Analysis
-
max time kernel
746s -
max time network
900s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
26/03/2025, 18:47
Static task
static1
Behavioral task
behavioral1
Sample
twarzbartolski.png
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral2
Sample
twarzbartolski.png
Resource
win11-20250314-en
General
-
Target
twarzbartolski.png
-
Size
235KB
-
MD5
e1928142c6ece419e57ffb67c188a916
-
SHA1
86b5f664641756bdb7332bcd22b01e0543019d37
-
SHA256
a5ee1f7fb3358883a72e2f3f86039f6b325ed9e18b8eeca095ae073faccb96f6
-
SHA512
6204a0d9e19b257be0637c71e611cd018562aaf4a8285868e86c59df873d977b4f19a5ed10758d2c7163c3e6555b60b2b5c4c72f1a2e02c03575ac6780c9c9c6
-
SSDEEP
6144:aNIfHohn/B55REsQ3noEAQUQV+3voVnu0AMuu76wDXtgzL1:ar/35RtQltW3voNAMRW8CzZ
Malware Config
Extracted
stealc
default
http://91.202.233.158
-
url_path
/e96ea2db21fa9a1b.php
Extracted
redline
TG CLOUD @RLREBORN Admin @FATHEROFCARDERS
89.105.223.196:29862
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/5960-2405-0x0000000000400000-0x0000000000452000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral1/memory/3216-1775-0x000000001BB00000-0x000000001BBC6000-memory.dmp family_sectoprat -
Sectoprat family
-
Stealc family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-780313508-644878201-565826771-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-780313508-644878201-565826771-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\MACHINE\software\WOW6432Node\microsoft\Active Setup\Installed Components INSTALLER.exe Key created \REGISTRY\MACHINE\software\WOW6432Node\microsoft\Active Setup\Installed Components INSTALLER.exe -
Downloads MZ/PE file 4 IoCs
flow pid Process 474 5376 firefox.exe 218 5376 firefox.exe 433 5376 firefox.exe 779 5376 firefox.exe -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Possible privilege escalation attempt 64 IoCs
pid Process 4480 Process not Found 6000 Process not Found 4744 Process not Found 4664 icacls.exe 2008 Process not Found 6844 Process not Found 2932 takeown.exe 3356 icacls.exe 4740 Process not Found 6464 Process not Found 5968 Process not Found 4556 Process not Found 4116 Process not Found 6740 Process not Found 6284 icacls.exe 5012 icacls.exe 116 takeown.exe 2564 Process not Found 5756 Process not Found 6444 Process not Found 6724 Process not Found 3756 Process not Found 1068 Process not Found 5984 Process not Found 2696 Process not Found 1232 Process not Found 2108 Process not Found 3860 Process not Found 4116 Process not Found 5724 Process not Found 6960 Process not Found 5680 icacls.exe 6860 Process not Found 3616 Process not Found 1924 Process not Found 4684 icacls.exe 4412 Process not Found 2880 Process not Found 5444 Process not Found 6336 Process not Found 2580 Process not Found 3784 Process not Found 2248 Process not Found 484 Process not Found 6300 Process not Found 1436 Process not Found 4632 Process not Found 6164 Process not Found 4040 Process not Found 2580 Process not Found 5096 Process not Found 3040 Process not Found 3748 Process not Found 5780 icacls.exe 6308 icacls.exe 4596 Process not Found 4536 Process not Found 6464 Process not Found 4440 Process not Found 2460 Process not Found 6080 Process not Found 6488 takeown.exe 1704 Process not Found 2540 Process not Found -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-780313508-644878201-565826771-1000\Control Panel\International\Geo\Nation esign-app.tmp Key value queried \REGISTRY\USER\S-1-5-21-780313508-644878201-565826771-1000\Control Panel\International\Geo\Nation esign-app.tmp Key value queried \REGISTRY\USER\S-1-5-21-780313508-644878201-565826771-1000\Control Panel\International\Geo\Nation esign-app.tmp -
Executes dropped EXE 25 IoCs
pid Process 4776 esign-app.exe 4584 esign-app.tmp 1540 esign-app.exe 3136 esign-app.tmp 1448 needmoney.exe 5056 svchost015.exe 4844 crypted.exe 4856 needmoney.exe 1972 esign-app.exe 3504 esign-app.tmp 1704 esign-app.exe 4320 esign-app.tmp 664 svchost015.exe 2292 esign-app.exe 2028 esign-app.tmp 5152 esign-app.exe 3376 esign-app.tmp 6252 needmoney.exe 6396 svchost015.exe 6448 crypted.exe 6192 Bonzify.exe 7108 INSTALLER.exe 6292 AgentSvr.exe 5868 INSTALLER.exe 5912 AgentSvr.exe -
Loads dropped DLL 41 IoCs
pid Process 4584 esign-app.tmp 4584 esign-app.tmp 3136 esign-app.tmp 3136 esign-app.tmp 1480 regsvr32.exe 3216 regsvr32.exe 3092 regsvr32.EXE 1080 regsvr32.EXE 3504 esign-app.tmp 3504 esign-app.tmp 4320 esign-app.tmp 4320 esign-app.tmp 1972 regsvr32.exe 480 regsvr32.exe 2028 esign-app.tmp 2028 esign-app.tmp 3376 esign-app.tmp 3376 esign-app.tmp 2292 regsvr32.exe 456 regsvr32.exe 6692 regsvr32.EXE 456 regsvr32.EXE 3344 regsvr32.EXE 6576 regsvr32.EXE 7108 INSTALLER.exe 5072 regsvr32.exe 6188 regsvr32.exe 1928 regsvr32.exe 6432 regsvr32.exe 5444 regsvr32.exe 6224 regsvr32.exe 1184 regsvr32.exe 5868 INSTALLER.exe 2068 regsvr32.exe 2068 regsvr32.exe 6772 regsvr32.exe 6192 Bonzify.exe 5912 AgentSvr.exe 5912 AgentSvr.exe 5912 AgentSvr.exe 6624 regsvr32.EXE -
Modifies file permissions 1 TTPs 64 IoCs
pid Process 5560 icacls.exe 6464 icacls.exe 1396 icacls.exe 852 Process not Found 6740 Process not Found 2288 Process not Found 1212 Process not Found 4316 takeown.exe 6848 Process not Found 4012 Process not Found 6640 Process not Found 756 icacls.exe 4684 Process not Found 6348 Process not Found 60 Process not Found 6296 Process not Found 3740 Process not Found 6112 Process not Found 5712 Process not Found 6928 Process not Found 5152 Process not Found 1120 Process not Found 4708 Process not Found 4296 Process not Found 6904 Process not Found 6116 Process not Found 5096 Process not Found 6284 takeown.exe 6844 Process not Found 6828 Process not Found 4780 Process not Found 5204 Process not Found 5552 Process not Found 1348 icacls.exe 6484 icacls.exe 6452 takeown.exe 6392 takeown.exe 6032 Process not Found 2008 Process not Found 6484 Process not Found 948 Process not Found 3136 Process not Found 2540 Process not Found 4960 Process not Found 1620 Process not Found 756 icacls.exe 5132 Process not Found 5576 icacls.exe 4820 icacls.exe 3468 Process not Found 7024 Process not Found 4404 Process not Found 1664 Process not Found 6592 icacls.exe 7056 Process not Found 6172 Process not Found 2452 Process not Found 2348 Process not Found 5348 Process not Found 1464 Process not Found 6060 Process not Found 2068 icacls.exe 4620 icacls.exe 2312 Process not Found -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tv_enua = "RunDll32 advpack.dll,LaunchINFSection C:\\Windows\\INF\\tv_enua.inf, RemoveCabinet" INSTALLER.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
pid Process 5072 powershell.exe 5072 powershell.exe 1348 powershell.exe 5448 powershell.exe 2292 powershell.exe 1240 powershell.exe 6552 powershell.exe 5560 powershell.exe 2516 Process not Found 3268 powershell.exe 5776 powershell.exe 5208 powershell.exe 6708 powershell.exe 6696 Process not Found -
Enumerates connected drives 3 TTPs 4 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\E: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\E: explorer.exe -
File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 16 IoCs
flow ioc 446 pastebin.com 447 pastebin.com 778 raw.githubusercontent.com 971 camo.githubusercontent.com 973 camo.githubusercontent.com 780 raw.githubusercontent.com 781 raw.githubusercontent.com 972 camo.githubusercontent.com 991 drive.google.com 1076 raw.githubusercontent.com 779 raw.githubusercontent.com 987 drive.google.com 988 drive.google.com 974 camo.githubusercontent.com 989 drive.google.com 990 drive.google.com -
Power Settings 1 TTPs 6 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 4664 cmd.exe 4316 takeown.exe 3496 icacls.exe 3996 Process not Found 4992 Process not Found 5012 Process not Found -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\SETC68C.tmp INSTALLER.exe File created C:\Windows\SysWOW64\SETC68C.tmp INSTALLER.exe File opened for modification C:\Windows\SysWOW64\msvcp50.dll INSTALLER.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 1448 set thread context of 5056 1448 needmoney.exe 154 PID 4844 set thread context of 5960 4844 crypted.exe 169 PID 4856 set thread context of 664 4856 needmoney.exe 176 PID 6252 set thread context of 6396 6252 needmoney.exe 186 PID 6448 set thread context of 6504 6448 crypted.exe 189 -
Drops file in Windows directory 56 IoCs
