PID:2724
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\cmdkey.exe"4⤵PID:128
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\cmdkey.exe" /grant "everyone":(f)4⤵PID:4464
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\cmdl32.exe"3⤵PID:2196
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4760
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\cmdl32.exe"4⤵
- System Location Discovery: System Language Discovery
PID:1780
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\cmdl32.exe" /grant "everyone":(f)4⤵PID:3784
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\cmmon32.exe"3⤵PID:576
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:3108
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\cmmon32.exe"4⤵PID:2720
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\cmmon32.exe" /grant "everyone":(f)4⤵PID:112
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\cmstp.exe"3⤵PID:8
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\cmstp.exe"4⤵PID:400
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\cmstp.exe" /grant "everyone":(f)4⤵PID:3576
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\colorcpl.exe"3⤵PID:3704
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\colorcpl.exe"4⤵
- Modifies file permissions
PID:2028
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\colorcpl.exe" /grant "everyone":(f)4⤵PID:2776
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\Com\comrepl.exe"3⤵PID:4340
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\Com\comrepl.exe"4⤵
- Modifies file permissions
PID:2188
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\Com\comrepl.exe" /grant "everyone":(f)4⤵PID:2484
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\Com\MigRegDB.exe"3⤵PID:2508
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\Com\MigRegDB.exe"4⤵PID:3080
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\Com\MigRegDB.exe" /grant "everyone":(f)4⤵PID:4612
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\comp.exe"3⤵PID:3156
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\comp.exe"4⤵PID:276
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\comp.exe" /grant "everyone":(f)4⤵PID:2956
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\compact.exe"3⤵PID:3004
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\compact.exe"4⤵PID:2760
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\compact.exe" /grant "everyone":(f)4⤵PID:4856
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\ComputerDefaults.exe"3⤵PID:2868
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\ComputerDefaults.exe"4⤵PID:3932
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\ComputerDefaults.exe" /grant "everyone":(f)4⤵PID:3648
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\control.exe"3⤵PID:4880
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:1824
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\control.exe"4⤵PID:5032
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\control.exe" /grant "everyone":(f)4⤵PID:4188
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\convert.exe"3⤵PID:4652
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\convert.exe"4⤵PID:484
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\convert.exe" /grant "everyone":(f)4⤵PID:2876
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\CredentialUIBroker.exe"3⤵PID:2436
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\CredentialUIBroker.exe"4⤵PID:3456
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\CredentialUIBroker.exe" /grant "everyone":(f)4⤵PID:1924
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\credwiz.exe"3⤵PID:4740
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\credwiz.exe"4⤵PID:4648
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\credwiz.exe" /grant "everyone":(f)4⤵PID:1156
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\cscript.exe"3⤵PID:1384
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4080
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\cscript.exe"4⤵PID:3708
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\cscript.exe" /grant "everyone":(f)4⤵PID:764
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\ctfmon.exe"3⤵PID:1760
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\ctfmon.exe"4⤵PID:1020
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\ctfmon.exe" /grant "everyone":(f)4⤵PID:2720
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\cttune.exe"3⤵PID:4016
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:2900
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\cttune.exe"4⤵PID:1376
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\cttune.exe" /grant "everyone":(f)4⤵PID:400
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\cttunesvr.exe"3⤵PID:4948
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:3576
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\cttunesvr.exe"4⤵PID:716
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\cttunesvr.exe" /grant "everyone":(f)4⤵PID:1960
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\curl.exe"3⤵PID:4072
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:2776
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\curl.exe"4⤵PID:4000
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\curl.exe" /grant "everyone":(f)4⤵PID:1984
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\dccw.exe"3⤵PID:2188
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:2336
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\dccw.exe"4⤵PID:1688
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\dccw.exe" /grant "everyone":(f)4⤵PID:1400
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\dcomcnfg.exe"3⤵PID:4920
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\dcomcnfg.exe"4⤵PID:2508
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\dcomcnfg.exe" /grant "everyone":(f)4⤵PID:4808
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\ddodiag.exe"3⤵PID:3112
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\ddodiag.exe"4⤵PID:3728
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\ddodiag.exe" /grant "everyone":(f)4⤵PID:1936
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\DevicePairingWizard.exe"3⤵PID:3252
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\DevicePairingWizard.exe"4⤵PID:244
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\DevicePairingWizard.exe" /grant "everyone":(f)4⤵PID:4132
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\dfrgui.exe"3⤵PID:1592
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\dfrgui.exe"4⤵PID:2244
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\dfrgui.exe" /grant "everyone":(f)4⤵PID:4992
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\dialer.exe"3⤵PID:4592
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\dialer.exe"4⤵PID:2688
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\dialer.exe" /grant "everyone":(f)4⤵PID:2656
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\diskpart.exe"3⤵PID:484
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\diskpart.exe"4⤵PID:4652
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\diskpart.exe" /grant "everyone":(f)4⤵PID:1240
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\diskperf.exe"3⤵PID:3700
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\diskperf.exe"4⤵PID:4564
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\diskperf.exe" /grant "everyone":(f)4⤵PID:1924
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\diskusage.exe"3⤵PID:1008
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\diskusage.exe"4⤵PID:2764
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\diskusage.exe" /grant "everyone":(f)4⤵PID:1156
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\Dism\DismHost.exe"3⤵PID:2920
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\Dism\DismHost.exe"4⤵PID:2324
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\Dism\DismHost.exe" /grant "everyone":(f)4⤵PID:764
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\Dism.exe"3⤵PID:2260
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:1384
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\Dism.exe"4⤵PID:1812
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\Dism.exe" /grant "everyone":(f)4⤵PID:760
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\dllhost.exe"3⤵PID:2608
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\dllhost.exe"4⤵PID:2376
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\dllhost.exe" /grant "everyone":(f)4⤵PID:3680
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\dllhst3g.exe"3⤵PID:1332
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\dllhst3g.exe"4⤵PID:1872
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\dllhst3g.exe" /grant "everyone":(f)4⤵PID:1960
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\doskey.exe"3⤵PID:2464
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4948
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\doskey.exe"4⤵PID:2276
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\doskey.exe" /grant "everyone":(f)4⤵PID:1984
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\dpapimig.exe"3⤵PID:2420
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\dpapimig.exe"4⤵PID:4104
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\dpapimig.exe" /grant "everyone":(f)4⤵PID:3412
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\DpiScaling.exe"3⤵PID:4704
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\DpiScaling.exe"4⤵PID:5068
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\DpiScaling.exe" /grant "everyone":(f)4⤵PID:2020
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\dplaysvr.exe"3⤵PID:4920
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\dplaysvr.exe"4⤵PID:2884
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\dplaysvr.exe" /grant "everyone":(f)4⤵PID:3136
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\dpnsvr.exe"3⤵PID:5016
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\dpnsvr.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4132
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\dpnsvr.exe" /grant "everyone":(f)4⤵PID:3252
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\driverquery.exe"3⤵PID:228
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\driverquery.exe"4⤵PID:3056
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\driverquery.exe" /grant "everyone":(f)4⤵PID:4152
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\dtdump.exe"3⤵PID:4628
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4880
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\dtdump.exe"4⤵PID:4708
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\dtdump.exe" /grant "everyone":(f)4⤵PID:2352
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\dvdplay.exe"3⤵PID:4188
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\dvdplay.exe"4⤵
- Possible privilege escalation attempt
PID:4320
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\dvdplay.exe" /grant "everyone":(f)4⤵PID:484
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\DWWIN.EXE"3⤵PID:2876
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\DWWIN.EXE"4⤵PID:1924
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\DWWIN.EXE" /grant "everyone":(f)4⤵PID:2632
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\dxdiag.exe"3⤵PID:856
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\dxdiag.exe"4⤵PID:1156
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\dxdiag.exe" /grant "everyone":(f)4⤵PID:2700
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\EaseOfAccessDialog.exe"3⤵PID:4932
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\EaseOfAccessDialog.exe"4⤵PID:764
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\EaseOfAccessDialog.exe" /grant "everyone":(f)4⤵PID:1032
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\edpnotify.exe"3⤵PID:5056
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4740
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\edpnotify.exe"4⤵PID:5116
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\edpnotify.exe" /grant "everyone":(f)4⤵PID:4068
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\efsui.exe"3⤵PID:688
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:1760
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\efsui.exe"4⤵PID:3680
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\efsui.exe" /grant "everyone":(f)4⤵PID:2608
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\EhStorAuthn.exe"3⤵PID:864
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\EhStorAuthn.exe"4⤵PID:3688
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\EhStorAuthn.exe" /grant "everyone":(f)4⤵PID:1872
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\esentutl.exe"3⤵PID:1960
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\esentutl.exe"4⤵PID:1332
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\esentutl.exe" /grant "everyone":(f)4⤵PID:2276
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\eudcedit.exe"3⤵PID:4892
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\eudcedit.exe"4⤵PID:8
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\eudcedit.exe" /grant "everyone":(f)4⤵PID:1340
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\eventcreate.exe"3⤵PID:2616
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\eventcreate.exe"4⤵PID:4072
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\eventcreate.exe" /grant "everyone":(f)4⤵PID:5068
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\eventvwr.exe"3⤵PID:2020
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:2508
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\eventvwr.exe"4⤵PID:4612
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\eventvwr.exe" /grant "everyone":(f)4⤵PID:5104
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\expand.exe"3⤵PID:3136
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\expand.exe"4⤵PID:5092