description ioc Process File opened for modification C:\Windows\msagent\mslwvtts.dll INSTALLER.exe File created C:\Windows\lhsp\tv\SETC687.tmp INSTALLER.exe File created C:\Windows\lhsp\tv\SETC688.tmp INSTALLER.exe File created C:\Windows\fonts\SETC68A.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\AgentSvr.exe INSTALLER.exe File opened for modification C:\Windows\msagent\AgentMPx.dll INSTALLER.exe File opened for modification C:\Windows\msagent\SETC3CC.tmp INSTALLER.exe File opened for modification C:\Windows\help\SETC3D1.tmp INSTALLER.exe File opened for modification C:\Windows\lhsp\tv\tv_enua.dll INSTALLER.exe File opened for modification C:\Windows\fonts\andmoipa.ttf INSTALLER.exe File opened for modification C:\Windows\INF\SETC68B.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\AgentCtl.dll INSTALLER.exe File opened for modification C:\Windows\msagent\SETC3C8.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\AgentDPv.dll INSTALLER.exe File opened for modification C:\Windows\msagent\SETC3C9.tmp INSTALLER.exe File created C:\Windows\msagent\SETC3C9.tmp INSTALLER.exe File created C:\Windows\msagent\SETC3CC.tmp INSTALLER.exe File created C:\Windows\msagent\SETC3CD.tmp INSTALLER.exe File created C:\Windows\msagent\SETC3D0.tmp INSTALLER.exe File created C:\Windows\msagent\SETC3B8.tmp INSTALLER.exe File created C:\Windows\msagent\SETC3CA.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\AgentSR.dll INSTALLER.exe File created C:\Windows\INF\SETC3CF.tmp INSTALLER.exe File opened for modification C:\Windows\INF\agtinst.inf INSTALLER.exe File created C:\Windows\help\SETC3D1.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\intl\SETC3E2.tmp INSTALLER.exe File created C:\Windows\msagent\intl\SETC3E2.tmp INSTALLER.exe File created C:\Windows\msagent\SETC3CB.tmp INSTALLER.exe File created C:\Windows\msagent\SETC3CE.tmp INSTALLER.exe File opened for modification C:\Windows\INF\SETC3CF.tmp INSTALLER.exe File opened for modification C:\Windows\help\Agt0409.hlp INSTALLER.exe File opened for modification C:\Windows\lhsp\help\SETC689.tmp INSTALLER.exe File opened for modification C:\Windows\lhsp\help\tv_enua.hlp INSTALLER.exe File opened for modification C:\Windows\msagent\SETC3B8.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\AgentDp2.dll INSTALLER.exe File opened for modification C:\Windows\msagent\SETC3CE.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\intl\Agt0409.dll INSTALLER.exe File opened for modification C:\Windows\msagent\SETC3E3.tmp INSTALLER.exe File created C:\Windows\msagent\SETC3E3.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\AgtCtl15.tlb INSTALLER.exe File opened for modification C:\Windows\lhsp\tv\SETC688.tmp INSTALLER.exe File created C:\Windows\executables.bin Bonzify.exe File opened for modification C:\Windows\msagent\AgentAnm.dll INSTALLER.exe File opened for modification C:\Windows\msagent\SETC3D0.tmp INSTALLER.exe File opened for modification C:\Windows\lhsp\tv\tvenuax.dll INSTALLER.exe File opened for modification C:\Windows\fonts\SETC68A.tmp INSTALLER.exe File created C:\Windows\INF\SETC68B.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\SETC3CD.tmp INSTALLER.exe File opened for modification C:\Windows\lhsp\tv\SETC687.tmp INSTALLER.exe File created C:\Windows\lhsp\help\SETC689.tmp INSTALLER.exe File opened for modification C:\Windows\INF\tv_enua.inf INSTALLER.exe File created C:\Windows\msagent\chars\Bonzi.acs Bonzify.exe File created C:\Windows\msagent\SETC3C8.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\SETC3CA.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\SETC3CB.tmp INSTALLER.exe File opened for modification C:\Windows\msagent\AgentPsh.dll INSTALLER.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 4 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File created C:\Users\Admin\Downloads\esign-app.exe:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\needmoney.exe:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\crypted.exe:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\Bonzify.exe:Zone.Identifier firefox.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 2 IoCs
pid Process 4720 cmd.exe 6592 Process not Found -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language esign-app.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 9 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 400 cmd.exe 3160 Process not Found 6428 Process not Found 6472 cmd.exe 6492 Process not Found 3640 Process not Found 3804 Process not Found 2820 Process not Found 4820 cmd.exe -
Checks SCSI registry key(s) 3 TTPs 39 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName explorer.exe -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Kills process with taskkill 1 IoCs
pid Process 6252 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-780313508-644878201-565826771-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-780313508-644878201-565826771-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DE8EF600-2F82-11D1-ACAC-00C04FD97575}\TypeLib\ = "{F5BE8BC2-7DE6-11D0-91FE-00C04FD701A5}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.lwv regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F5BE8BC2-7DE6-11D0-91FE-00C04FD701A5}\1.5\ = "Microsoft Agent Control 1.5" AgentSvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A7B93C85-7B81-11D0-AC5F-00C04FD97575}\TypeLib AgentSvr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A7B93C8B-7B81-11D0-AC5F-00C04FD97575}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" AgentSvr.exe Key created \REGISTRY\USER\S-1-5-21-780313508-644878201-565826771-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-780313508-644878201-565826771-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F5BE8BD2-7DE6-11D0-91FE-00C04FD701A5}\TypeLib\ = "{F5BE8BC2-7DE6-11D0-91FE-00C04FD701A5}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A7B93C80-7B81-11D0-AC5F-00C04FD97575}\ProxyStubClsid32 AgentSvr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{08C75162-3C9C-11D1-91FE-00C04FD701A5}\TypeLib\ = "{A7B93C73-7B81-11D0-AC5F-00C04FD97575}" AgentSvr.exe Set value (int) \REGISTRY\USER\S-1-5-21-780313508-644878201-565826771-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\IconSize = "16" firefox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8B77181C-D3EF-11D1-8500-00C04FA34A14}\TypeLib\ = "{F5BE8BC2-7DE6-11D0-91FE-00C04FD701A5}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F5BE8BDF-7DE6-11D0-91FE-00C04FD701A5}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D45FD31E-5C6E-11D1-9EC1-00C04FD7081F}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B0913412-3B44-11D1-ACBA-00C04FD97575} AgentSvr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A7B93C89-7B81-11D0-AC5F-00C04FD97575}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" AgentSvr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A7B93CA0-7B81-11D0-AC5F-00C04FD97575}\TypeLib\ = "{A7B93C73-7B81-11D0-AC5F-00C04FD97575}" AgentSvr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A7B93C8B-7B81-11D0-AC5F-00C04FD97575}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" AgentSvr.exe Set value (data) \REGISTRY\USER\S-1-5-21-780313508-644878201-565826771-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 00000000ffffffff firefox.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D45FD31B-5C6E-11D1-9EC1-00C04FD7081F} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F5BE8BE8-7DE6-11D0-91FE-00C04FD701A5}\TypeLib\ = "{F5BE8BC2-7DE6-11D0-91FE-00C04FD701A5}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F5BE8BDB-7DE6-11D0-91FE-00C04FD701A5}\ = "IAgentCtlAudioObject" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB64DF2F-88E4-11D0-9E87-00C04FD7081F}\ = "Microsoft Agent DocFile Provider 1.5" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D45FD301-5C6E-11D1-9EC1-00C04FD7081F}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A7B93C87-7B81-11D0-AC5F-00C04FD97575}\TypeLib AgentSvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D7A6D440-8872-11D1-9EC6-00C04FD7081F}\TypeLib AgentSvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F5BE8BD9-7DE6-11D0-91FE-00C04FD701A5}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F5BE8BD4-7DE6-11D0-91FE-00C04FD701A5}\ = "_AgentEvents" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D45FD31E-5C6E-11D1-9EC1-00C04FD7081F} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D45FD2FC-5C6E-11D1-9EC1-00C04FD7081F}\LocalServer32 AgentSvr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A7B93C91-7B81-11D0-AC5F-00C04FD97575}\TypeLib\Version = "2.0" AgentSvr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A7B93C83-7B81-11D0-AC5F-00C04FD97575}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" AgentSvr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A7B93C89-7B81-11D0-AC5F-00C04FD97575}\TypeLib\Version = "2.0" AgentSvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A7B93CA0-7B81-11D0-AC5F-00C04FD97575}\ProxyStubClsid32 AgentSvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F5BE8BE1-7DE6-11D0-91FE-00C04FD701A5} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8563FF20-8ECC-11D1-B9B4-00C04FD97575} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Agent.Character2.2\shellex\PropertySheetHandlers\CharacterPage regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A7B93C73-7B81-11D0-AC5F-00C04FD97575}\2.0\FLAGS\ = "0" AgentSvr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A7B93C91-7B81-11D0-AC5F-00C04FD97575}\TypeLib\ = "{A7B93C73-7B81-11D0-AC5F-00C04FD97575}" AgentSvr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B0913412-3B44-11D1-ACBA-00C04FD97575}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" AgentSvr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A7B93C8D-7B81-11D0-AC5F-00C04FD97575}\TypeLib\ = "{A7B93C73-7B81-11D0-AC5F-00C04FD97575}" AgentSvr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{48D12BA0-5B77-11D1-9EC1-00C04FD7081F}\ = "IAgentEx" AgentSvr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F5BE8BD9-7DE6-11D0-91FE-00C04FD701A5}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95A893C3-543A-11D0-AC45-00C04FD97575}\TreatAs\ = "{D45FD31C-5C6E-11D1-9EC1-00C04FD7081F}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A7B93C80-7B81-11D0-AC5F-00C04FD97575}\TypeLib AgentSvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A7B93C85-7B81-11D0-AC5F-00C04FD97575}\ProxyStubClsid32 AgentSvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A7B93C87-7B81-11D0-AC5F-00C04FD97575}\ProxyStubClsid32 AgentSvr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48D12BA0-5B77-11D1-9EC1-00C04FD7081F}\TypeLib\ = "{A7B93C73-7B81-11D0-AC5F-00C04FD97575}" AgentSvr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6D0ECB23-9968-11D0-AC6E-00C04FD97575}\ = "IAgentCommandWindow" AgentSvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-780313508-644878201-565826771-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\Microsoft.Windows.ControlPanel\WFlags = "0" explorer.exe Key created \REGISTRY\USER\S-1-5-21-780313508-644878201-565826771-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-780313508-644878201-565826771-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{65F125E5-7BE1-4810-BA9D-D271C8432CE3}" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B0913410-3B44-11D1-ACBA-00C04FD97575}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F5BE8BDD-7DE6-11D0-91FE-00C04FD701A5}\ = "IAgentCtlSpeechInput" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F5BE8BD4-7DE6-11D0-91FE-00C04FD701A5}\ = "_AgentEvents" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4BAC124B-78C8-11D1-B9A8-00C04FD97575}\ = "Agent Custom Proxy Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A7B93C8B-7B81-11D0-AC5F-00C04FD97575}\ = "IAgentPropertySheet" AgentSvr.exe Set value (int) \REGISTRY\USER\S-1-5-21-780313508-644878201-565826771-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\Microsoft.Windows.ControlPanel\HotKey = "0" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D45FD31B-5C6E-11D1-9EC1-00C04FD7081F}\MiscStatus\1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F5BE8BE1-7DE6-11D0-91FE-00C04FD701A5}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{98BBE491-2EED-11D1-ACAC-00C04FD97575} AgentSvr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{08C75162-3C9C-11D1-91FE-00C04FD701A5}\TypeLib AgentSvr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F5BE8BD3-7DE6-11D0-91FE-00C04FD701A5}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe -
Modifies system certificate store 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 0b000000010000004800000054006900740061006e00690075006d00200052006f006f007400200043006500720074006900660069006300610074006500200041007500740068006f00720069007400790000000200000001000000cc0000001c0000006c00000001000000000000000000000000000000010000007b00340031003700340034004200450034002d0031003100430035002d0034003900340043002d0041003200310033002d004200410030004300450039003400340039003300380045007d00000000004d006900630072006f0073006f0066007400200045006e00680061006e006300650064002000430072007900700074006f0067007200610070006800690063002000500072006f00760069006400650072002000760031002e00300000000000030000000100000014000000f1a578c4cb5de79a370893983fd4da8b67b2b06420000000010000000a03000030820306308201eea003020102020867f7beb96a4c2798300d06092a864886f70d01010b0500302e312c302a06035504030c23546974616e69756d20526f6f7420436572746966696361746520417574686f72697479301e170d3233303331343130333532305a170d3236303631373130333532305a302e312c302a06035504030c23546974616e69756d20526f6f7420436572746966696361746520417574686f7269747930820122300d06092a864886f70d01010105000382010f003082010a028201010086e4577a5861ce819177d005fa51d5515a936c610ccfcbde5332cd151da647ee881a245c9b02833b02af3d76fe20bd3bfaf7a20973e72ebd9440d09d8c3d2713bdf0d09feb9532acd7a42da2a952daa86a2a88ee427d30959d90bfba05276aa02998a6986fc01306629b79b8405d1f1fa6d9a42f827afc7566340dc2de27012b94bb4a27b3cb1c219a3cb2c14203f34451bd626520edd4dbcc414f593f2acbc48479f7143cbe139cfd129c913e5303dc20f94c44358901b69a848d7ea02e308a311560ac00ae009a29109aeed9713dd8919b97ed598058e17f0726c7a020f710abc06291dfaaf181c6be6a76c89cb68eb0b0ec1cd95f326c7e55588bfd76c5190203010001a328302630130603551d25040c300a06082b06010505070301300f0603551d130101ff040530030101ff300d06092a864886f70d01010b0500038201010070851293d757e982797dc5f7f27da894ef0cdb329f06a6096e0cf604b0e54711560ef40f5282082e210f55a3db41f312548b7611f5f0dacea3c78b13f6fc243c02b106665be69e184088415b273999b877bee353a248cec7eeb5a095c2174bc9526cafe3372c59dbfbe758134ed351e5147273fec68577ae4552a6f99ac80ca8d0ee422af528858c6be81cb0a8031ab0ae83c0eb5564f4e87a5c06295d3903eee2fdf92d62a7f4d4054deaa79bcaebda4e8b1a6efd42aef9d01c7075728cb13aa8557c85a72532b5e2d6c3e55041c9867ca8f562bbd2ab0c3710d83173ec3781d1dcaac5c6e07ee726624dfdc5814cffd336e17932f89beb9cf7fdbee9bebf61 RegAsm.exe -
NTFS ADS 5 IoCs
description ioc Process File created C:\Users\Admin\Downloads\esign-app.exe:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\needmoney.exe:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\crypted.exe:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\Bonzify.exe:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\whisper.x64:Zone.Identifier firefox.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 6548 explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5272 mspaint.exe 5272 mspaint.exe 3136 esign-app.tmp 3136 esign-app.tmp 3216 regsvr32.exe 3216 regsvr32.exe 3268 powershell.exe 3268 powershell.exe 3268 powershell.exe 5072 powershell.exe 5072 powershell.exe 5072 powershell.exe 3216 regsvr32.exe 3216 regsvr32.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 3092 regsvr32.EXE -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 1884 taskmgr.exe 3216 regsvr32.exe 5152 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 5376 firefox.exe Token: SeDebugPrivilege 5376 firefox.exe Token: SeDebugPrivilege 5376 firefox.exe Token: SeDebugPrivilege 5376 firefox.exe Token: SeDebugPrivilege 5376 firefox.exe Token: SeDebugPrivilege 5376 firefox.exe Token: SeDebugPrivilege 5376 firefox.exe Token: SeDebugPrivilege 3268 powershell.exe Token: SeIncreaseQuotaPrivilege 3268 powershell.exe Token: SeSecurityPrivilege 3268 powershell.exe Token: SeTakeOwnershipPrivilege 3268 powershell.exe Token: SeLoadDriverPrivilege 3268 powershell.exe Token: SeSystemProfilePrivilege 3268 powershell.exe Token: SeSystemtimePrivilege 3268 powershell.exe Token: SeProfSingleProcessPrivilege 3268 powershell.exe Token: SeIncBasePriorityPrivilege 3268 powershell.exe Token: SeCreatePagefilePrivilege 3268 powershell.exe Token: SeBackupPrivilege 3268 powershell.exe Token: SeRestorePrivilege 3268 powershell.exe Token: SeShutdownPrivilege 3268 powershell.exe Token: SeDebugPrivilege 3268 powershell.exe Token: SeSystemEnvironmentPrivilege 3268 powershell.exe Token: SeRemoteShutdownPrivilege 3268 powershell.exe Token: SeUndockPrivilege 3268 powershell.exe Token: SeManageVolumePrivilege 3268 powershell.exe Token: SeImpersonatePrivilege 3268 powershell.exe Token: 33 3268 powershell.exe Token: 34 3268 powershell.exe Token: 35 3268 powershell.exe Token: 36 3268 powershell.exe Token: SeDebugPrivilege 5072 powershell.exe Token: SeIncreaseQuotaPrivilege 5072 powershell.exe Token: SeSecurityPrivilege 5072 powershell.exe Token: SeTakeOwnershipPrivilege 5072 powershell.exe Token: SeLoadDriverPrivilege 5072 powershell.exe Token: SeSystemProfilePrivilege 5072 powershell.exe Token: SeSystemtimePrivilege 5072 powershell.exe Token: SeProfSingleProcessPrivilege 5072 powershell.exe Token: SeIncBasePriorityPrivilege 5072 powershell.exe Token: SeCreatePagefilePrivilege 5072 powershell.exe Token: SeBackupPrivilege 5072 powershell.exe Token: SeRestorePrivilege 5072 powershell.exe Token: SeShutdownPrivilege 5072 powershell.exe Token: SeDebugPrivilege 5072 powershell.exe Token: SeSystemEnvironmentPrivilege 5072 powershell.exe Token: SeRemoteShutdownPrivilege 5072 powershell.exe Token: SeUndockPrivilege 5072 powershell.exe Token: SeManageVolumePrivilege 5072 powershell.exe Token: SeImpersonatePrivilege 5072 powershell.exe Token: 33 5072 powershell.exe Token: 34 5072 powershell.exe Token: 35 5072 powershell.exe Token: 36 5072 powershell.exe Token: SeIncreaseQuotaPrivilege 5072 powershell.exe Token: SeSecurityPrivilege 5072 powershell.exe Token: SeTakeOwnershipPrivilege 5072 powershell.exe Token: SeLoadDriverPrivilege 5072 powershell.exe Token: SeSystemProfilePrivilege 5072 powershell.exe Token: SeSystemtimePrivilege 5072 powershell.exe Token: SeProfSingleProcessPrivilege 5072 powershell.exe Token: SeIncBasePriorityPrivilege 5072 powershell.exe Token: SeCreatePagefilePrivilege 5072 powershell.exe Token: SeBackupPrivilege 5072 powershell.exe Token: SeRestorePrivilege 5072 powershell.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 3136 esign-app.tmp 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe 1884 taskmgr.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 5272 mspaint.exe 5272 mspaint.exe 5272 mspaint.exe 5272 mspaint.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe 3060 firefox.exe 3216 regsvr32.exe 5376 firefox.exe 5376 firefox.exe 5376 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2456 wrote to memory of 5376 2456 firefox.exe 95 PID 2456 wrote to memory of 5376 2456 firefox.exe 95 PID 2456 wrote to memory of 5376 2456 firefox.exe 95 PID 2456 wrote to memory of 5376 2456 firefox.exe 95 PID 2456 wrote to memory of 5376 2456 firefox.exe 95 PID 2456 wrote to memory of 5376 2456 firefox.exe 95 PID 2456 wrote to memory of 5376 2456 firefox.exe 95 PID 2456 wrote to memory of 5376 2456 firefox.exe 95 PID 2456 wrote to memory of 5376 2456 firefox.exe 95 PID 2456 wrote to memory of 5376 2456 firefox.exe 95 PID 2456 wrote to memory of 5376 2456 firefox.exe 95 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 2644 5376 firefox.exe 96 PID 5376 wrote to memory of 5652 5376 firefox.exe 97 PID 5376 wrote to memory of 5652 5376 firefox.exe 97 PID 5376 wrote to memory of 5652 5376 firefox.exe 97 PID 5376 wrote to memory of 5652 5376 firefox.exe 97 PID 5376 wrote to memory of 5652 5376 firefox.exe 97 PID 5376 wrote to memory of 5652 5376 firefox.exe 97 PID 5376 wrote to memory of 5652 5376 firefox.exe 97 PID 5376 wrote to memory of 5652 5376 firefox.exe 97 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\twarzbartolski.png"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5272
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:2920
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Downloads MZ/PE file
- Subvert Trust Controls: Mark-of-the-Web Bypass
- Checks processor information in registry
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5376 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 1996 -prefsLen 27100 -prefMapHandle 2000 -prefMapSize 270279 -ipcHandle 2088 -initialChannelId {9219cf7e-61e2-4c24-bad2-5c11b9f74a98} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu3⤵PID:2644
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2456 -prefsLen 27136 -prefMapHandle 2460 -prefMapSize 270279 -ipcHandle 2476 -initialChannelId {52b1e9e2-0720-4c92-82d4-feba2fe72f91} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket3⤵PID:5652
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3832 -prefsLen 27277 -prefMapHandle 3836 -prefMapSize 270279 -jsInitHandle 3840 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3848 -initialChannelId {4f281d7a-5d88-4ca4-bcc5-006abb7cb7ef} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab3⤵
- Checks processor information in registry
PID:1916
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 4052 -prefsLen 27277 -prefMapHandle 4056 -prefMapSize 270279 -ipcHandle 4132 -initialChannelId {0ee48c28-4f30-47a6-8d09-7c11325619a1} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd3⤵PID:3660
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 2852 -prefsLen 34776 -prefMapHandle 2856 -prefMapSize 270279 -jsInitHandle 2864 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 2892 -initialChannelId {f93a456d-d631-403b-b9e1-fc113b828e28} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab3⤵
- Checks processor information in registry
PID:4460
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 5208 -prefsLen 35013 -prefMapHandle 5204 -prefMapSize 270279 -ipcHandle 5224 -initialChannelId {d273e34e-797a-49bc-9200-2af50d533c78} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility3⤵
- Checks processor information in registry
PID:4888
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5352 -prefsLen 32900 -prefMapHandle 5356 -prefMapSize 270279 -jsInitHandle 5360 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 2952 -initialChannelId {a0a3e104-9e83-4d19-bead-ab3ba50d1a79} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab3⤵
- Checks processor information in registry
PID:4528
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5568 -prefsLen 32952 -prefMapHandle 5572 -prefMapSize 270279 -jsInitHandle 5576 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5584 -initialChannelId {456a8af3-b303-4f83-9e72-179f75df0d6d} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab3⤵
- Checks processor information in registry
PID:3212
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5888 -prefsLen 33031 -prefMapHandle 5892 -prefMapSize 270279 -jsInitHandle 5896 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5904 -initialChannelId {d6021d26-4a2c-4649-a2ec-44d6c7145184} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab3⤵
- Checks processor information in registry
PID:5124
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 4956 -prefsLen 36503 -prefMapHandle 4960 -prefMapSize 270279 -jsInitHandle 4952 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 6616 -initialChannelId {4b67ecee-1b49-44cc-985e-404fc4d22d20} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 10 tab3⤵
- Checks processor information in registry
PID:3116
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 2952 -prefsLen 36553 -prefMapHandle 1488 -prefMapSize 270279 -jsInitHandle 1496 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 6156 -initialChannelId {0fd42e98-402a-4ff0-b17e-e01132eb52ba} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 11 tab3⤵
- Checks processor information in registry
PID:2608
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 6224 -prefsLen 36553 -prefMapHandle 6096 -prefMapSize 270279 -jsInitHandle 6852 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 6736 -initialChannelId {42141097-c021-4f43-81bc-e36602efa935} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 12 tab3⤵
- Checks processor information in registry
PID:5316
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 6900 -prefsLen 36553 -prefMapHandle 6904 -prefMapSize 270279 -jsInitHandle 6908 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 6876 -initialChannelId {1282ae34-863f-4bc0-a5af-8b202068886d} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 13 tab3⤵
- Checks processor information in registry
PID:3204
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 6080 -prefsLen 36553 -prefMapHandle 3108 -prefMapSize 270279 -jsInitHandle 5084 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 7068 -initialChannelId {f0794e9a-2fff-4632-bc05-b222a614589e} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 14 tab3⤵
- Checks processor information in registry
PID:2824
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5160 -prefsLen 36553 -prefMapHandle 6160 -prefMapSize 270279 -jsInitHandle 6712 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 1628 -initialChannelId {c25a25b1-5b57-403a-b6f5-2ed3d388a191} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 15 tab3⤵
- Checks processor information in registry
PID:532
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 6464 -prefsLen 36553 -prefMapHandle 2832 -prefMapSize 270279 -jsInitHandle 3280 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 6216 -initialChannelId {627d5fe2-2e56-44d7-a110-b71bf064d863} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 16 tab3⤵