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\expand.exe" /grant "everyone":(f)4⤵PID:4132
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\explorer.exe"3⤵PID:3252
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\explorer.exe"4⤵PID:2760
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\explorer.exe" /grant "everyone":(f)4⤵PID:1592
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\extrac32.exe"3⤵PID:1196
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\extrac32.exe"4⤵PID:2968
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\extrac32.exe" /grant "everyone":(f)4⤵PID:3140
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\F12\IEChooser.exe"3⤵PID:2280
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\F12\IEChooser.exe"4⤵PID:4628
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\F12\IEChooser.exe" /grant "everyone":(f)4⤵PID:248
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\fc.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1996 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\fc.exe"4⤵PID:4652
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\fc.exe" /grant "everyone":(f)4⤵PID:3248
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\find.exe"3⤵PID:3552
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\find.exe"4⤵PID:1776
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\find.exe" /grant "everyone":(f)4⤵PID:2804
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\findstr.exe"3⤵PID:2128
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:1520
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\findstr.exe"4⤵PID:2764
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\findstr.exe" /grant "everyone":(f)4⤵PID:2224
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\finger.exe"3⤵PID:3900
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\finger.exe"4⤵PID:3796
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\finger.exe" /grant "everyone":(f)4⤵PID:4748
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\fixmapi.exe"3⤵PID:1420
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\fixmapi.exe"4⤵PID:2260
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\fixmapi.exe" /grant "everyone":(f)4⤵PID:1020
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\fltMC.exe"3⤵PID:2472
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\fltMC.exe"4⤵PID:2888
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\fltMC.exe" /grant "everyone":(f)4⤵PID:4816
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\Fondue.exe"3⤵PID:688
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:400
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\Fondue.exe"4⤵PID:4916
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\Fondue.exe" /grant "everyone":(f)4⤵
- Modifies file permissions
PID:3688
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\fontview.exe"3⤵PID:3744
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\fontview.exe"4⤵PID:1504
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\fontview.exe" /grant "everyone":(f)4⤵PID:1332
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\forfiles.exe"3⤵PID:4016
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\forfiles.exe"4⤵PID:1340
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\forfiles.exe" /grant "everyone":(f)4⤵PID:8
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\fsquirt.exe"3⤵PID:4000
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4892
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\fsquirt.exe"4⤵PID:4072
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\fsquirt.exe" /grant "everyone":(f)4⤵PID:5068
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\fsutil.exe"3⤵PID:2420
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:2616
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\fsutil.exe"4⤵PID:776
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\fsutil.exe" /grant "everyone":(f)4⤵PID:5104
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\ftp.exe"3⤵PID:2020
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\ftp.exe"4⤵PID:4856
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\ftp.exe" /grant "everyone":(f)4⤵PID:1596
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\GameBarPresenceWriter.exe"3⤵PID:4920
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\GameBarPresenceWriter.exe"4⤵PID:2760
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\GameBarPresenceWriter.exe" /grant "everyone":(f)4⤵PID:4992
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\GamePanel.exe"3⤵PID:3580
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:244
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\GamePanel.exe"4⤵PID:3140
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\GamePanel.exe" /grant "everyone":(f)4⤵PID:3812
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\getmac.exe"3⤵PID:2716
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\getmac.exe"4⤵PID:3008
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\getmac.exe" /grant "everyone":(f)4⤵PID:2656
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\gpresult.exe"3⤵PID:2352
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\gpresult.exe"4⤵PID:4188
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\gpresult.exe" /grant "everyone":(f)4⤵PID:1996
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\gpscript.exe"3⤵PID:484
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\gpscript.exe"4⤵PID:408
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\gpscript.exe" /grant "everyone":(f)4⤵PID:2160
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\gpupdate.exe"3⤵PID:4236
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:2436
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\gpupdate.exe"4⤵PID:3632
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\gpupdate.exe" /grant "everyone":(f)4⤵PID:3796
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\grpconv.exe"3⤵PID:112
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\grpconv.exe"4⤵PID:4332
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\grpconv.exe" /grant "everyone":(f)4⤵PID:728
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\hdwwiz.exe"3⤵PID:808
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\hdwwiz.exe"4⤵PID:2956
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\hdwwiz.exe" /grant "everyone":(f)4⤵PID:1820
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\help.exe"3⤵PID:1684
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\help.exe"4⤵PID:1936
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\help.exe" /grant "everyone":(f)4⤵PID:1712
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\hh.exe"3⤵PID:3004
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\hh.exe"4⤵PID:3648
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\hh.exe" /grant "everyone":(f)4⤵PID:3012
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\HOSTNAME.EXE"3⤵PID:4728
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\HOSTNAME.EXE"4⤵PID:1148
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\HOSTNAME.EXE" /grant "everyone":(f)4⤵PID:644
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\icacls.exe"3⤵PID:5032
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\icacls.exe"4⤵
- System Location Discovery: System Language Discovery
PID:3572
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\icacls.exe" /grant "everyone":(f)4⤵PID:3016
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\icsunattend.exe"3⤵PID:2000
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\icsunattend.exe"4⤵PID:2632
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\icsunattend.exe" /grant "everyone":(f)4⤵PID:4496
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\ieUnatt.exe"3⤵PID:2756
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\ieUnatt.exe"4⤵PID:4912
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\ieUnatt.exe" /grant "everyone":(f)4⤵PID:3504
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\iexpress.exe"3⤵PID:3408
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\iexpress.exe"4⤵PID:3608
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\iexpress.exe" /grant "everyone":(f)4⤵PID:3672
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\IME\IMEJP\IMJPDCT.EXE"3⤵PID:3808
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\IME\IMEJP\IMJPDCT.EXE"4⤵PID:248
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\IME\IMEJP\IMJPDCT.EXE" /grant "everyone":(f)4⤵PID:4628
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\IME\IMEJP\IMJPSET.EXE"3⤵PID:3572
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\IME\IMEJP\IMJPSET.EXE"4⤵PID:4228
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\IME\IMEJP\IMJPSET.EXE" /grant "everyone":(f)4⤵PID:4592
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\IME\IMEJP\IMJPUEX.EXE"3⤵PID:5032
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\IME\IMEJP\IMJPUEX.EXE"4⤵PID:4700
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\IME\IMEJP\IMJPUEX.EXE" /grant "everyone":(f)4⤵PID:4024
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\IME\IMEJP\imjpuexc.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4052 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\IME\IMEJP\imjpuexc.exe"4⤵PID:4260
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\IME\IMEJP\imjpuexc.exe" /grant "everyone":(f)4⤵
- System Location Discovery: System Language Discovery
PID:2160
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\IME\IMETC\IMTCLNWZ.EXE"3⤵PID:484
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\IME\IMETC\IMTCLNWZ.EXE"4⤵PID:1532
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\IME\IMETC\IMTCLNWZ.EXE" /grant "everyone":(f)4⤵PID:2180
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\IME\IMETC\IMTCPROP.exe"3⤵PID:3504
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\IME\IMETC\IMTCPROP.exe"4⤵PID:4432
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\IME\IMETC\IMTCPROP.exe" /grant "everyone":(f)4⤵PID:3328
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\IME\SHARED\IMCCPHR.exe"3⤵PID:3956
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\IME\SHARED\IMCCPHR.exe"4⤵PID:3524
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\IME\SHARED\IMCCPHR.exe" /grant "everyone":(f)4⤵PID:1008
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\IME\SHARED\imecfmui.exe"3⤵PID:4196
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\IME\SHARED\imecfmui.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4716
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\IME\SHARED\imecfmui.exe" /grant "everyone":(f)4⤵PID:4784
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\IME\SHARED\IMEPADSV.EXE"3⤵PID:4676
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\IME\SHARED\IMEPADSV.EXE"4⤵PID:4044
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\IME\SHARED\IMEPADSV.EXE" /grant "everyone":(f)4⤵PID:4124
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\IME\SHARED\IMESEARCH.EXE"3⤵PID:4260
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\IME\SHARED\IMESEARCH.EXE"4⤵PID:3800
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\IME\SHARED\IMESEARCH.EXE" /grant "everyone":(f)4⤵PID:3632
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\IME\SHARED\IMEWDBLD.EXE"3⤵PID:4192
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\IME\SHARED\IMEWDBLD.EXE"4⤵PID:1128
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\IME\SHARED\IMEWDBLD.EXE" /grant "everyone":(f)4⤵PID:3612
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\InfDefaultInstall.exe"3⤵PID:3328
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\InfDefaultInstall.exe"4⤵PID:2756
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\InfDefaultInstall.exe" /grant "everyone":(f)4⤵PID:1332
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\InputSwitchToastHandler.exe"3⤵PID:2352
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\InputSwitchToastHandler.exe"4⤵PID:4204
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\InputSwitchToastHandler.exe" /grant "everyone":(f)4⤵
- System Location Discovery: System Language Discovery
PID:2664
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\InstallShield\setup.exe"3⤵PID:3956
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\InstallShield\setup.exe"4⤵PID:4876
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\InstallShield\setup.exe" /grant "everyone":(f)4⤵
- System Location Discovery: System Language Discovery
PID:2280
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\InstallShield\_isdel.exe"3⤵PID:3924
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\InstallShield\_isdel.exe"4⤵PID:2916
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\InstallShield\_isdel.exe" /grant "everyone":(f)4⤵PID:4852
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\instnm.exe"3⤵PID:5032
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\instnm.exe"4⤵PID:1644
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\instnm.exe" /grant "everyone":(f)4⤵PID:4052
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\ipconfig.exe"3⤵PID:4260
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\ipconfig.exe"4⤵PID:1128
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\ipconfig.exe" /grant "everyone":(f)4⤵PID:3612
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\iscsicli.exe"3⤵PID:2784
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\iscsicli.exe"4⤵PID:2756
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\iscsicli.exe" /grant "everyone":(f)4⤵PID:396
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\iscsicpl.exe"3⤵PID:4252
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\iscsicpl.exe"4⤵PID:4220
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\iscsicpl.exe" /grant "everyone":(f)4⤵PID:2664
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\isoburn.exe"3⤵PID:4156
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\isoburn.exe"4⤵PID:4784