- Checks processor information in registry
PID:4056
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 6092 -prefsLen 36593 -prefMapHandle 7048 -prefMapSize 270279 -jsInitHandle 6652 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 7372 -initialChannelId {fd5bf23d-a905-4f0e-988b-aa650734cf1c} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 17 tab3⤵
- Checks processor information in registry
PID:5760
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5876 -prefsLen 36593 -prefMapHandle 5556 -prefMapSize 270279 -jsInitHandle 6740 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 6316 -initialChannelId {c3320b60-dc2e-40af-932a-07867fb557a8} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 18 tab3⤵
- Checks processor information in registry
PID:1492
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5960 -prefsLen 36593 -prefMapHandle 5920 -prefMapSize 270279 -jsInitHandle 6188 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 1388 -initialChannelId {b48fa396-1e17-4c8f-a20f-9cf0d116eb8c} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 19 tab3⤵
- Checks processor information in registry
PID:4720
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 6268 -prefsLen 36593 -prefMapHandle 6284 -prefMapSize 270279 -jsInitHandle 5428 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 7160 -initialChannelId {b7924738-70d9-4760-81d6-4c4e345d6aca} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 20 tab3⤵
- Checks processor information in registry
PID:5508
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 7864 -prefsLen 36593 -prefMapHandle 7848 -prefMapSize 270279 -jsInitHandle 7868 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 7560 -initialChannelId {5e16765b-d610-4354-83f8-12fe88c241db} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 21 tab3⤵
- Checks processor information in registry
PID:848
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 7388 -prefsLen 36593 -prefMapHandle 7036 -prefMapSize 270279 -jsInitHandle 7448 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 7660 -initialChannelId {77554cdb-4414-4ab7-ab85-47a98a519b72} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 22 tab3⤵PID:5336
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 6172 -prefsLen 36593 -prefMapHandle 5928 -prefMapSize 270279 -jsInitHandle 4864 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 7648 -initialChannelId {37d29f5e-582b-461a-a533-fa812a8a34e9} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 23 tab3⤵
- Checks processor information in registry
PID:2652
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 4836 -prefsLen 36593 -prefMapHandle 6180 -prefMapSize 270279 -jsInitHandle 3284 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 7692 -initialChannelId {db60ca39-380d-4d2e-aa8e-bdef4b0aace9} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 24 tab3⤵
- Checks processor information in registry
PID:3048
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 7140 -prefsLen 36593 -prefMapHandle 7580 -prefMapSize 270279 -jsInitHandle 7592 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 8020 -initialChannelId {2931173c-cbf9-4d95-9f13-3139ab47fe0e} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 25 tab3⤵
- Checks processor information in registry
PID:5880
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 8276 -prefsLen 36593 -prefMapHandle 8224 -prefMapSize 270279 -jsInitHandle 8220 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 6704 -initialChannelId {95054c4b-29ed-4077-9984-9d77f2239fa1} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 26 tab3⤵
- Checks processor information in registry
PID:2268
-
-
C:\Users\Admin\Downloads\esign-app.exe"C:\Users\Admin\Downloads\esign-app.exe"3⤵
- Executes dropped EXE
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\is-5F1HI.tmp\esign-app.tmp"C:\Users\Admin\AppData\Local\Temp\is-5F1HI.tmp\esign-app.tmp" /SL5="$901D2,1592193,247808,C:\Users\Admin\Downloads\esign-app.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4584 -
C:\Users\Admin\Downloads\esign-app.exe"C:\Users\Admin\Downloads\esign-app.exe" /VERYSILENT5⤵
- Executes dropped EXE
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\is-UQ213.tmp\esign-app.tmp"C:\Users\Admin\AppData\Local\Temp\is-UQ213.tmp\esign-app.tmp" /SL5="$A01D2,1592193,247808,C:\Users\Admin\Downloads\esign-app.exe" /VERYSILENT6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:3136 -
C:\Windows\SysWOW64\regsvr32.exe"regsvr32.exe" /s /i:SYNC "C:\Users\Admin\AppData\Roaming\\6fwpuclnt_9.drv"7⤵
- Loads dropped DLL
PID:1480 -
C:\Windows\system32\regsvr32.exe/s /i:SYNC "C:\Users\Admin\AppData\Roaming\\6fwpuclnt_9.drv"8⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3216 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:SYNC C:\Users\Admin\AppData\Roaming\6fwpuclnt_9.drv' }) { exit 0 } else { exit 1 }"9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3268
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/S /i:SYNC C:\Users\Admin\AppData\Roaming\6fwpuclnt_9.drv\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{71809B2C-483E-4444-8F8A-0DF4EBA0B6C8}' -Description 'MicrosoftEdgeUpdateTaskMachineUA' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5072
-
-
-
-
-
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 6316 -prefsLen 36593 -prefMapHandle 6020 -prefMapSize 270279 -jsInitHandle 7516 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 6248 -initialChannelId {b927b2b1-c389-4ced-85e9-74ca93690dc5} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 27 tab3⤵
- Checks processor information in registry
PID:984
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 6240 -prefsLen 36593 -prefMapHandle 7080 -prefMapSize 270279 -jsInitHandle 7076 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 7000 -initialChannelId {198b9f40-7bc3-48a7-a134-e1377ac7ce40} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 28 tab3⤵
- Checks processor information in registry
PID:2572
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 4 -prefsHandle 7992 -prefsLen 39683 -prefMapHandle 7412 -prefMapSize 270279 -ipcHandle 8080 -initialChannelId {8a8d9edd-d12c-4bb9-8403-734949825e19} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -appDir "C:\Program Files\Mozilla Firefox\browser" - 29 utility3⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3060
-
-
C:\Users\Admin\Downloads\needmoney.exe"C:\Users\Admin\Downloads\needmoney.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exeC:\Users\Admin\AppData\Local\Temp\svchost015.exe4⤵
- Executes dropped EXE
PID:5056
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 7988 -prefsLen 36593 -prefMapHandle 7028 -prefMapSize 270279 -jsInitHandle 6240 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 7848 -initialChannelId {12307908-3bed-425d-805f-c2543abe128d} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 30 tab3⤵
- Checks processor information in registry
PID:2004
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 9004 -prefsLen 36593 -prefMapHandle 9036 -prefMapSize 270279 -jsInitHandle 9040 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 9000 -initialChannelId {6f38cd54-c1aa-4976-88e8-2b08e857549a} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 31 tab3⤵
- Checks processor information in registry
PID:2416
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 9196 -prefsLen 36593 -prefMapHandle 9200 -prefMapSize 270279 -jsInitHandle 9204 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 9184 -initialChannelId {3210f672-ef0e-4d5d-bf95-ca0bd195e643} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 32 tab3⤵
- Checks processor information in registry
PID:5524
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 7472 -prefsLen 36593 -prefMapHandle 9176 -prefMapSize 270279 -jsInitHandle 5456 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 1628 -initialChannelId {9764dba8-3e6c-4eba-a0c4-0a29372e29f6} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 33 tab3⤵
- Checks processor information in registry
PID:2280
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 6528 -prefsLen 36593 -prefMapHandle 6172 -prefMapSize 270279 -jsInitHandle 8208 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 8044 -initialChannelId {1273c408-9323-45aa-a404-a5df5b38b798} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 34 tab3⤵
- Checks processor information in registry
PID:5280