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\isoburn.exe" /grant "everyone":(f)4⤵PID:2280
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\ktmutil.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4696 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\ktmutil.exe"4⤵PID:676
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\ktmutil.exe" /grant "everyone":(f)4⤵PID:4044
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\label.exe"3⤵PID:2916
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\label.exe"4⤵PID:996
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\label.exe" /grant "everyone":(f)4⤵PID:4052
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\LaunchTM.exe"3⤵PID:4676
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\LaunchTM.exe"4⤵PID:4432
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\LaunchTM.exe" /grant "everyone":(f)4⤵PID:2180
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\LaunchWinApp.exe"3⤵PID:4260
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\LaunchWinApp.exe"4⤵PID:2756
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\LaunchWinApp.exe" /grant "everyone":(f)4⤵PID:4912
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\lodctr.exe"3⤵PID:2104
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\lodctr.exe"4⤵PID:2908
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\lodctr.exe" /grant "everyone":(f)4⤵PID:2664
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\logagent.exe"3⤵PID:3552
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\logagent.exe"4⤵PID:4784
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\logagent.exe" /grant "everyone":(f)4⤵PID:2280
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\logman.exe"3⤵PID:4156
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\logman.exe"4⤵PID:1332
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\logman.exe" /grant "everyone":(f)4⤵PID:2256
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\Magnify.exe"3⤵PID:4124
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\Magnify.exe"4⤵
- System Location Discovery: System Language Discovery
PID:3800
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\Magnify.exe" /grant "everyone":(f)4⤵PID:3632
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\makecab.exe"3⤵PID:4196
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\makecab.exe"4⤵
- Possible privilege escalation attempt
PID:4048
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\makecab.exe" /grant "everyone":(f)4⤵PID:3068
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\mavinject.exe"3⤵PID:4676
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\mavinject.exe"4⤵
- Modifies file permissions
PID:3812
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\mavinject.exe" /grant "everyone":(f)4⤵PID:3008
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\mcbuilder.exe"3⤵PID:3532
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\mcbuilder.exe"4⤵
- System Location Discovery: System Language Discovery
PID:3996
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\mcbuilder.exe" /grant "everyone":(f)4⤵
- Possible privilege escalation attempt
PID:3824
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\mfpmp.exe"3⤵PID:3476
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\mfpmp.exe"4⤵PID:2280
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\mfpmp.exe" /grant "everyone":(f)4⤵PID:4252
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\mmc.exe"3⤵PID:3836
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\mmc.exe"4⤵PID:2256
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\mmc.exe" /grant "everyone":(f)4⤵PID:4200
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\mmgaserver.exe"3⤵PID:4688
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\mmgaserver.exe"4⤵PID:1676
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\mmgaserver.exe" /grant "everyone":(f)4⤵
- Possible privilege escalation attempt
PID:996
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\mobsync.exe"3⤵PID:4124
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\mobsync.exe"4⤵
- System Location Discovery: System Language Discovery
PID:3068
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\mobsync.exe" /grant "everyone":(f)4⤵PID:4684
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\mountvol.exe"3⤵PID:2348
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\mountvol.exe"4⤵PID:3504
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\mountvol.exe" /grant "everyone":(f)4⤵PID:4676
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\MRINFO.EXE"3⤵PID:2160
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\MRINFO.EXE"4⤵PID:2104
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\MRINFO.EXE" /grant "everyone":(f)4⤵PID:3532
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\msdt.exe"3⤵PID:3652
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\msdt.exe"4⤵PID:4832
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\msdt.exe" /grant "everyone":(f)4⤵PID:3476
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\msfeedssync.exe"3⤵PID:2784
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\msfeedssync.exe"4⤵PID:1404
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\msfeedssync.exe" /grant "everyone":(f)4⤵PID:4496
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\mshta.exe"3⤵PID:4184
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\mshta.exe"4⤵PID:4840
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\mshta.exe" /grant "everyone":(f)4⤵PID:4688
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\msiexec.exe"3⤵PID:2656
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\msiexec.exe"4⤵PID:1644
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\msiexec.exe" /grant "everyone":(f)4⤵PID:4124
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\msinfo32.exe"3⤵PID:3640
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\msinfo32.exe"4⤵PID:4676
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\msinfo32.exe" /grant "everyone":(f)4⤵PID:2348
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\msra.exe"3⤵PID:4680
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\msra.exe"4⤵PID:1500
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\msra.exe" /grant "everyone":(f)4⤵PID:2160
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\mstsc.exe"3⤵PID:3008
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\mstsc.exe"4⤵PID:4252
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\mstsc.exe" /grant "everyone":(f)4⤵
- System Location Discovery: System Language Discovery
PID:2280
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\mtstocom.exe"3⤵PID:3420
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\mtstocom.exe"4⤵PID:2256
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\mtstocom.exe" /grant "everyone":(f)4⤵PID:3956
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\MuiUnattend.exe"3⤵PID:1924
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\MuiUnattend.exe"4⤵PID:2632
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\MuiUnattend.exe" /grant "everyone":(f)4⤵PID:4692
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\ndadmin.exe"3⤵PID:4684
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\ndadmin.exe"4⤵PID:3756
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\ndadmin.exe" /grant "everyone":(f)4⤵PID:2348
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\net.exe"3⤵PID:3504
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\net.exe"4⤵PID:1500
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\net.exe" /grant "everyone":(f)4⤵PID:2160
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\net1.exe"3⤵PID:3852
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\net1.exe"4⤵
- Modifies file permissions
PID:1008
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\net1.exe" /grant "everyone":(f)4⤵PID:4708
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\netbtugc.exe"3⤵PID:3476
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\netbtugc.exe"4⤵PID:2352
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\netbtugc.exe" /grant "everyone":(f)4⤵PID:676
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\NetCfgNotifyObjectHost.exe"3⤵PID:4044
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\NetCfgNotifyObjectHost.exe"4⤵PID:2632
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\NetCfgNotifyObjectHost.exe" /grant "everyone":(f)4⤵
- Modifies file permissions
PID:4124
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\netiougc.exe"3⤵PID:4184
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\netiougc.exe"4⤵PID:484
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\netiougc.exe" /grant "everyone":(f)4⤵PID:2000
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\Netplwiz.exe"3⤵PID:2348
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\Netplwiz.exe"4⤵PID:3924
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\Netplwiz.exe" /grant "everyone":(f)4⤵PID:2908
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\netsh.exe"3⤵PID:2056
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\netsh.exe"4⤵PID:4048
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\netsh.exe" /grant "everyone":(f)4⤵PID:3876
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\NETSTAT.EXE"3⤵PID:2716
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\NETSTAT.EXE"4⤵PID:2256
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\NETSTAT.EXE" /grant "everyone":(f)4⤵PID:4852
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\newdev.exe"3⤵PID:4156
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\newdev.exe"4⤵PID:1644
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\newdev.exe" /grant "everyone":(f)4⤵PID:4692
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\notepad.exe"3⤵PID:4872
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\notepad.exe"4⤵PID:3756
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\notepad.exe" /grant "everyone":(f)4⤵PID:2000
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\nslookup.exe"3⤵PID:1996
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\nslookup.exe"4⤵PID:3924
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\nslookup.exe" /grant "everyone":(f)4⤵PID:2656
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\ntprint.exe"3⤵PID:2348
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\ntprint.exe"4⤵PID:4708
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\ntprint.exe" /grant "everyone":(f)4⤵PID:4048
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\odbcad32.exe"3⤵PID:3824
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\odbcad32.exe"4⤵PID:2256
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\odbcad32.exe" /grant "everyone":(f)4⤵PID:1332
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\odbcconf.exe"3⤵PID:1008
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\odbcconf.exe"4⤵PID:4124
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\odbcconf.exe" /grant "everyone":(f)4⤵PID:3836
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\OneDriveSetup.exe"3⤵PID:4156
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\OneDriveSetup.exe"4⤵PID:996
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\OneDriveSetup.exe" /grant "everyone":(f)4⤵PID:4224
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\openfiles.exe"3⤵PID:4872
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\openfiles.exe"4⤵PID:4260
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\openfiles.exe" /grant "everyone":(f)4⤵PID:3532
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\OpenWith.exe"3⤵PID:1996
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\OpenWith.exe"4⤵PID:396
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\OpenWith.exe" /grant "everyone":(f)4⤵PID:2128
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\OposHost.exe"3⤵PID:4252
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\OposHost.exe"4⤵PID:1128
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\OposHost.exe" /grant "everyone":(f)4⤵PID:844
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\PackagedCWALauncher.exe"3⤵PID:4592
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\PackagedCWALauncher.exe"4⤵PID:4716
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\PackagedCWALauncher.exe" /grant "everyone":(f)4⤵PID:2916
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\PasswordOnWakeSettingFlyout.exe"3⤵PID:3476
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\PasswordOnWakeSettingFlyout.exe"4⤵PID:2632
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\PasswordOnWakeSettingFlyout.exe" /grant "everyone":(f)4⤵PID:1032
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\PATHPING.EXE"3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4156 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\PATHPING.EXE"4⤵PID:3560
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\PATHPING.EXE" /grant "everyone":(f)4⤵PID:4260
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\pcaui.exe"3⤵PID:2908
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\pcaui.exe"4⤵PID:4708
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\pcaui.exe" /grant "everyone":(f)4⤵PID:396
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\perfhost.exe"3⤵PID:3876
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\perfhost.exe"4⤵PID:3824
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\perfhost.exe" /grant "everyone":(f)4⤵PID:4852
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\perfmon.exe"3⤵PID:3640
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\perfmon.exe"4⤵PID:2716
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\perfmon.exe" /grant "everyone":(f)4⤵PID:3956
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\PickerHost.exe"3⤵PID:4680
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\PickerHost.exe"4⤵PID:1032
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\PickerHost.exe" /grant "everyone":(f)4⤵PID:4192