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5516 -prefsLen 36593 -prefMapHandle 9336 -prefMapSize 270279 -jsInitHandle 7472 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 6808 -initialChannelId {5d61435a-f6fd-4a3f-8d31-44eead8fc52a} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 35 tab3⤵
- Checks processor information in registry
PID:4880
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 9148 -prefsLen 36593 -prefMapHandle 8252 -prefMapSize 270279 -jsInitHandle 7628 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 9316 -initialChannelId {2c041759-f3d9-4841-8b34-341dcf2a5b85} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 36 tab3⤵
- Checks processor information in registry
PID:2016
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 9348 -prefsLen 36593 -prefMapHandle 8208 -prefMapSize 270279 -jsInitHandle 8748 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 1624 -initialChannelId {d010124a-4d8b-4220-9deb-a1d2949fd879} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 37 tab3⤵
- Checks processor information in registry
PID:4836
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 8156 -prefsLen 36633 -prefMapHandle 8140 -prefMapSize 270279 -jsInitHandle 8260 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 8184 -initialChannelId {840241b0-8742-4b23-9faf-ad67db9cb804} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 38 tab3⤵
- Checks processor information in registry
PID:4700
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 7004 -prefsLen 36633 -prefMapHandle 9448 -prefMapSize 270279 -jsInitHandle 9440 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 9048 -initialChannelId {81b8bcc8-4f5f-4a8a-978f-676ce430c204} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 39 tab3⤵
- Checks processor information in registry
PID:4012
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 9320 -prefsLen 36633 -prefMapHandle 9324 -prefMapSize 270279 -jsInitHandle 9208 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 7352 -initialChannelId {0b5d8e99-3b88-4976-bf2c-c0297bbc62d8} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 40 tab3⤵
- Checks processor information in registry
PID:6920
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 9344 -prefsLen 36633 -prefMapHandle 9092 -prefMapSize 270279 -jsInitHandle 8016 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5424 -initialChannelId {4c2b2524-e1a8-4b4a-b606-731fac471a06} -parentPid 5376 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5376" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 41 tab3⤵
- Checks processor information in registry
PID:3104
-
-
C:\Users\Admin\Downloads\Bonzify.exe"C:\Users\Admin\Downloads\Bonzify.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:6192 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\KillAgent.bat"4⤵PID:5208
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im AgentSvr.exe5⤵
- Kills process with taskkill
PID:6252
-
-
C:\Windows\SysWOW64\takeown.exetakeown /r /d y /f C:\Windows\MsAgent5⤵PID:4892
-
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\MsAgent /c /t /grant "everyone":(f)5⤵PID:5944
-
-
-
C:\Users\Admin\AppData\Local\Temp\INSTALLER.exeINSTALLER.exe /q4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:7108 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\AgentCtl.dll"5⤵
- Loads dropped DLL
- Modifies registry class
PID:5072
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\AgentDPv.dll"5⤵
- Loads dropped DLL
- Modifies registry class
PID:6188
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\mslwvtts.dll"5⤵
- Loads dropped DLL
- Modifies registry class
PID:1928
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\AgentDP2.dll"5⤵
- Loads dropped DLL
- Modifies registry class
PID:6432
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\AgentMPx.dll"5⤵
- Loads dropped DLL
- Modifies registry class
PID:5444
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\AgentSR.dll"5⤵
- Loads dropped DLL
PID:6224
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Windows\msagent\AgentPsh.dll"5⤵
- Loads dropped DLL
- Modifies registry class
PID:1184
-
-
C:\Windows\msagent\AgentSvr.exe"C:\Windows\msagent\AgentSvr.exe" /regserver5⤵
- Executes dropped EXE
- Modifies registry class
PID:6292
-
-
C:\Windows\SysWOW64\grpconv.exegrpconv.exe -o5⤵PID:6656
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\servicing\TrustedInstaller.exe"4⤵PID:5912
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\servicing\TrustedInstaller.exe"5⤵PID:6904
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\servicing\TrustedInstaller.exe" /grant "everyone":(f)5⤵PID:6124
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\Speech\Common\sapisvr.exe"4⤵PID:7124
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\Speech\Common\sapisvr.exe"5⤵PID:468
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\Speech\Common\sapisvr.exe" /grant "everyone":(f)5⤵PID:5828
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\splwow64.exe"4⤵PID:4632
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\splwow64.exe"5⤵PID:6636
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\splwow64.exe" /grant "everyone":(f)5⤵PID:4364
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\sysmon.exe"4⤵PID:3620
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\sysmon.exe"5⤵PID:6612
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\sysmon.exe" /grant "everyone":(f)5⤵PID:6172
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\agentactivationruntimestarter.exe"4⤵PID:6152
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\agentactivationruntimestarter.exe"5⤵PID:7000
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\agentactivationruntimestarter.exe" /grant "everyone":(f)5⤵PID:6212
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\appidtel.exe"4⤵PID:5324
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\appidtel.exe"5⤵PID:5152
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\appidtel.exe" /grant "everyone":(f)5⤵PID:408
-
-
-
C:\Users\Admin\AppData\Local\Temp\INSTALLER.exeINSTALLER.exe /q4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
PID:5868 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s C:\Windows\lhsp\tv\tv_enua.dll5⤵
- Loads dropped DLL
PID:2068
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s C:\Windows\lhsp\tv\tvenuax.dll5⤵
- Loads dropped DLL
PID:6772
-
-
C:\Windows\SysWOW64\grpconv.exegrpconv.exe -o5⤵PID:4224
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\ARP.EXE"4⤵PID:6584
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\ARP.EXE"5⤵PID:7052
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\ARP.EXE" /grant "everyone":(f)5⤵PID:6120
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\at.exe"4⤵PID:2456
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\at.exe"5⤵PID:3696
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\at.exe" /grant "everyone":(f)5⤵PID:1820
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\AtBroker.exe"4⤵PID:6124
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\AtBroker.exe"5⤵PID:5524
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\AtBroker.exe" /grant "everyone":(f)5⤵PID:3020
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\attrib.exe"4⤵PID:3884
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\attrib.exe"5⤵PID:5772
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\attrib.exe" /grant "everyone":(f)5⤵PID:4632
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\auditpol.exe"4⤵PID:4716
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\auditpol.exe"5⤵PID:6924
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\auditpol.exe" /grant "everyone":(f)5⤵PID:6420
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\autochk.exe"4⤵PID:532
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:6224
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\autochk.exe"5⤵PID:3064
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\autochk.exe" /grant "everyone":(f)5⤵PID:3992
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\autoconv.exe"4⤵PID:7008
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\autoconv.exe"5⤵PID:6152
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\autoconv.exe" /grant "everyone":(f)5⤵PID:4856
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\autofmt.exe"4⤵PID:4172
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\autofmt.exe"5⤵PID:408
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\autofmt.exe" /grant "everyone":(f)5⤵PID:6732
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\backgroundTaskHost.exe"4⤵PID:6540
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\backgroundTaskHost.exe"5⤵PID:3704