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\PING.EXE"3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3476 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\PING.EXE"4⤵PID:4260
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\PING.EXE" /grant "everyone":(f)4⤵PID:3560
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\PkgMgr.exe"3⤵PID:1776
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\PkgMgr.exe"4⤵PID:1996
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\PkgMgr.exe" /grant "everyone":(f)4⤵PID:4496
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\poqexec.exe"3⤵PID:4784
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\poqexec.exe"4⤵PID:4852
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\poqexec.exe" /grant "everyone":(f)4⤵PID:1332
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\powercfg.exe"3⤵
- Power Settings
PID:2348 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\powercfg.exe"4⤵
- Power Settings
PID:4196
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\powercfg.exe" /grant "everyone":(f)4⤵
- Power Settings
PID:3836
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\pphcje3j0ejuu.exe"3⤵PID:4676
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\pphcje3j0ejuu.exe"4⤵PID:4224
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\pphcje3j0ejuu.exe" /grant "everyone":(f)4⤵PID:2632
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\PresentationHost.exe"3⤵PID:4296
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\PresentationHost.exe"4⤵PID:3928
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\PresentationHost.exe" /grant "everyone":(f)4⤵PID:3632
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\prevhost.exe"3⤵PID:3328
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\prevhost.exe"4⤵PID:1084
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\prevhost.exe" /grant "everyone":(f)4⤵PID:2104
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\print.exe"3⤵PID:3552
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\print.exe"4⤵PID:2632
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\print.exe" /grant "everyone":(f)4⤵
- System Location Discovery: System Language Discovery
PID:2352
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\printui.exe"3⤵PID:3836
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\printui.exe"4⤵PID:3468
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\printui.exe" /grant "everyone":(f)4⤵PID:2496
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\proquota.exe"3⤵PID:1008
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\proquota.exe"4⤵PID:2784
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\proquota.exe" /grant "everyone":(f)4⤵
- Possible privilege escalation attempt
PID:2908
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\provlaunch.exe"3⤵PID:2920
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\provlaunch.exe"4⤵PID:3596
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\provlaunch.exe" /grant "everyone":(f)4⤵PID:3996
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\psr.exe"3⤵PID:5032
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\psr.exe"4⤵PID:3476
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\psr.exe" /grant "everyone":(f)4⤵PID:236
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\quickassist.exe"3⤵PID:1400
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\quickassist.exe"4⤵PID:1128
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\quickassist.exe" /grant "everyone":(f)4⤵PID:4832
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\rasautou.exe"3⤵PID:4196
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\rasautou.exe"4⤵PID:2180
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\rasautou.exe" /grant "everyone":(f)4⤵PID:2756
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\rasdial.exe"3⤵PID:4192
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\rasdial.exe"4⤵PID:672
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\rasdial.exe" /grant "everyone":(f)4⤵PID:4252
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\raserver.exe"3⤵PID:3804
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\raserver.exe"4⤵PID:3596
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\raserver.exe" /grant "everyone":(f)4⤵PID:4896
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\rasphone.exe"3⤵PID:4260
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\rasphone.exe"4⤵PID:2104
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\rasphone.exe" /grant "everyone":(f)4⤵PID:5032
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\RdpSa.exe"3⤵PID:5040
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\RdpSa.exe"4⤵PID:4676
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\RdpSa.exe" /grant "everyone":(f)4⤵PID:1400
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\RdpSaProxy.exe"3⤵PID:3640
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\RdpSaProxy.exe"4⤵PID:4224
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\RdpSaProxy.exe" /grant "everyone":(f)4⤵PID:4692
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\RdpSaUacHelper.exe"3⤵PID:4196
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\RdpSaUacHelper.exe"4⤵PID:4896
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\RdpSaUacHelper.exe" /grant "everyone":(f)4⤵PID:3832
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\rdrleakdiag.exe"3⤵PID:4156
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\rdrleakdiag.exe"4⤵PID:2908
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\rdrleakdiag.exe" /grant "everyone":(f)4⤵PID:2000
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\ReAgentc.exe"3⤵PID:4204
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\ReAgentc.exe"4⤵PID:2256
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\ReAgentc.exe" /grant "everyone":(f)4⤵PID:4832
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\recover.exe"3⤵PID:4784
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\recover.exe"4⤵PID:4692
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\recover.exe" /grant "everyone":(f)4⤵PID:2056
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\reg.exe"3⤵PID:1996
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\reg.exe"4⤵PID:4252
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\reg.exe" /grant "everyone":(f)4⤵PID:2348
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\regedit.exe"3⤵PID:4296
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\regedit.exe"4⤵PID:1620
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\regedit.exe" /grant "everyone":(f)4⤵PID:4876
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\regedt32.exe"3⤵PID:4896
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\regedt32.exe"4⤵PID:3328
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\regedt32.exe" /grant "everyone":(f)4⤵PID:4684
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\regini.exe"3⤵PID:2104
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\regini.exe"4⤵PID:5040
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\regini.exe" /grant "everyone":(f)4⤵PID:4124
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\Register-CimProvider.exe"3⤵PID:2256
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\Register-CimProvider.exe"4⤵PID:3640
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\Register-CimProvider.exe" /grant "everyone":(f)4⤵
- Modifies file permissions
PID:4852
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\regsvr32.exe"3⤵PID:2916
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\regsvr32.exe"4⤵PID:2348
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\regsvr32.exe" /grant "everyone":(f)4⤵PID:112
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\rekeywiz.exe"3⤵PID:3008
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\rekeywiz.exe"4⤵PID:2920
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\rekeywiz.exe" /grant "everyone":(f)4⤵PID:3996
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\relog.exe"3⤵PID:72
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\relog.exe"4⤵PID:3476
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\relog.exe" /grant "everyone":(f)4⤵PID:3320
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\replace.exe"3⤵PID:484
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\replace.exe"4⤵PID:4676
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\replace.exe" /grant "everyone":(f)4⤵PID:3952
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\resmon.exe"3⤵PID:2104
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\resmon.exe"4⤵PID:3468
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\resmon.exe" /grant "everyone":(f)4⤵PID:4852
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\RMActivate.exe"3⤵PID:3640
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\RMActivate.exe"4⤵PID:4252
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\RMActivate.exe" /grant "everyone":(f)4⤵PID:672
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\RMActivate_isv.exe"3⤵PID:3924
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\RMActivate_isv.exe"4⤵
- Modifies file permissions
PID:3808
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\RMActivate_isv.exe" /grant "everyone":(f)4⤵PID:3996
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\RMActivate_ssp.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3804 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\RMActivate_ssp.exe"4⤵PID:4684
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\RMActivate_ssp.exe" /grant "everyone":(f)4⤵PID:3320
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\RMActivate_ssp_isv.exe"3⤵PID:5076
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\RMActivate_ssp_isv.exe"4⤵PID:4124
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\RMActivate_ssp_isv.exe" /grant "everyone":(f)4⤵PID:1404
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\RmClient.exe"3⤵PID:484
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\RmClient.exe"4⤵PID:4204
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\RmClient.exe" /grant "everyone":(f)4⤵PID:2056
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\Robocopy.exe"3⤵PID:2104
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\Robocopy.exe"4⤵PID:3040
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\Robocopy.exe" /grant "everyone":(f)4⤵PID:2280
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\ROUTE.EXE"3⤵PID:4220
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\ROUTE.EXE"4⤵PID:1620
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\ROUTE.EXE" /grant "everyone":(f)4⤵PID:1008
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\RpcPing.exe"3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3808 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\RpcPing.exe"4⤵PID:5032
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\RpcPing.exe" /grant "everyone":(f)4⤵PID:2920
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\rrinstaller.exe"3⤵PID:3876
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\rrinstaller.exe"4⤵PID:4044
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\rrinstaller.exe" /grant "everyone":(f)4⤵PID:5040
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\runas.exe"3⤵
- Access Token Manipulation: Create Process with Token
PID:1400 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\runas.exe"4⤵PID:4224
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\runas.exe" /grant "everyone":(f)4⤵PID:3644
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\rundll32.exe"3⤵PID:2908
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\rundll32.exe"4⤵PID:2328
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\rundll32.exe" /grant "everyone":(f)4⤵PID:4716
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\RunLegacyCPLElevated.exe"3⤵PID:4352
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\RunLegacyCPLElevated.exe"4⤵PID:3996
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\RunLegacyCPLElevated.exe" /grant "everyone":(f)4⤵PID:540
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\runonce.exe"3⤵PID:2256
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\runonce.exe"4⤵PID:3328
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\runonce.exe" /grant "everyone":(f)4⤵PID:1532
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\sc.exe"3⤵PID:4784
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\sc.exe"4⤵PID:236
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\sc.exe" /grant "everyone":(f)4⤵PID:5040
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\schtasks.exe"3⤵PID:3952
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\schtasks.exe"4⤵PID:4768
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\schtasks.exe" /grant "everyone":(f)4⤵PID:3468
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\sdbinst.exe"3⤵PID:4156
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\sdbinst.exe"4⤵PID:112
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\sdbinst.exe" /grant "everyone":(f)4⤵PID:2280
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\sdchange.exe"3⤵PID:2756
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:3532
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\sdchange.exe"4⤵PID:3596
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\sdchange.exe" /grant "everyone":(f)4⤵PID:1008
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\sdiagnhost.exe"3⤵PID:3504
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\sdiagnhost.exe"4⤵PID:5032
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\sdiagnhost.exe" /grant "everyone":(f)4⤵PID:5036
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\SearchFilterHost.exe"3⤵PID:4192
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\SearchFilterHost.exe"4⤵PID:1404
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\SearchFilterHost.exe" /grant "everyone":(f)4⤵PID:5040
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\SearchIndexer.exe"3⤵PID:3808
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\SearchIndexer.exe"4⤵PID:2180
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\SearchIndexer.exe" /grant "everyone":(f)4⤵PID:3468
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\SearchProtocolHost.exe"3⤵PID:5076
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\SearchProtocolHost.exe"4⤵PID:672
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\SearchProtocolHost.exe" /grant "everyone":(f)4⤵PID:2716
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\SecEdit.exe"3⤵PID:1400
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\SecEdit.exe"4⤵PID:4252
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\SecEdit.exe" /grant "everyone":(f)4⤵PID:1776
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\secinit.exe"3⤵PID:3596
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\secinit.exe"4⤵PID:5032
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\secinit.exe" /grant "everyone":(f)4⤵PID:5036
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\sethc.exe"3⤵PID:3504
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\sethc.exe"4⤵PID:1404
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\sethc.exe" /grant "everyone":(f)4⤵PID:5040
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\setup16.exe"3⤵PID:3544
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\setup16.exe"4⤵PID:3804
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\setup16.exe" /grant "everyone":(f)4⤵PID:4224
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\setupugc.exe"3⤵PID:4196
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\setupugc.exe"4⤵PID:4896
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\setupugc.exe" /grant "everyone":(f)4⤵PID:3756
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\setx.exe"3⤵PID:3952
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\setx.exe"4⤵
- Possible privilege escalation attempt
PID:1620
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\setx.exe" /grant "everyone":(f)4⤵PID:72
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\sfc.exe"3⤵PID:1400
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\sfc.exe"4⤵PID:4184
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\sfc.exe" /grant "everyone":(f)4⤵PID:940
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\shrpubw.exe"3⤵PID:2756
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\shrpubw.exe"4⤵PID:1404
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\shrpubw.exe" /grant "everyone":(f)4⤵PID:5040
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\shutdown.exe"3⤵PID:4772
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\shutdown.exe"4⤵PID:4784
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\shutdown.exe" /grant "everyone":(f)4⤵PID:2256
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\SndVol.exe"3⤵PID:3544
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\SndVol.exe"4⤵PID:112
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\SndVol.exe" /grant "everyone":(f)4⤵
- Possible privilege escalation attempt
PID:440
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\sort.exe"3⤵PID:4896
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\sort.exe"4⤵PID:540
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\sort.exe" /grant "everyone":(f)4⤵PID:2716
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\SpatialAudioLicenseSrv.exe"3⤵PID:1620
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4496
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\SpatialAudioLicenseSrv.exe"4⤵PID:5032
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\SpatialAudioLicenseSrv.exe" /grant "everyone":(f)4⤵PID:4260
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\Speech_OneCore\Common\SpeechModelDownload.exe"3⤵PID:3320
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\Speech_OneCore\Common\SpeechModelDownload.exe"4⤵PID:1996
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\Speech_OneCore\Common\SpeechModelDownload.exe" /grant "everyone":(f)4⤵PID:4832
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\srdelayed.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3644 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\srdelayed.exe"4⤵PID:4220
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\srdelayed.exe" /grant "everyone":(f)4⤵PID:4772
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\stordiag.exe"3⤵PID:5076
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\stordiag.exe"4⤵PID:4996
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\stordiag.exe" /grant "everyone":(f)4⤵PID:4836
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\subst.exe"3⤵PID:3928
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\subst.exe"4⤵PID:484
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\subst.exe" /grant "everyone":(f)4⤵PID:72
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\svchost.exe"3⤵PID:2104
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\svchost.exe"4⤵PID:2920
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\svchost.exe" /grant "everyone":(f)4⤵PID:4204
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\sxstrace.exe"3⤵PID:1620
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\sxstrace.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4596
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\sxstrace.exe" /grant "everyone":(f)4⤵PID:4124
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\SyncHost.exe"3⤵PID:1404
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\SyncHost.exe"4⤵PID:4784
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\SyncHost.exe" /grant "everyone":(f)4⤵PID:2056
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\systeminfo.exe"3⤵PID:4192
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\systeminfo.exe"4⤵PID:3544
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\systeminfo.exe" /grant "everyone":(f)4⤵PID:112
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\SystemPropertiesAdvanced.exe"3⤵PID:2280
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\SystemPropertiesAdvanced.exe"4⤵PID:72
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\SystemPropertiesAdvanced.exe" /grant "everyone":(f)4⤵PID:3928
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\SystemPropertiesComputerName.exe"3⤵PID:1332
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\SystemPropertiesComputerName.exe"4⤵PID:2920
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\SystemPropertiesComputerName.exe" /grant "everyone":(f)4⤵PID:5036
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\SystemPropertiesDataExecutionPrevention.exe"3⤵PID:4876
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\SystemPropertiesDataExecutionPrevention.exe"4⤵PID:1996
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\SystemPropertiesDataExecutionPrevention.exe" /grant "everyone":(f)4⤵PID:1500
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\SystemPropertiesHardware.exe"3⤵PID:1128
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\SystemPropertiesHardware.exe"4⤵PID:4044
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\SystemPropertiesHardware.exe" /grant "everyone":(f)4⤵PID:3804
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\SystemPropertiesPerformance.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4836 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\SystemPropertiesPerformance.exe"4⤵PID:4996
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\SystemPropertiesPerformance.exe" /grant "everyone":(f)4⤵PID:4192
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\SystemPropertiesProtection.exe"3⤵PID:2784
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\SystemPropertiesProtection.exe"4⤵PID:1776
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\SystemPropertiesProtection.exe" /grant "everyone":(f)4⤵PID:2716
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\SystemPropertiesRemote.exe"3⤵PID:3832
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\SystemPropertiesRemote.exe"4⤵PID:4260
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\SystemPropertiesRemote.exe" /grant "everyone":(f)4⤵PID:5032
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\SystemUWPLauncher.exe"3⤵PID:2000
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\SystemUWPLauncher.exe"4⤵PID:5040
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\SystemUWPLauncher.exe" /grant "everyone":(f)4⤵PID:3996
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\systray.exe"3⤵PID:4352
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\systray.exe"4⤵PID:4044
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\systray.exe" /grant "everyone":(f)4⤵PID:4784
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\takeown.exe"3⤵PID:676
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\takeown.exe"4⤵PID:3552
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\takeown.exe" /grant "everyone":(f)4⤵PID:2348
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\TapiUnattend.exe"3⤵PID:1776
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\TapiUnattend.exe"4⤵PID:1008
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\TapiUnattend.exe" /grant "everyone":(f)4⤵PID:1400
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\tar.exe"3⤵PID:1332
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\tar.exe"4⤵PID:3832
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\tar.exe" /grant "everyone":(f)4⤵PID:2104
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\taskkill.exe"3⤵PID:996
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\taskkill.exe"4⤵PID:1620
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\taskkill.exe" /grant "everyone":(f)4⤵PID:4196
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\tasklist.exe"3⤵PID:4044
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\tasklist.exe"4⤵PID:4220
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\tasklist.exe" /grant "everyone":(f)4⤵PID:3808
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\Taskmgr.exe"3⤵PID:3552
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\Taskmgr.exe"4⤵PID:112
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\Taskmgr.exe" /grant "everyone":(f)4⤵PID:4768
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\tcmsetup.exe"3⤵PID:672
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\tcmsetup.exe"4⤵PID:72
-
-
-
-
C:\Users\Admin\Downloads\trash_malware\trash malware\mbrsetup.exe"C:\Users\Admin\Downloads\trash_malware\trash malware\mbrsetup.exe"2⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2664
-
-
C:\Windows\msagent\AgentSvr.exeC:\Windows\msagent\AgentSvr.exe -Embedding1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3220
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004DC 0x00000000000004CC1⤵
- Suspicious use of AdjustPrivilegeToken
PID:908
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:2172
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:5112
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4748
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k wsappx -p -s AppXSvc1⤵PID:864
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:4312
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3788
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Accessibility Features
1AppInit DLLs
1Power Settings
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Accessibility Features
1AppInit DLLs
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
8Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.0MB
MD504b88c7067b53a9bdf844cd1cb4b9c30
SHA17d081a1053cd9ef3d593f5ef9a27303824b779f5
SHA256d42b135a1e70b6f7d0d98c340f4b529f722953cf57e573bb21a078f50f2016b9
SHA512566f36f804d3027daab0e01f6d816b0420ba21fc276f2fabda4d0ed37b0e830704dcba8ccc3d30a7023c69f8ad3da0b9b58a49a26b3bb239d8ae0762bc157a42
-
Filesize
549KB
MD50b24892597dcb0257cdb78b5ed165218
SHA15fe5d446406ff1e34d2fe3ee347769941636e323
SHA256707f415d7d581edd9bce99a0429ad4629d3be0316c329e8b9ebd576f7ab50b71
SHA51224ea9e0f10a283e67850070976c81ae4b2d4d9bb92c6eb41b2557ad3ae02990287531a619cf57cd257011c6770d4c25dd19c3c0e46447eb4d0984d50d869e56f
-
Filesize
963KB
MD5004d7851f74f86704152ecaaa147f0ce
SHA145a9765c26eb0b1372cb711120d90b5f111123b3
SHA256028cf2158df45889e9a565c9ce3c6648fb05c286b97f39c33317163e35d6f6be
SHA51216ebda34803977a324f5592f947b32f5bb2362dd520dc2e97088d12729024498ddfa6800694d37f2e6e5c6fc8d4c6f603414f0c033df9288efc66a2c39b5ec29
-
Filesize
692KB
MD54159ff3f09b72e504e25a5f3c7ed3a5b
SHA1b79ab2c83803e1d6da1dcd902f41e45d6cd26346
SHA2560163ec83208b4902a2846de998a915de1b9e72aba33d98d5c8a14a8fbf0f6101
SHA51248f54f0ab96be620db392b4c459a49a0fa8fbe95b1c1b7df932de565cf5f77adfaae98ef1e5998f326172b5ae4ffa9896aeac0f7b98568fcde6f7b1480df4e2d
-
Filesize
5.6MB
MD540228458ca455d28e33951a2f3844209
SHA186165eb8eb3e99b6efa25426508a323be0e68a44
SHA2561a904494bb7a21512af6013fe65745e7898cdd6fadac8cb58be04e02346ed95f
SHA512da62cc244f9924444c7cb4fdbd46017c65e6130d639f6696f7930d867017c211df8b18601bfdaaee65438cee03977848513d7f08987b9b945f3f05241f55ec39
-
Filesize
14KB
MD55dfdda860ba69df0ae0ab193cf22a4ad
SHA1631c3b573b87688a9c5c5f9268fa826b315acb22
SHA2562ffa1c010889dc2c03dfef2271343ac6032c3966530c383b92d3dfd99a3aadc5
SHA512ba844e4157d1da80879d89d52155e10f02682f34d92a5a7a57fb1d723cac66b01ff3aace379072780c01720419fd21f1f25279f6587950e9ed4c43688c284a95
-
Filesize
5.6MB
MD528cab2224580a30e19000b0148499752
SHA1c7a717b2c014cf16333a74fafa77ad9f2a459198
SHA256497fb02861144fb4abeec83f3dab727675ea91c827b6492e5633992ad2db61c7
SHA5127d26a529a321f764bcdc269223dab89e71e2034b7f06e7700255c3c48a8f7eb0248c96f61524811e5631d16b18a51eb98e496977cd8ed9eac1f136c0f811ae1d
-
Filesize
281KB
MD53dc3594fb3b25c55081fe4b3226abbc2
SHA17eaddfd597fc76244f71f98877f7149c9e85dc9e
SHA2566d54694077faf07473196da7b7f1c6981c8ad6a462fcea4777a80cfc6bc5769e
SHA5128f268673c86e2c38d1713696ed25b75a565d8beb5b05ea755c9cbb12f625b8d4abfc1bb3f9f54c297ba4bd7dd9e465737c30f492aaef0034b0e1568ce13d2445
-
Filesize
47KB