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\backgroundTaskHost.exe" /grant "everyone":(f)5⤵
- System Location Discovery: System Language Discovery
PID:4796
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\BackgroundTransferHost.exe"4⤵PID:4964
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\BackgroundTransferHost.exe"5⤵PID:6176
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\BackgroundTransferHost.exe" /grant "everyone":(f)5⤵PID:7108
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\bitsadmin.exe"4⤵PID:3124
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\bitsadmin.exe"5⤵PID:116
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\bitsadmin.exe" /grant "everyone":(f)5⤵PID:1924
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\bootcfg.exe"4⤵PID:1704
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\bootcfg.exe"5⤵PID:1396
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\bootcfg.exe" /grant "everyone":(f)5⤵
- Modifies file permissions
PID:6464
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\bthudtask.exe"4⤵
- System Location Discovery: System Language Discovery
PID:6548 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\bthudtask.exe"5⤵PID:2064
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\bthudtask.exe" /grant "everyone":(f)5⤵PID:4416
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\ByteCodeGenerator.exe"4⤵PID:4476
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\ByteCodeGenerator.exe"5⤵PID:5136
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\ByteCodeGenerator.exe" /grant "everyone":(f)5⤵PID:2740
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\cacls.exe"4⤵PID:6904
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\cacls.exe"5⤵PID:1932
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\cacls.exe" /grant "everyone":(f)5⤵PID:3784
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\calc.exe"4⤵PID:1708
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\calc.exe"5⤵PID:1820
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\calc.exe" /grant "everyone":(f)5⤵PID:3428
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\CameraSettingsUIHost.exe"4⤵PID:4188
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\CameraSettingsUIHost.exe"5⤵PID:4224
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\CameraSettingsUIHost.exe" /grant "everyone":(f)5⤵PID:5496
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\CertEnrollCtrl.exe"4⤵PID:5456
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\CertEnrollCtrl.exe"5⤵PID:4676
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\CertEnrollCtrl.exe" /grant "everyone":(f)5⤵PID:5780
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\certreq.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4756 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\certreq.exe"5⤵PID:1628
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\certreq.exe" /grant "everyone":(f)5⤵PID:3884
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\certutil.exe"4⤵PID:5988
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:1928
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\certutil.exe"5⤵PID:232
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\certutil.exe" /grant "everyone":(f)5⤵PID:6608
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\charmap.exe"4⤵PID:4716
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\charmap.exe"5⤵PID:4720
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\charmap.exe" /grant "everyone":(f)5⤵
- System Location Discovery: System Language Discovery
PID:3064
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\CheckNetIsolation.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4548 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\CheckNetIsolation.exe"5⤵PID:6212
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\CheckNetIsolation.exe" /grant "everyone":(f)5⤵PID:7008
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\chkdsk.exe"4⤵
- System Location Discovery: System Language Discovery
PID:5580 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\chkdsk.exe"5⤵PID:5372
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\chkdsk.exe" /grant "everyone":(f)5⤵PID:6520
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\chkntfs.exe"4⤵
- System Location Discovery: System Language Discovery
PID:6656 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\chkntfs.exe"5⤵
- System Location Discovery: System Language Discovery
PID:352
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\chkntfs.exe" /grant "everyone":(f)5⤵PID:6384
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\choice.exe"4⤵PID:1028
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\choice.exe"5⤵PID:6228
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\choice.exe" /grant "everyone":(f)5⤵PID:6484
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\cipher.exe"4⤵PID:6176
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\cipher.exe"5⤵PID:3124
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\cipher.exe" /grant "everyone":(f)5⤵PID:2652
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\cleanmgr.exe"4⤵PID:3496
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\cleanmgr.exe"5⤵PID:6592
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\cleanmgr.exe" /grant "everyone":(f)5⤵PID:6492
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\cliconfg.exe"4⤵PID:3512
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\cliconfg.exe"5⤵PID:4680
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\cliconfg.exe" /grant "everyone":(f)5⤵PID:4444
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\clip.exe"4⤵PID:6112
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\clip.exe"5⤵PID:2612
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\clip.exe" /grant "everyone":(f)5⤵PID:5600
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\CloudNotifications.exe"4⤵PID:948
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\CloudNotifications.exe"5⤵PID:4744
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\CloudNotifications.exe" /grant "everyone":(f)5⤵PID:1932
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\cmd.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4296 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:2456
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\cmd.exe"5⤵PID:3696
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\cmd.exe" /grant "everyone":(f)5⤵PID:5792
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\cmdkey.exe"4⤵PID:3088
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\cmdkey.exe"5⤵PID:4344
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\cmdkey.exe" /grant "everyone":(f)5⤵PID:5180
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\cmdl32.exe"4⤵PID:924
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\cmdl32.exe"5⤵PID:6372
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\cmdl32.exe" /grant "everyone":(f)5⤵PID:3616
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\cmmon32.exe"4⤵PID:6472
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\cmmon32.exe"5⤵PID:4148
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\cmmon32.exe" /grant "everyone":(f)5⤵
- Possible privilege escalation attempt
PID:5680
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\cmstp.exe"4⤵PID:6924
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\cmstp.exe"5⤵PID:6816
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\cmstp.exe" /grant "everyone":(f)5⤵PID:3620
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\colorcpl.exe"4⤵PID:532
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\colorcpl.exe"5⤵PID:3992
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\colorcpl.exe" /grant "everyone":(f)5⤵PID:7000
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\Com\comrepl.exe"4⤵PID:6916
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\Com\comrepl.exe"5⤵PID:5184
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\Com\comrepl.exe" /grant "everyone":(f)5⤵PID:4172
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\Com\MigRegDB.exe"4⤵PID:2252
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:6152
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\Com\MigRegDB.exe"5⤵PID:5516
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\Com\MigRegDB.exe" /grant "everyone":(f)5⤵PID:3704
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\comp.exe"4⤵PID:2312
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\comp.exe"5⤵PID:6488
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\comp.exe" /grant "everyone":(f)5⤵PID:6228