MD57cd19ecb92ca273bfe0fbc6981f074b4
SHA11673458eeecdf3b4c69ba0f9b22050709d76b19f
SHA2566598ca3e59435f37ed0394e8bc1f2555b19acb60df87a3f7109a318186f0452d
SHA5125eafa9a701f586822e4e0a572c67d328383547b58c0d51de2a1578660f557adfc485ffa0f02a07899be261b023a979bafe510f6d6d0615db311adfc12fe44d1f
-
Filesize
4.1MB
MD52864c8b005a6414e2fa9b06c1e089dcc
SHA13041fbd63ae570b537c38a315050c06aa566362f
SHA25678425e626d0830c35ee05307ad6958055493acebbb8a2548ba3de4af6d6378f7
SHA512bf8fd10e7d517c183f0273b9b997c57c552154e8e65889a4277dea81c3d8104eebf12b4e5b179e95f5f261b5be01d3db13b7c46b8d723d951fbdaa0b15ec70c3
-
Filesize
2.1MB
MD5b8d69fa2755c3ab1f12f8866a8e2a4f7
SHA18e3cdfb20e158c2906323ba0094a18c7dd2aaf2d
SHA2567e0976036431640ae1d9f1c0b52bcea5dd37ef86cd3f5304dc8a96459d9483cd
SHA5125acac46068b331216978500f67a7fa5257bc5b05133fab6d88280b670ae4885ef2d5d1f531169b66bf1952e082f56b1ad2bc3901479b740f96c53ea405adda18
-
Filesize
82B
MD54b8cbdf2780f2a8407e5f0d734ee908d
SHA1a5ee1e7fb8b7ec54537f282b3fddf491a8417b47
SHA256770445a34792447c2856712254b18adbaeaf3c1c66b56c3df7a1d2fc73984738
SHA51201a3278dba5a59fbcb13fdecf004969b979b91fa18fdad386e5aa23973fb66303cc3f85bf03879a01f6ad9f085d0ce5a544c1693c7133030871f9d653a71b570
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\psusxzpm.default-release\activity-stream.discovery_stream.json
Filesize21KB
MD5e515604dbd84e6374a7d0a526133b3dc
SHA17703505889e4e4c69af7e87adbadd7566edbad77
SHA256974f24cae14188e5c04c3ad41a73af7aeeea811485604eb76e731b9cc44856d1
SHA512d7259b31e18221a002b3301d100fc7681859e9eed11d72e9de5e3b565c09cc3a3aa4bab313b624a2ada43c238677bf8ca10980bb366875a7273fc5432180c8d8
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\psusxzpm.default-release\cache2\entries\8DF0E9F84C5909278CF68CB55A683669F40995FB
Filesize13KB
MD54e916000a6899a5da58f74a1e386927d
SHA16bd3b6468106a724125c558c7592274cb14f62d2
SHA256e374edacd593550297e6df836aa12aa08fab14204dde51a36ccf8c10d44e785d
SHA5121720c5c3ace354a03c66f8403bdfe0519ca93c8bebbe0bd7984fbd15f56cbde173dd65f42be1f464bce6a9477ab71c58276b870b553b29da32b35a350de883d9
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\psusxzpm.default-release\cache2\entries\ADF5BD09EB688DAB1F35EE02E8C35329D0E4AD89
Filesize13KB
MD5a8bc2edb37d4ce546e0c9d17c9b7919b
SHA18d756c22b320c8f5a174c6c4585d5ac0ceec1e15
SHA2566576ee2f06e5ad2ff8d66f2071c1af2839e6b264e90043a0d3d49c0cdcd93dab
SHA512ddc7862f30837c918dd21ce6468e55bc4c549ffd552aad1efd33b8606b1c18444c6cd0e8ea30889aa02111590fec6d109cfaba6baa05c5b8dd9023a446ccdf13
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\psusxzpm.default-release\personality-provider\nb_model_build_attachment_arts_and_entertainment.json
Filesize67KB
MD56c651609d367b10d1b25ef4c5f2b3318
SHA10abcc756ea415abda969cd1e854e7e8ebeb6f2d4
SHA256960065cc44a09bef89206d28048d3c23719d2f5e9b38cfc718ca864c9e0e91e9
SHA5123e084452eefe14e58faa9ef0d9fda2d21af2c2ab1071ae23cde60527df8df43f701668ca0aa9d86f56630b0ab0ca8367803c968347880d674ad8217fba5d8915
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\psusxzpm.default-release\personality-provider\nb_model_build_attachment_autos_and_vehicles.json
Filesize44KB
MD539b73a66581c5a481a64f4dedf5b4f5c
SHA190e4a0883bb3f050dba2fee218450390d46f35e2
SHA256022f9495f8867fea275ece900cfa7664c68c25073db4748343452dbc0b9eda17
SHA512cfb697958e020282455ab7fabc6c325447db84ead0100d28b417b6a0e2455c9793fa624c23cb9b92dfea25124f59dcd1d5c1f43bf1703a0ad469106b755a7cdd
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\psusxzpm.default-release\personality-provider\nb_model_build_attachment_beauty_and_fitness.json
Filesize33KB
MD50ed0473b23b5a9e7d1116e8d4d5ca567
SHA14eb5e948ac28453c4b90607e223f9e7d901301c4
SHA256eed46e8fe6ff20f89884b4fc68a81e8d521231440301a01bb89beec8ebad296b
SHA512464508d7992edfa0dfb61b04cfc5909b7daacf094fc81745de4d03214b207224133e48750a710979445ee1a65bb791bf240a2b935aacaf3987e5c67ff2d8ba9c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\psusxzpm.default-release\personality-provider\nb_model_build_attachment_blogging_resources_and_services.json
Filesize33KB
MD5c82700fcfcd9b5117176362d25f3e6f6
SHA1a7ad40b40c7e8e5e11878f4702952a4014c5d22a
SHA256c9f2a779dba0bc886cc1255816bd776bdc2e8a6a8e0f9380495a92bb66862780
SHA512d38e65ab55cee8fef538ad96448cd0c6b001563714fc7b37c69a424d0661ec6b7d04892cf4b76b13ddbc7d300c115e87e0134d47c3f38ef51617e5367647b217
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\psusxzpm.default-release\personality-provider\nb_model_build_attachment_books_and_literature.json
Filesize67KB
MD5df96946198f092c029fd6880e5e6c6ec
SHA19aee90b66b8f9656063f9476ff7b87d2d267dcda
SHA256df23a5b6f583ec3b4dce2aca8ff53cbdfadfd58c4b7aeb2e397eade5ff75c996
SHA51243a9fc190f4faadef37e01fa8ad320940553b287ed44a95321997a48312142f110b29c79eed7930477bfb29777a5a9913b42bf22ce6bb3e679dda5af54a125ea
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\psusxzpm.default-release\personality-provider\nb_model_build_attachment_business_and_industrial.json
Filesize45KB
MD5a92a0fffc831e6c20431b070a7d16d5a
SHA1da5bbe65f10e5385cbe09db3630ae636413b4e39
SHA2568410809ebac544389cf27a10e2cbd687b7a68753aa50a42f235ac3fc7b60ce2c
SHA51231a8602e1972900268651cd074950d16ad989b1f15ff3ebbd8e21e0311a619eef4d7d15cdb029ea8b22cf3b8759fa95b3067b4faaadcb90456944dbc3c9806a9
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\psusxzpm.default-release\personality-provider\nb_model_build_attachment_computers_and_electronics.json
Filesize45KB
MD56ccd943214682ac8c4ec08b7ec6dbcbd
SHA118417647f7c76581d79b537a70bf64f614f60fa2
SHA256ab20b97406b0d9bf4f695e5ec7db4ebad5efb682311e74ca757d45b87ffc106b
SHA512e57573d6f494df8aa7e8e6a20427a18f6868e19dc853b441b8506998158b23c7a4393b682c83b3513aae5075a21148dd8ca854a11dabcea6a0a0db8f2e6828b8
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\psusxzpm.default-release\personality-provider\nb_model_build_attachment_finance.json
Filesize33KB
MD5e95c2d2fc654b87e77b0a8a37aaa7fcf
SHA1b4b00c9554839cab6a50a7ed8cd43d21fdaf35dc
SHA256384bf5fcc6928200c7ebb1f03f99bf74f6063e78d3cd044374448f879799318e
SHA5129696998a8d0e3a85982016ff0a22bb8ae1790410f1f6198bb379c0a192579f24c75c25c7648b76b00d25a32ac204178acaccd744ee78846dfc62ebf70bf7b93a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\psusxzpm.default-release\personality-provider\nb_model_build_attachment_food_and_drink.json
Filesize67KB
MD570ba02dedd216430894d29940fc627c2
SHA1f0c9aa816c6b0e171525a984fd844d3a8cabd505
SHA256905357002f2eced8bba1be2285a9b83198f60d2f9bb1144b5c119994f2ec6e34
SHA5123ae60d0bf3c45d28e340d97106790787be2cc80ba579d313b5414084664b86e89879391c99e94b6e33bdc5508ea42a9fd34f48ca9b1e7adfa7b6dd22c783c263
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\psusxzpm.default-release\personality-provider\nb_model_build_attachment_games.json
Filesize44KB
MD54182a69a05463f9c388527a7db4201de
SHA15a0044aed787086c0b79ff0f51368d78c36f76bc
SHA25635e67835a5cf82144765dfb1095ebc84ac27d08812507ad0a2d562bf68e13e85
SHA51240023c9f89e0357fae26c33a023609de96b2a0b439318ef944d3d5b335b0877509f90505d119154eaa81e1097ecfb5aa44dd8bb595497cdecfc3ee711a1fe1d5
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\psusxzpm.default-release\personality-provider\nb_model_build_attachment_health.json
Filesize33KB
MD511711337d2acc6c6a10e2fb79ac90187
SHA15583047c473c8045324519a4a432d06643de055d
SHA256150f21c4f60856ab5e22891939d68d062542537b42a7ce1f8a8cec9300e7c565
SHA512c2301ed72f623b22f05333c5ecc5ebf55d8a2d9593167cc453a66d8f42c05ff7c11e2709b6298912038a8ea6175f050bbc6d1fc4381f385f7ad7a952ad1e856b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\psusxzpm.default-release\personality-provider\nb_model_build_attachment_hobbies_and_leisure.json
Filesize67KB
MD5bb45971231bd3501aba1cd07715e4c95
SHA1ea5bfd43d60a3d30cda1a31a3a5eb8ea0afa142a
SHA25647db7797297a2a81d28c551117e27144b58627dbac1b1d52672b630d220f025d
SHA51274767b1badbd32cacd3f996b8172df9c43656b11fea99f5a51fff38c6c6e2120fae8bdd0dd885234a3f173334054f580164fdf8860c27cbcf5fb29c5bcdc060d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\psusxzpm.default-release\personality-provider\nb_model_build_attachment_home_and_garden.json
Filesize33KB
MD5250acc54f92176775d6bdd8412432d9f
SHA1a6ad9ad7519e5c299d4b4ba458742b1b4d64cb65
SHA25619edd15ebce419b83469d2ab783c0c1377d72a186d1ff08857a82bca842eea54
SHA512a52c81062f02c15701f13595f4476f0a07735034fcf177b1a65b001394a816020ee791fed5afae81d51de27630b34a85efa717fe80da733556fdda8739030f49
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\psusxzpm.default-release\personality-provider\nb_model_build_attachment_internet_and_telecom.json
Filesize67KB
MD536689de6804ca5af92224681ee9ea137
SHA1729d590068e9c891939fc17921930630cd4938dd
SHA256e646d43505c9c4e53dbaa474ef85d650a3f309ccf153d106f328d9b6aeb66d52
SHA5121c4f4aa02a65a9bbdf83dc5321c24cbe49f57108881616b993e274f5705f0466be2dd3389055a725b79f3317c98bdf9f8d47f86d62ebd151e4c57cc4dca2487c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\psusxzpm.default-release\personality-provider\nb_model_build_attachment_jobs_and_education.json
Filesize33KB
MD52d69892acde24ad6383082243efa3d37
SHA1d8edc1c15739e34232012bb255872991edb72bc7
SHA25629080288b2130a67414ecb296a53ddd9f0a4771035e3c1b2112e0ce656a7481a
SHA512da391152e1fbce1f03607b486c5dea9a298a438e58e440ebb7b871bd5c62d7339b540eed115b4001b9840de1ba3898c6504872ff9094ba4d6a47455051c3f1c5
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\psusxzpm.default-release\personality-provider\nb_model_build_attachment_law_and_government.json
Filesize68KB
MD580c49b0f2d195f702e5707ba632ae188
SHA1e65161da245318d1f6fdc001e8b97b4fd0bc50e7
SHA256257ee9a218a1b7f9c1a6c890f38920eb7e731808e3d9b9fc956f8346c29a3e63
SHA512972e95de7fe330c61cd22111bd3785999d60e7c02140809122d696a1f1f76f2cd0d63d6d92f657cdec24366d66b681e24f2735a8aabb8bcecec43c74e23fb4f5
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\psusxzpm.default-release\personality-provider\nb_model_build_attachment_online_communities.json
Filesize67KB
MD537a74ab20e8447abd6ca918b6b39bb04
SHA1b50986e6bb542f5eca8b805328be51eaa77e6c39
SHA25611b6084552e2979b5bc0fd6ffdc61e445d49692c0ae8dffedc07792f8062d13f
SHA51249c6b96655ba0b5d08425af6815f06237089ec06926f49de1f03bc11db9e579bd125f2b6f3eaf434a2ccf10b262c42af9c35ab27683e8e9f984d5b36ec8f59fd
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\psusxzpm.default-release\personality-provider\nb_model_build_attachment_people_and_society.json
Filesize45KB
MD5b1bd26cf5575ebb7ca511a05ea13fbd2
SHA1e83d7f64b2884ea73357b4a15d25902517e51da8
SHA2564990a5d17bea15617624c48a0c7c23d16e95f15e2ec9dd1d82ee949567bbaec0
SHA512edcede39c17b494474859bc1a9bbf18c9f6abd3f46f832086db3bb1337b01d862452d639f89f9470ca302a6fcb84a1686853ebb4b08003cb248615f0834a1e02
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\psusxzpm.default-release\personality-provider\nb_model_build_attachment_pets_and_animals.json
Filesize44KB
MD55b26aca80818dd92509f6a9013c4c662
SHA131e322209ba7cc1abd55bbb72a3c15bc2e4a895f
SHA256dd537bfb1497eb9457c0c8ecbd2846f325e13ddef3988fd293a29e68ab0b2671
SHA51229038f9f3b9b12259fb42daa93cdefabb9fb32a10f0d20f384a72fe97214eff1864b7fa2674c37224b71309d7d9cea4e36abd24a45a0e65f0c61dc5ca161ec7c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\psusxzpm.default-release\personality-provider\nb_model_build_attachment_real_estate.json
Filesize67KB
MD59899942e9cd28bcb9bf5074800eae2d0
SHA115e5071e5ed58001011652befc224aed06ee068f
SHA256efcf6b2d09e89b8c449ffbcdb5354beaa7178673862ebcdd6593561f2aa7d99a
SHA5129f7a5fbe6d46c694e8bc9b50e7843e9747ea3229cf4b00b8e95f1a5467bd095d166cbd523b3d9315c62e9603d990b8e56a018ba4a11d30ad607f5281cc42b4cd
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\psusxzpm.default-release\personality-provider\nb_model_build_attachment_reference.json
Filesize56KB
MD5567eaa19be0963b28b000826e8dd6c77
SHA17e4524c36113bbbafee34e38367b919964649583
SHA2563619daa64036d1f0197cdadf7660e390d4b6e8c1b328ed3b59f828a205a6ea49
SHA5126766919b06ca209eaed86f99bee20c6dad9cc36520fc84e1c251a668bcfe0afcf720ea6c658268dc3bbaaf602bfdf61eb237c68e08d5252ea6e5d1d2a373b9fe
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\psusxzpm.default-release\personality-provider\nb_model_build_attachment_science.json
Filesize56KB
MD57a8fd079bb1aeb4710a285ec909c62b9
SHA18429335e5866c7c21d752a11f57f76399e5634b6
SHA2569606ce3988b2d2a4921b58ac454f54e53a9ea8f358326522a8b1dcc751b50b32
SHA5128fc1546e509b5386c9e1088e0e3a1b81f288ef67f1989f3e83888057e23769907a2b184d624a4e4c44fcd5b88d719bd4cca94dfb33798804a721b8be022ec0c6
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\psusxzpm.default-release\personality-provider\nb_model_build_attachment_shopping.json
Filesize67KB
MD597d4a0fd003e123df601b5fd205e97f8
SHA1a802a515d04442b6bde60614e3d515d2983d4c00
SHA256bfd7e68ddca6696c798412402965a0384df0c8c209931bbadabf88ccb45e3bb6
SHA512111e8a96bc8e07be2d1480a820fc30797d861a48d80622425af00b009512aacb30a2df9052c53bfbf4ee0800b6e6f5b56daa93d33f30fecb52e2f3850dfa9130
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\psusxzpm.default-release\personality-provider\nb_model_build_attachment_sports.json
Filesize56KB
MD5ce4e75385300f9c03fdd52420e0f822f
SHA185c34648c253e4c88161d09dd1e25439b763628c
SHA25644da98b03350e91e852fe59f0fc05d752fc867a5049ab0363da8bb7b7078ad14
SHA512d119dc4706bbf3b6369fe72553cfacf1c9b2688e0188a7524b56d3e2ac85582a18bbee66d5594e0fb40767432646c23bf3e282090bd9b4c29f989a374aeae61f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\psusxzpm.default-release\personality-provider\nb_model_build_attachment_travel.json
Filesize67KB
MD548139e5ba1c595568f59fe880d6e4e83
SHA15e9ea36b9bb109b1ecfc41356cd5c8c9398d4a78
SHA2564336ac211a822b0a5c3ce5de0d4730665acc351ee1965ea8da1c72477e216dfa
SHA51257e826f0e1d9b12d11b05d47e2f5ae4f5787537862f26e039918cb14faff4bc854298c0b7de3023e371756a331c0f3ee1aa7cebbbf94ec70cdfc29e00a900ed1
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\psusxzpm.default-release\personality-provider\recipe_attachment.json
Filesize1KB
MD5be3d0f91b7957bbbf8a20859fd32d417
SHA1fbc0380fe1928d6d0c8ab8b0a793a2bba0722d10
SHA256fc07d42847eeaf69dcbf1b9a16eb48b141c11feb67aa40724be2aee83cb621b7
SHA5128da24afcf587fbd4f945201702168e7cfc12434440200d00f09ddcd1d1d358a5e01065ac2a411fdf96a530e94db3697e3530578b392873cf874476b5e65d774a
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\09LLF1YW\www.bing[1].xml
Filesize328B
MD5ef57291e10f85fc4eb326e902875cdba
SHA1802cbf7c0a14499bb7ba5dd018e481a0afccebca
SHA2561f359035f5b2c5ae818169318c7be82dd479e0910a6cb9b999e7992f87df20b1
SHA512834dcb60ca2b3458d784b48328f65c636c3f3e9a889aabc45f95a97eccc9eefa6015515627993c10f8e89956b9f227f5d46148c56b946277145b4913af08539e
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\09LLF1YW\www.bing[1].xml
Filesize15KB
MD5e4e4e967364da4a97e9aade59be6b158
SHA14f3e0bee079dbf2e1408d9c4b68af902752e08a3
SHA25693edb0f1b1a20dc9d9880d06e141f18a3a213d8fafe528cd2499aed50135eca6
SHA512989de7d9645e929447819963675ce5f55c556335b21eb90971273c055aa9201f5ac201c511baea442dc60079a8d5a5bc8463a3cc48b8df4a92ac0582d24b8c7e
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133857706508475239.txt
Filesize86KB
MD5ce03781a997cb1425b1e38a09bc2d1c9
SHA1375e45a652aa533c357cd4553dbdbdea0a8998e4
SHA256a289744fe30dc60d5891e3b1be5a2487c0a2f966aa5ca2b9123e0e4ae2d285e9
SHA512fb8ffa8c2aea9b0f867a20497a683c62a8e0f076bef06b4beabe72688255a7e774a2dd0aa177df1f3f4fec338474ab585615f9b3120e7b0822b95992975c6cb7
-
Filesize
73KB
MD581e5c8596a7e4e98117f5c5143293020
SHA145b7fe0989e2df1b4dfd227f8f3b73b6b7df9081
SHA2567d126ed85df9705ec4f38bd52a73b621cf64dd87a3e8f9429a569f3f82f74004
SHA51205b1e9eef13f7c140eb21f6dcb705ee3aaafabe94857aa86252afa4844de231815078a72e63d43725f6074aa5fefe765feb93a6b9cd510ee067291526bb95ec6
-
Filesize
40KB
MD548c00a7493b28139cbf197ccc8d1f9ed
SHA1a25243b06d4bb83f66b7cd738e79fccf9a02b33b
SHA256905cb1a15eccaa9b79926ee7cfe3629a6f1c6b24bdd6cea9ccb9ebc9eaa92ff7
SHA512c0b0a410ded92adc24c0f347a57d37e7465e50310011a9d636c5224d91fbc5d103920ab5ef86f29168e325b189d2f74659f153595df10eef3a9d348bb595d830
-
Filesize
160KB
MD5237e13b95ab37d0141cf0bc585b8db94
SHA1102c6164c21de1f3e0b7d487dd5dc4c5249e0994
SHA256d19b6b7c57bcee7239526339e683f62d9c2f9690947d0a446001377f0b56103a
SHA5129d0a68a806be25d2eeedba8be1acc2542d44ecd8ba4d9d123543d0f7c4732e1e490bad31cad830f788c81395f6b21d5a277c0bed251c9854440a662ac36ac4cb
-
Filesize
60KB
MD5a334bbf5f5a19b3bdb5b7f1703363981
SHA16cb50b15c0e7d9401364c0fafeef65774f5d1a2c
SHA256c33beaba130f8b740dddb9980fe9012f9322ac6e94f36a6aa6086851c51b98de
SHA5121fa170f643054c0957ed1257c4d7778976c59748670afa877d625aaa006325404bc17c41b47be2906dd3f1e229870d54eb7aba4a412de5adedbd5387e24abf46
-
Filesize
64KB
MD57c5aefb11e797129c9e90f279fbdf71b
SHA1cb9d9cbfbebb5aed6810a4e424a295c27520576e
SHA256394a17150b8774e507b8f368c2c248c10fce50fc43184b744e771f0e79ecafed
SHA512df59a30704d62fa2d598a5824aa04b4b4298f6192a01d93d437b46c4f907c90a1bad357199c51a62beb87cd724a30af55a619baef9ecf2cba032c5290938022a
-
Filesize
60KB
MD54fbbaac42cf2ecb83543f262973d07c0
SHA1ab1b302d7cce10443dfc14a2eba528a0431e1718
SHA2566550582e41fc53b8a7ccdf9ac603216937c6ff2a28e9538610adb7e67d782ab5
SHA5124146999b4bec85bcd2774ac242cb50797134e5180a3b3df627106cdfa28f61aeea75a7530094a9b408bc9699572cae8cf998108bde51b57a6690d44f0b34b69e
-
Filesize
36KB
MD5b4ac608ebf5a8fdefa2d635e83b7c0e8
SHA1d92a2861d5d1eb67ab434ff2bd0a11029b3bd9a9
SHA2568414dfe399813b7426c235ba1e625bd2b5635c8140da0d0cfc947f6565fe415f
SHA5122c42daade24c3ff01c551a223ee183301518357990a9cb2cc2dd7bf411b7059ff8e0bf1d1aee2d268eca58db25902a8048050bdb3cb48ae8be1e4c2631e3d9b4
-
Filesize
60KB
MD59fafb9d0591f2be4c2a846f63d82d301
SHA11df97aa4f3722b6695eac457e207a76a6b7457be
SHA256e78e74c24d468284639faf9dcfdba855f3e4f00b2f26db6b2c491fa51da8916d
SHA512ac0d97833beec2010f79cb1fbdb370d3a812042957f4643657e15eed714b9117c18339c737d3fd95011f873cda46ae195a5a67ae40ff2a5bcbee54d1007f110a
-
Filesize
268KB
MD55c91bf20fe3594b81052d131db798575
SHA1eab3a7a678528b5b2c60d65b61e475f1b2f45baa
SHA256e8ce546196b6878a8c34da863a6c8a7e34af18fb9b509d4d36763734efa2d175
SHA512face50db7025e0eb2e67c4f8ec272413d13491f7438287664593636e3c7e3accaef76c3003a299a1c5873d388b618da9eaede5a675c91f4c1f570b640ac605d6
-
Filesize
28KB
MD50cbf0f4c9e54d12d34cd1a772ba799e1
SHA140e55eb54394d17d2d11ca0089b84e97c19634a7
SHA2566b0b57e5b27d901f4f106b236c58d0b2551b384531a8f3dad6c06ed4261424b1
SHA512bfdb6e8387ffbba3b07869cb3e1c8ca0b2d3336aa474bd19a35e4e3a3a90427e49b4b45c09d8873d9954d0f42b525ed18070b949c6047f4e4cdb096f9c5ae5d5
-
Filesize
8KB
MD5466d35e6a22924dd846a043bc7dd94b8
SHA135e5b7439e3d49cb9dc57e7ef895a3cd8d80fb10
SHA256e4ccf06706e68621bb69add3dd88fed82d30ad8778a55907d33f6d093ac16801
SHA51223b64ed68a8f1df4d942b5a08a6b6296ec5499a13bb48536e8426d9795771dbcef253be738bf6dc7158a5815f8dcc65feb92fadf89ea8054544bb54fc83aa247
-
Filesize
2KB
MD5e4a499b9e1fe33991dbcfb4e926c8821
SHA1951d4750b05ea6a63951a7667566467d01cb2d42
SHA25649e6b848f5a708d161f795157333d7e1c7103455a2f47f50895683ef6a1abe4d
SHA512a291bb986293197a16f75b2473297286525ac5674c08a92c87b5cc1f0f2e62254ea27d626b30898e7857281bdb502f188c365311c99bda5c2dd76da0c82c554a
-
Filesize
28KB
MD5f1656b80eaae5e5201dcbfbcd3523691
SHA16f93d71c210eb59416e31f12e4cc6a0da48de85b
SHA2563f8adc1e332dd5c252bbcf92bf6079b38a74d360d94979169206db34e6a24cd2
SHA512e9c216b9725bd419414155cfdd917f998aa41c463bc46a39e0c025aa030bc02a60c28ac00d03643c24472ffe20b8bbb5447c1a55ff07db3a41d6118b647a0003
-
Filesize
7KB
MD5b127d9187c6dbb1b948053c7c9a6811f
SHA1b3073c8cad22c87dd9b8f76b6ffd0c4d0a2010d9
SHA256bd1295d19d010d4866c9d6d87877913eee69e279d4d089e5756ba285f3424e00
SHA51288e447dd4db40e852d77016cfd24e09063490456c1426a779d33d8a06124569e26597bb1e46a3a2bbf78d9bffee46402c41f0ceb44970d92c69002880ddc0476
-
Filesize
52KB
MD5316999655fef30c52c3854751c663996
SHA1a7862202c3b075bdeb91c5e04fe5ff71907dae59
SHA256ea4ca740cd60d2c88280ff8115bf354876478ef27e9e676d8b66601b4e900ba0
SHA5125555673e9863127749fc240f09cf3fb46e2019b459ad198ba1dc356ba321c41e4295b6b2e2d67079421d7e6d2fb33542b81b0c7dae812fe8e1a87ded044edd44
-
Filesize
76KB
MD5e7cd26405293ee866fefdd715fc8b5e5
SHA16326412d0ea86add8355c76f09dfc5e7942f9c11
SHA256647f7534aaaedffa93534e4cb9b24bfcf91524828ff0364d88973be58139e255
SHA5121114c5f275ecebd5be330aa53ba24d2e7d38fc20bb3bdfa1b872288783ea87a7464d2ab032b542989dee6263499e4e93ca378f9a7d2260aebccbba7fe7f53999
-
Filesize
552KB
MD5497fd4a8f5c4fcdaaac1f761a92a366a
SHA181617006e93f8a171b2c47581c1d67fac463dc93
SHA25691cd76f9fa3b25008decb12c005c194bdf66c8d6526a954de7051bec9aae462a
SHA51273d11a309d8f1a6624520a0bf56d539cb07adee6d46f2049a86919f5ce3556dc031437f797e3296311fe780a8a11a1a37b4a404de337d009e9ed961f75664a25
-
Filesize
2KB
MD57210d5407a2d2f52e851604666403024
SHA1242fde2a7c6a3eff245f06813a2e1bdcaa9f16d9
SHA256337d2fb5252fc532b7bf67476b5979d158ca2ac589e49c6810e2e1afebe296af
SHA5121755a26fa018429aea00ebcc786bb41b0d6c4d26d56cd3b88d886b0c0773d863094797334e72d770635ed29b98d4c8c7f0ec717a23a22adef705a1ccf46b3f68
-
Filesize
4KB
MD54be7661c89897eaa9b28dae290c3922f
SHA14c9d25195093fea7c139167f0c5a40e13f3000f2
SHA256e5e9f7c8dbd47134815e155ed1c7b261805eda6fddea6fa4ea78e0e4fb4f7fb5
SHA5122035b0d35a5b72f5ea5d5d0d959e8c36fc7ac37def40fa8653c45a49434cbe5e1c73aaf144cbfbefc5f832e362b63d00fc3157ca8a1627c3c1494c13a308fc7f
-
Filesize
29KB
MD5c3e8aeabd1b692a9a6c5246f8dcaa7c9
SHA14567ea5044a3cef9cb803210a70866d83535ed31
SHA25638ae07eeb7909bda291d302848b8fe5f11849cf0d597f0e5b300bfed465aed4e
SHA512f74218681bd9d526b68876331b22080f30507898b6a6ebdf173490ca84b696f06f4c97f894cb6052e926b1eee4b28264db1ead28f3bc9f627b4569c1ddcd2d3e
-
Filesize
1.2MB
MD5ed98e67fa8cc190aad0757cd620e6b77
SHA10317b10cdb8ac080ba2919e2c04058f1b6f2f94d
SHA256e0beb19c3536561f603474e3d5e3c3dff341745d317bc4d1463e2abf182bb18d
SHA512ec9c3a71ca9324644d4a2d458e9ba86f90deb9137d0a35793e0932c2aa297877ed7f1ab75729fda96690914e047f1336f100b6809cbc7a33baa1391ed588d7f0
-
Filesize
11KB
MD580d09149ca264c93e7d810aac6411d1d
SHA196e8ddc1d257097991f9cc9aaf38c77add3d6118
SHA256382d745e10944b507a8d9c69ae2e4affd4acf045729a19ac143fa8d9613ccb42
SHA5128813303cd6559e2cc726921838293377e84f9b5902603dac69d93e217ff3153b82b241d51d15808641b5c4fb99613b83912e9deda9d787b4c8ccfbd6afa56bc9
-
Filesize
2KB
MD50a250bb34cfa851e3dd1804251c93f25
SHA1c10e47a593c37dbb7226f65ad490ff65d9c73a34
SHA25685189df1c141ef5d86c93b1142e65bf03db126d12d24e18b93dd4cc9f3e438ae
SHA5128e056f4aa718221afab91c4307ff87db611faa51149310d990db296f979842d57c0653cb23d53fea54a69c99c4e5087a2eb37daa794ba62e6f08a8da41255795
-
Filesize
40KB
MD51587bf2e99abeeae856f33bf98d3512e
SHA1aa0f2a25fa5fc9edb4124e9aa906a52eb787bea9
SHA256c9106198ecbd3a9cab8c2feff07f16d6bb1adfa19550148fc96076f0f28a37b0
SHA51243161c65f2838aa0e8a9be5f3f73d4a6c78ad8605a6503aae16147a73f63fe985b17c17aedc3a4d0010d5216e04800d749b2625182acc84b905c344f0409765a
-
Filesize
1KB
MD50e581dbc510cb867773d322c22275703
SHA1e77c65e5afa7147740b9153a536ac6e7fcb8a6e0
SHA256498446f91da7facd85ec64a4b009ebd3b37df82ed8ea72634f853887689cf6d9
SHA512ce16d74e3b90bd68f407b9269c755c53960d74b6234a775e05960ebfc3655098972bde2f2c6786060bb421de2e5fec889c1b3b3493215000e2e4af5fda6918e8
-
Filesize
23B
MD50242dcc2276a78bad128831c3658e05d
SHA17f1cbfe2bbe0a88839b5bb988d83aab24b6af559
SHA256efd2129c933ee2233bf7fc74e640c0b01d9aee82a9bd08088528fe366c2d77c8
SHA512ac308ec35d4b9e3c3b4e3ce57c1459158f2f82cf0999f4a7b99c58f2431c9e096c59f493285e4f0331430ab3cc22e4d17c35791e21b177384d0f770ab053eb79
-
Filesize
32B
MD545d02203801ec5cae86ed0a68727b0fa
SHA11b22a6df3fc0ef23c6c5312c937db7c8c0df6703
SHA2565e743f477333066c29c3742cc8f9f64a8cb9c54b71dbc8c69af5025d31f8c121
SHA5128da0bf59066223aab96595c9fbf8532baa34f1f9c2c0dee674d310a82677b6c7d6a1cc0bbaa75262b986d2b805b049ec3a2bfb25a9ae30fe6d02e32660f15e83
-
Filesize
1KB
MD52283046ca6c89d23349a4ed76964e188
SHA1786a12ad143db960a78ee4e926c6db0153da4245
SHA256ed680a08263dbb1e2a66f9d41e6f2bba9a5a6805ce178326d9af1d3316c9e135
SHA512f5fb87e4fc3d75471a31302f2c68fb6ac82d5fe691b81dafe3a11a17fcd9ca5cb5ee68b96d61ee306cded4ee371df4024fcc2beac882111825053ca3c2d8ab02
-
Filesize
861KB
MD566064dbdb70a5eb15ebf3bf65aba254b
SHA10284fd320f99f62aca800fb1251eff4c31ec4ed7
SHA2566a94dbda2dd1edcff2331061d65e1baf09d4861cc7ba590c5ec754f3ac96a795
SHA512b05c6c09ae7372c381fba591c3cb13a69a2451b9d38da1a95aac89413d7438083475d06796acb5440cd6ec65b030c9fa6cbdaa0d2fe91a926bae6499c360f17f
-
Filesize
330B
MD5505a58977f0bd5542fcf8f73810d584b
SHA1f1fb32f008bfb1de1108af9a4949b84880c12949
SHA2563fa1bff72495582f12cb343f78c091d0d0ddf116dca25875c448c05c392b1b96
SHA5129d56e8e82d61e7e79f4f30ac2ac7aee084877406d7463f789a66a58d3e47f21c7fa4a3aa43ae54fff98828f425afea6a87b99560a3724129e513d3f604bc5cb3
-
Filesize
368B
MD58c2bc5be121f832a27462fc8fcaff47c
SHA1ab4e41c0ff82ab19c186bbc3f71d4ef8342b98dc
SHA2566b510d3a47c6aa9f0b258d5c01e4e1a25662d5f2ba65305b9c4c0968adc37967
SHA512ac70446384567fd1bb45c6d7da7fb5bb871ef7c80dc78472533b98fecf3ac0cf9e1b4ff2aeb634dc8c410d7d2437d51e60818c68342fd678df86f5183a8e73bc
-
Filesize
412B
MD5c23d7206b436557a5e6b38987e91ebcb
SHA1a9424ed7541094d430f41c7e4d26df98c7180a9a
SHA256633a6fbaaa13036b445decdc727efbfb89812d45689a3dc9d3890cb8bd47226b
SHA512169091f32e8f51a993995b186f10184173cd9e76993e26ab50da64c481d4868824b97f673044588d1dcff8aa1d896d97ede6ff214857f8e00e2f0e759939c70f
-
Filesize
411B
MD597ea09a08d3a0af5e956bee7b206431d
SHA17f5981536ee1d9e127cc30e0d084e6d81f27f0d9
SHA25676c53cd9e4b76e73aa3b8a1caaa25be0a4c64646b770921bc1721916c4cdc109
SHA5121987a36ef878d79da41e83a00683737fe9db475f02560f60519c03e2c8aa1df5ff2e5595a50b797ce1bb0a7f170e5a1357f85b5b27c3616e0828fadf4b8509f0
-
Filesize
532B
MD5ed8cc3fd6c2c098709a4ffcff24f57e0
SHA17c5af9a6f8364a5faf2247a1d3cce3e4f3d6b937
SHA256a4b67c15c249b215d373216fb836a74a1ad638eba34e97063b52419a83a627c9
SHA5127ed25040a9ae177260ec1131eb32b8f14da7a157b6ba70fcb3838a930d9ae50ddcc6337142500b119e1a4b18a44c1741ade0b037849b0bc3061f9af23fd5172c
-
Filesize
579B
MD56809de6edb2093051220c4bfc62a2e85
SHA1fd17c0a5e74506afc0ae7692d51725977ae78c2d
SHA2562e33a767363b5bfff1aab9960f1036f5c2993271b9541d422c40b48efeb0760a
SHA51283b386429b52a9070c75804d90bef3405a001edd6e1c074a9a3c1ecf20edf8c41444401470fa5435801d768d8006708b875580aeebc6773b2327ae1105a7d879
-
Filesize
629B
MD5994810667a50754e5d2cfcbc730e06ea
SHA16beb1e79a37f9d762e61e88504b2613b49d1e3c7
SHA25637d68676665f29facd6cb8bae05057db179376bf36e10ea379c83b5869f35ead
SHA512f21b1be05f211803738aa35f01037eade5cb8673f1095b3751b7ad247f366514951ca63366a5abbf97e0166196679f89baab7c3aec556b927cc9968b9ffd8b65
-
Filesize
268B
MD5c0078c78e22a66ab13d04494fed33767
SHA132a7818ff206a508ff8aa710a27e520fbe5a51f3
SHA256caf584e27aed40239cf40db4f60142d0514f915e66de403e9f1d846437e5b3ea
SHA512d222de879a5cad9782d243f7faa90ab5175f9fc4843483192929609cb6120580ce39bd022df9c38def7ea2b121cb47301b5ab0d8b0820e625138a42cc8d9c075
-
Filesize
245B
MD551ce69afa91cb9bd49ecfba5f47bc71e
SHA10bab7ad8e6513d56092fceea008df4a2bd77487d
SHA2564efa6712d627dbaf84f233707dc984452baac14b112c977bdeb42b454e18af9e
SHA51281abffd4818c1599ffcb46bb73197404330d4437107455b7b7082051d3721a33292124d08a705bb57d071b08cfca63d60036e08c882d90c2e401e3d5d0465ba4
-
Filesize
251B
MD596046fbea5a579760871b25682646458
SHA18c8d86d1b1ddcb18d07f6ea198baad3a554a6aaa
SHA256b8c8e7ddf3f8f1a7abdf39f18dff96e41ed1688d6870f06a1fe3af871ffd4601
SHA512c22fa0fed13719c38419c9f1032ef142b264025a68d6df64c4d6bade0347715fc931b1b7dfe22f2925e0dbec9f494c6af088a4ede4df7e707f48fc2235621249
-
Filesize
289B
MD5a9141e1a2e30e9133974c339741884b3
SHA1a1995b8face2891e047efb5581f2a01b0071189e
SHA2563b1e3de0552530e54e32f7705e84f8da4fc3cbe7c0a6658e5d6789fb7df72f9f
SHA512868be6d28106eb66154dec9c6ba28ffa289a591506d2a6aa7a9f1fe2d8f430fe7a40c553cde8c24063c03a398c3ab3ba3804a705bf5fe3b53a4278a515092953
-
Filesize
288B
MD5c24d5e1d12ab4833b23bac53e396e0b3
SHA1e08d5f6f8f431c4658f6da712ad7a264d9e4011a
SHA256b7d7c95f05cb0943c7227c06f4d43b04fe9ac7ea4820ac000e352e2900495159
SHA51214711a028f42ad7c7d2ff0b3fb841f755e2529714b6820a6489819deff1be9e2dd2667bfb258f20f6c86882d8b0ce27a521a7be33f8956b96dd13801d560345b
-
Filesize
311B
MD5e4870fb95e1cd0382ac8c703299d921f
SHA12646796f3bfd23c566c76ee226a8c3e8f8096aab
SHA2560c79fe6766c42d5bfad14963f9c33517523472449ab9267583eb980cff554570
SHA512035bdedf39da0b7f6582a73152e453b24641832e108f81f56b92c7164fe86a67449be65ee6d4d9760f80baf623839088ef076739765103b8df8a7d5457743d48
-
Filesize
298B
MD59d6e6cb73c59cef2e35c42b765714a41
SHA10fe24e341cf68d2835e631493d568fee3a2fa38b
SHA256ffa1c8effb50da04338464adb3aaf27e2963e7c85671fee19a442cdcc7950c24
SHA5120f1ccb73e9fec340af4a4f73eaa8f47af7d0e581673a2d12785f0b0313cef23db7daed6c768e2919ef073c3d8a8f36f8d6a03a27ba82e1f80f2b6b03711a5fcf
-
Filesize
293B
MD5708d1f121699ac8499145031dcd6c785
SHA1c8856dff85692e7b0ef9b3e7b366d3361f2c34f1
SHA25648e714af375430021defebe0c089de6c7ef5e7d2be0552b60cb2055fba7d6b72
SHA512fb416dbd3bc5fe3cc5012ee76425335e1cedd29404b120d7ad5c5530ee035172dfe41d61d0761c64df31004e151252eae2b8ff02eefaa918b0fc3670db665006
-
Filesize
288B
MD568378f090e7b6470d56b69776f25e746
SHA1ac6b7b47043061828e40e6b38d69d8dacecfaa0e
SHA256fc9da643d88664af635655d6fd026dc40ff958c0a14f89224a00c28fa824563e
SHA512789d8dc8e5c446b94ebdbe57dc8316fa6879fd1037d057ecdbbc751d4c0e6bdd126674aaf55240cb8d537c5ef9a458c53177d022eb4e2baef8a8008cc74b51a3
-
Filesize
4.1MB
MD5c6391727ae405fb9812a8ad2a7729402
SHA183693dc297392c6a28f7f16d23414c6d62921711
SHA256d98fbfca17f194400d19111e4813340e6666b254b99f833739b661a4d2d0217c
SHA5127a4e2ff93d853415d433f5e90b36959c78b77590aa1fa00753831eb4d01cb1a972bb9e39eb8dee5b216005e7709eacda51c0c410aacfe37fcdb163603fd36570
-
Filesize
44B
MD5dbfea325d1e00a904309a682051778ad
SHA1525562934d0866f2ba90b3c25ea005c8c5f1e9fb
SHA25615a3a3303b4a77272ddb04454333a4c06aa2a113f210ba4a03314026e0821e6d
SHA512cd853c67c2b1a44c3f592ff42d207b2251e8b9bc1eb22fc12cd710329069ef75abffccd169418c4f9bd008a40f2fbbfc6904519f27fd658f316309f94b8ff59c
-
Filesize
716B
MD53fd009050cf68105d89ef2a636c3bbed
SHA1c22eba46844659179fe23d89e6f44f700cfd1092
SHA25691f1890925d311712bc5155b7bb6f8b1eb6460b75d69448b7b7d7f87ad70efdc
SHA512b35619123d5c036e1ded515a85af84371640de22bd4aaa7495d0ed88363e66b2e95e3fdb62e52c89059a2a9419c88791ad7dda8b38fd393a04dfe71ed44e363f
-
Filesize
716B
MD59adf542ab43a9033a5df39a63686eb37
SHA17b88383a238d21923459902f66b46789b6b704e4
SHA2561f4724b357abbd1c6cfaeeed6a9436091a7ab55d3142ddf9b04c36c8e07dada2
SHA512e1f7c1f3e9b4eb2abde1f40b7ebf4a28cfeb32027532cb612d194532be1ee93af7cbfb6014af72fd2fdde053feb699913aa7af77fde6a6ba711666f1afa80ba7
-
Filesize
702B
MD55a9bf2159fb3f36264edbf9bb18a71cf
SHA1fb7dc1919f4324d19d410f08c8b5003f3894ef6f
SHA25647535cad3bdd895b23d534eba38e6fa6172ed41bb1dfa569ab52bafffe01be98
SHA51267f746026eea8efa00a11d9f41790e30174a164f55af4087b4eb8cc1a8e916b807bc256d24f33cd89c4cd3c85401cf2eec11b66782041c5f2f5b9df6a3110537
-
Filesize
716B
MD575357513a0d6729a7e12eb64d3f8aa6f
SHA1daad38d041d018869197d468b7874d2332b78b5a
SHA2566318c069ac65d542055be9767fa3c24b3fd4c88fa9d15fa89acd49d18abb5424
SHA5120a74dc6334bf0d497874699de00bb8bd8cce9e4fbf2e104fae96b5336d78ad0c9197cc2a5aa64a5644310252f238fbaedb4a6037ca94bdd1f508f877b988f815
-
Filesize
702B
MD5cc7209309922f9a4fa1b100596b27ca5
SHA1be903aba54ae8eb8f92d5de08839297ece170086
SHA25621cb871a8cd2d8c63b95330c074077045754ed0bfa656ca7c1b85f45d47dbb3a
SHA5127d196b7c5408ae7cf5f81f6922cd06736374f0963b44467dd9f7b19e98ae6c62d79824c85ffc5f32c5a4d7cb5e73e756dd175c23b9a03af2f4dc6960320e019b
-
Filesize
5KB
MD58b49e96b0bd0fe3822bd4f516ad543ab
SHA13d04d3a4377e2e1888cc2be333b129daa8d2894d
SHA256c25cbc60ff1ccca811239655636717c9ff4decb9190a557489389504b248d037
SHA51246826285f213137cedefe379ece413730a36dcde016e5ac114743cb011e587fde503df1d70ea0e6c4213993749ac4d246e4c3c980b02e01239b392d0f5892e26
-
Filesize
52KB
MD5819265cb9b45d837914f428373b06318
SHA10725f84eba20acdbd702b688ea61dee84e370b0c
SHA256dd2f2d8c0a7d767be40b0f83ac6339ec86068e4ba0f4cd0e3e5b99050dd84fcf
SHA512ae4dd3f773568072e86e694c72a08d06b9206cb704a22ced1a922bc04a61a504aee67fc32ffb4d39f9e75f74c533d409756d4d953eaf9ab89cc9fe11f702b30c
-
Filesize
3KB
MD56899249ce2f6ede73e6fcc40fb31338a
SHA1385e408274c8d250ccafed3fe7b329b2f3a0df13
SHA256d02a2c0c9917a5ff728400357aa231473cd20da01b538a0e19bc0c0b885ea212
SHA5120db15d8050a3d39a14ebe6b58ebd68f0241d3ee688988e1e2217e2c43a834dff0959ba050d7e458ab6dfb466c91a3109ead350fe58fb3daa0753f6ca1ed9d60d
-
Filesize
214B
MD514f51baaf9e518780594e20887e6fe36
SHA119f934f6a8cb11c53ae06f71457bfa643bb06576
SHA25699cc25682aa82e36757361afdd6e0436ff56cdc03993e6d60f20d052f8b9dbe5
SHA512d48e9a9e12a69fef2b6c324a9c2f1fb46d8eb931a4cde955f2c196c3ee78ac80dcfdb98cc17530854c3775db41de66b09b9ba498c550ac500ec40cdefe4caf81
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
57KB
MD5589d77eadb85bdf4c192665d565882a9
SHA14805582329ac6b80a045b82c04e1c9328565a13a
SHA2564aadc5a6fa4dfbaf3b4c635760fd55476de39ef37d27eacf5c8c6daf99230273
SHA51265d881ad2561acde5de4ceea1b1b634ddc44735b3139ab006c957f2543d33c59df6b371e1b5234f504f435595b7ac48330d9afe1fbc85fbed4acb485d1a61bb8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\G7BNKGYY0QZD792V1LFB.temp
Filesize7KB
MD5d5e04caac0ae8f848c8e7d2ba27c2d6a
SHA1029a34b2dc562749bb27b67a47e99d43fa212457
SHA256a66058f2b2219d2831860b576b7d8c057da9eadc5eb7822723d3ded2e44e10f0
SHA512638d7415b49713b1cffcbca4954aa30b2e909dd75f1783bd294c141922e6a601848b651fc36b33beab6076408586c5b01c0784ab0f2fc60c0d70608d6a4f533f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\psusxzpm.default-release\AlternateServices.bin
Filesize8KB
MD59c7a4d3cc12bdc3446c8f37a5f86dcfa
SHA1ca058e924e403cd609a5aa34e7bd80a4a54e095a
SHA256df539724529f45520d190048f72075c5f62433526e22390df4ff40a2afd00f56
SHA512e4bc3694faf7f0e9cc6bfd0790c92295612b6cfefb4d6f5edce9d564a8d7ec1f9a89f4eb9dc15359b2fa60e129e1cb2de560ca322f80c8917a1f0d0e4bf1abfd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\psusxzpm.default-release\bookmarkbackups\bookmarks-2025-03-06_11_YSPjvIsi3LO1nwnlA-o92Q==.jsonlz4
Filesize1014B
MD5df1778868c6ca78a559d77ce2b0a2097
SHA134d96bc1fa7a6c376dca801af02b748c217fde6e
SHA256b423b328fe9e076f0c52b660585d9c3eb39ddebe78212a9124f1db7302bf02e2
SHA512b29fe424b76597cbddc34ce5f20cd0564427d6cd372093e13bc852c0e84a1a0c065b2cfa4b3279a017c3e58986bc714a0695c3369ed6990b984bc3f4172f3796
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\psusxzpm.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD53a22dd70bb275c32d417009337b5f798
SHA1cb9b59b0d41e06d991ce513426d5cbd97cc86c4e
SHA256168979678c412897e8f88d707c93d07245726fd45593d4939459ffb62687ae19
SHA512e2c006dcf699e9386f22e3b0836d3a283c4122183ed3469c302c7153cd4295a0951c65074276a02c2e72327fa47b0fc920c6269f9f3a4e720c7596a413290122
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\psusxzpm.default-release\datareporting\glean\db\data.safe.tmp
Filesize27KB
MD562dca231349e3c2b1a3d072ea4d3428c
SHA114b4fe4b759c479bb4877730c569bb4a8cfe5b81
SHA256298bd497f528fe77d466eb1fd73f92645b72ebea502e5571418897ef6646881b
SHA512a95648a18293baa237cf46d3fae613bf7fb427e9e511d5244e770dbc796766e4bdc1829bbfbd156193bd72f1d9739ab8ecc72fdfe44cf0556c9be45836effcfc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\psusxzpm.default-release\datareporting\glean\db\data.safe.tmp
Filesize27KB
MD5cd3e4f45e330303eb2d11c16cb688ecf
SHA1c70bb33a87e1d5b773acd966fc8b960804e75df3
SHA256d61ba9221304a3d2686c1733f18d1b3ec1f1ca6a364d56caf0ac470aba5ada24
SHA51209de5a3e3be04e447ba30339b77fdb83e4731cb1260921fbf30a96007aa779514221ede7c406d34b8b0bf1cb19970b0dba9b03593be50436d8f5bb3706dd368f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\psusxzpm.default-release\datareporting\glean\db\data.safe.tmp
Filesize27KB
MD575332f3f41065a65106e901120df9745
SHA1c378b54f47916467f726e12c07b8b202b7dd9f69
SHA256ccd163e71d289bb722ff293dd76603faae3dd6099c9b1fc80c9958cdf6a03074
SHA512b8a32bb079798477854bc4c62fba3cd0aff42f769f56c1ae5c907d2e827534593fb447d025fe9a4812c9e75320224426007ff69f0a7aab90fd07604e89871d54
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\psusxzpm.default-release\datareporting\glean\db\data.safe.tmp
Filesize14KB
MD5a7fd8607618ebd2fd1de59182c85c3b4
SHA1e47837e91918f51e807841b2707eb505df107c94
SHA256899b0223be9f35bdadaf610cc98bab128a488030d9aca87ed8bbdd43af0bdfa7
SHA51243701c1b3e96103deb82d0e74aadef89ff410f43285147e193d852dd6affbb0736729d698fa3313e80f5a09d7800c2d55be3eab9bf940ff05a2dfa9bb17326ea
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\psusxzpm.default-release\datareporting\glean\db\data.safe.tmp
Filesize14KB
MD520078c78f9b5382d78697dc059d82b1e
SHA1e4c869d8504abecb9ef39c0cf964eb3114048f0a
SHA256e6de4d940ae45a720b2284bea3454e39b66fffd24856d22f39e0ff2b1d743487
SHA512f03fb37451255e3f6d21e5e951f2d790f1126a3b1ce65c132768c98b91f020684b26dd119525832d8a791d03f20dd390c35ce5d3296fab3f9c7a279f3cc7532f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\psusxzpm.default-release\datareporting\glean\pending_pings\9820d975-4704-4500-9fe7-fd62e7d41855
Filesize671B
MD5025feda6f2c977b40245f89ecc5fcce3
SHA1a9e26087a18b26440843c20d7d612b60766add37
SHA256d33271024b0b59bd471af459f8e0859d212989a00ce60eecafb36e053955ea5f
SHA512c0fa08420500a7bb1affdb186735e2080cc214d6ca268a53b347f879370808d4b53c749764648bda0d0affa11e7e253a6293d26d7e66d810866b03847f879efb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\psusxzpm.default-release\datareporting\glean\pending_pings\ec963811-3c34-40f5-99a0-a8ecb7b447ba
Filesize25KB
MD5fb116679edde6340f93078fb983e429a
SHA1d3a84667b52064b2eccb4abd69dfc9dce4fda302
SHA25699af1016b86fc6be03d28d98bf4cb020f539b21de9444ef4c2ecd31336abd640
SHA512b396a1ed28d7737a32612efa271464aa1510487d2f701b9015e02d1d892119d09cfeb4b42e10ccee5189c14bdb44835870f7ff6576e503d83c3606889d3d5484
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\psusxzpm.default-release\datareporting\glean\pending_pings\f0265531-636f-4d5a-9ce1-71f234e3047c
Filesize982B
MD5c7cb008a1a80663af062900c9963a04d
SHA14f98536f9badf45ce76d1cf6f611b06827d25776
SHA25645623313961c3dd9a54a7bbd26fa935c754a33cd2b2fbc9f279eb54b3871b1e4
SHA51237e33518a11b80c0f05771efabc1b235b10111835b98ecee9d047afaaf21bd08796cd71dba51b8eba3e7b46e441b0623e3377cc5ef92a0c6ba8f7500ff4c46fb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\psusxzpm.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\psusxzpm.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\psusxzpm.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\psusxzpm.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD573fecd9dfdc1c813647aa80a305c0e85
SHA12b0dba0c6548e7977f7150bae43b4b91e5a7166b
SHA256d33e9a9ca9409247af7555763578ebce41e7f2c7a24ef35d762d28010b540710
SHA512c928c25fdd5a8ed4c294a3a76853067d141e8b834377c5a17b0bf8da36125030a745c2f9bf39595e5eac7ce9fbd0a5e669e6946b0a5884911394c14148c5c737
-
Filesize
10KB
MD572014640e7c06d1232226ddb4583f929
SHA1dd26536f10c974f50eb15a16faa07991dd1e0f56
SHA2566998af28caacd3c6eb94e15f73ceb334290c0140e2c7d95276cdf209d63c4c40
SHA512e8f5e2ccb3711539ef858d787e13601698612817c1b19fe4941687d06fa199d3e3a3fd7b169e72b3f3e0b5a2c81394b3ee4d9bf58c626c9ee4c2d75bbbf3ce35
-
Filesize
15KB
MD5c138c666ced603c4a32589fe35947c40
SHA1b6f2725d80e0a8e83633ecfb9672cc5254f1cc32
SHA2567cbc3ee5ac9106d12966dd5eee06e29cb21e4121dfb6833bb08e7950333048e8
SHA5120a8ae59b7711a9ff8fbc7efc0bf72c470986d05a2f1cdba0e1717f5cb0d3e4971436a4b9e3bfba8418f0dd9a8af1c4ef1c74816ae9cf265f0a2e1cd74e23ec4c
-
Filesize
12KB
MD5664d8494f8019645e2d7351bc79e23e1
SHA1b4e6fb38488b4c6e50745c90c1e7f1512f25a24d
SHA256f3fa69abe460dfd23ca84634a75bacfb765ca7b37d7d0438bd5ab241b50b7616
SHA5126e9af9a0323e25f248135e9250d9c296df9b25f410abcca8f0c2a9db5c70bba393f818e59a32630fa38f014d7a681eb7ff7a693d4c799e82a51132f85726d216
-
Filesize
15KB
MD5838df05654c142ce313d7e6137ada18b
SHA1f8abf37331ae854420277483398b32e138981f74
SHA2563613956a5744b05ad16c2c51fb5bdfd3e9c8917c5cc26012cd455fba6740883e
SHA512619d51a0c2680edfe26337098fd1216dbd0ad5769fd6bae090b409aa8c79c0962f8d2e99457dc99485a9f2724abb89d4c0b8f6d9453c52f242c666719a6b38a1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\psusxzpm.default-release\sessionCheckpoints.json
Filesize228B
MD5a0821bc1a142e3b5bca852e1090c9f2c
SHA1e51beb8731e990129d965ddb60530d198c73825f
SHA256db037b650f36ff45da5df59bc07b0c5948f9e9b7b148ead4454ab84cb04fd0e2
SHA512997528e2ecd24a7e697d95cd1a2a7de46a3d80b37fd67fac4fb0da0db756b60a24648b7074255dc38f7651302f70894a53c3d789f3d7cd9f80fb91bd0cade4be
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\psusxzpm.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD5d17d8a39220662693e18f9088a07e1cb
SHA1ff1d86700b785d3b8068e00a44f15edd7e704e4a
SHA256ed51d5dfd750a3136f246c5343fc1352d64ecdfd37b229c78893f0a4e53082cf
SHA5123b8079d3d7b0570112926f06965affb6e6838cfad83ce35d17a34721c47583a42c5a74811b87bc8052e2d336e6ff6b0b89fc14d46702c7bf4cad626156066146
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\psusxzpm.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD55825da704fc1ca843d99709744e746a5
SHA102bfc1125196691f0062a5ba64055e57ab7f6cdd
SHA256bee9ef0520e4cad26d7cab33dd684c50a130710722d84d50eec56b850848f16c
SHA512f503b4ebb609feb4d0d2fdeed83d0170118c7938388968a471defa22db4d923b941c76908cae4441d5e140d4add2b6eda8a5f111fe070849984bcfbf1d03d998
-
Filesize
34.7MB
MD5b42ed53f1fef2c95d0b4c9d034278c2e
SHA1ec5cedd2939c82688533b4db410671610575e671
SHA2565bf0dbf99a2eac3b589013c8511413895842232dcd5e6ae608ad3524bce5c7fb
SHA5129c105ca53533a4af09f262045619bdcf24669743fd10c7ab6c3440aaee0287d049d610b45811c7da40bf23b5a5f96ccb42d0678d845ecb661f3cbf2db313ccca
-
Filesize
378KB
MD5c718a1cbf0e13674714c66694be02421
SHA1001d5370d3a7ee48db6caaecb1c213b5dfdf8e65
SHA256cde188d6c4d6e64d6abfdea1e113314f9cdf9417bca36eb7201e6b766e5f5a7f
SHA512ba0ddff47b618740dfcb63024435c36d895889dd3cf6b4559969283ba8100e8063f5c7767e56dfab67a2b5c96e4ae22e141e5b09e81be5cec9aa7ca7827b4b8a
-
Filesize
22KB
MD58703ff2e53c6fd3bc91294ef9204baca
SHA13dbb8f7f5dfe6b235486ab867a2844b1c2143733
SHA2563028a2b0e95143a4caa9bcd6ae794958e7469a20c6e673da067958cbf4310035
SHA512d5eb8a07457a78f9acd0f81d2f58bbf64b52183318b87c353a590cd2a3ac3a6ec9c1452bd52306c7cf99f19b6a897b16ceb8289a7d008c5ce3b07eda9b871204
-
Filesize
153KB
MD5f33a4e991a11baf336a2324f700d874d
SHA19da1891a164f2fc0a88d0de1ba397585b455b0f4
SHA256a87524035509ff7aa277788e1a9485618665b7da35044d70c41ec0f118f3dfd7
SHA512edf066968f31451e21c7c21d3f54b03fd5827a8526940c1e449aad7f99624577cbc6432deba49bb86e96ac275f5900dcef8d7623855eb3c808e084601ee1df20