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\compact.exe"4⤵PID:708
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\compact.exe"5⤵PID:6796
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\compact.exe" /grant "everyone":(f)5⤵PID:6708
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\ComputerDefaults.exe"4⤵PID:1384
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\ComputerDefaults.exe"5⤵PID:5984
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\ComputerDefaults.exe" /grant "everyone":(f)5⤵PID:5340
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\control.exe"4⤵PID:2280
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\control.exe"5⤵
- System Location Discovery: System Language Discovery
PID:5636
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\control.exe" /grant "everyone":(f)5⤵PID:4416
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\convert.exe"4⤵PID:4840
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\convert.exe"5⤵PID:5168
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\convert.exe" /grant "everyone":(f)5⤵PID:4316
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\CredentialUIBroker.exe"4⤵PID:4336
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\CredentialUIBroker.exe"5⤵PID:4476
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\CredentialUIBroker.exe" /grant "everyone":(f)5⤵PID:5548
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\credwiz.exe"4⤵PID:6800
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\credwiz.exe"5⤵PID:6904
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\credwiz.exe" /grant "everyone":(f)5⤵
- System Location Discovery: System Language Discovery
PID:6284
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\cscript.exe"4⤵PID:6772
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\cscript.exe"5⤵PID:2156
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\cscript.exe" /grant "everyone":(f)5⤵PID:6632
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\ctfmon.exe"4⤵PID:5252
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\ctfmon.exe"5⤵PID:4820
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\ctfmon.exe" /grant "everyone":(f)5⤵PID:5072
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\cttune.exe"4⤵PID:5124
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\cttune.exe"5⤵PID:3884
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\cttune.exe" /grant "everyone":(f)5⤵PID:6188
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\cttunesvr.exe"4⤵PID:6612
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:4148
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\cttunesvr.exe"5⤵PID:6608
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\cttunesvr.exe" /grant "everyone":(f)5⤵PID:5988
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\curl.exe"4⤵PID:6816
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\curl.exe"5⤵PID:532
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\curl.exe" /grant "everyone":(f)5⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:1348
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\dccw.exe"4⤵PID:3992
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\dccw.exe"5⤵PID:3928
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\dccw.exe" /grant "everyone":(f)5⤵PID:6436
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\dcomcnfg.exe"4⤵PID:6520
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\dcomcnfg.exe"5⤵PID:5516
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\dcomcnfg.exe" /grant "everyone":(f)5⤵PID:3956
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\ddodiag.exe"4⤵PID:2252
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\ddodiag.exe"5⤵PID:4784
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\ddodiag.exe" /grant "everyone":(f)5⤵PID:4796
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\DevicePairingWizard.exe"4⤵
- System Location Discovery: System Language Discovery
PID:352 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\DevicePairingWizard.exe"5⤵PID:4492
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\DevicePairingWizard.exe" /grant "everyone":(f)5⤵
- Modifies file permissions
PID:6484
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\dfrgui.exe"4⤵PID:708
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\dfrgui.exe"5⤵PID:4220
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\dfrgui.exe" /grant "everyone":(f)5⤵PID:6596
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\dialer.exe"4⤵
- System Location Discovery: System Language Discovery
PID:5984 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\dialer.exe"5⤵PID:5132
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\dialer.exe" /grant "everyone":(f)5⤵PID:6688
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\diskpart.exe"4⤵PID:3764
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\diskpart.exe"5⤵PID:4652
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\diskpart.exe" /grant "everyone":(f)5⤵PID:4444
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\diskperf.exe"4⤵PID:6548
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\diskperf.exe"5⤵
- System Location Discovery: System Language Discovery
PID:1796
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\diskperf.exe" /grant "everyone":(f)5⤵PID:5600
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\Dism\DismHost.exe"4⤵PID:6112
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:5136
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\Dism\DismHost.exe"5⤵PID:3428
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\Dism\DismHost.exe" /grant "everyone":(f)5⤵PID:2840
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\Dism.exe"4⤵PID:948
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\Dism.exe"5⤵PID:5916
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\Dism.exe" /grant "everyone":(f)5⤵
- Modifies file permissions
PID:5576
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\dllhost.exe"4⤵PID:4188
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:3696
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\dllhost.exe"5⤵PID:5780
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\dllhost.exe" /grant "everyone":(f)5⤵PID:6372
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\dllhst3g.exe"4⤵PID:2028
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\dllhst3g.exe"5⤵
- System Location Discovery: System Language Discovery
PID:5816
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\dllhst3g.exe" /grant "everyone":(f)5⤵PID:6352
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\doskey.exe"4⤵PID:5840
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\doskey.exe"5⤵PID:6432
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\doskey.exe" /grant "everyone":(f)5⤵PID:6924
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\dpapimig.exe"4⤵PID:7036
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\dpapimig.exe"5⤵PID:2528
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\dpapimig.exe" /grant "everyone":(f)5⤵PID:2144
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\DpiScaling.exe"4⤵PID:1964
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\DpiScaling.exe"5⤵PID:4240
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\DpiScaling.exe" /grant "everyone":(f)5⤵PID:7128
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\dplaysvr.exe"4⤵
- System Location Discovery: System Language Discovery
PID:408 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\dplaysvr.exe"5⤵PID:2472
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\dplaysvr.exe" /grant "everyone":(f)5⤵PID:4892
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\dpnsvr.exe"4⤵PID:5580
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\dpnsvr.exe"5⤵PID:6736
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\dpnsvr.exe" /grant "everyone":(f)5⤵
- System Location Discovery: System Language Discovery
PID:6552
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\driverquery.exe"4⤵PID:6184
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\driverquery.exe"5⤵PID:1028
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\driverquery.exe" /grant "everyone":(f)5⤵PID:5380
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\dtdump.exe"4⤵PID:392
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:352
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\dtdump.exe"5⤵PID:6892
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\dtdump.exe" /grant "everyone":(f)5⤵
- System Location Discovery: System Language Discovery
PID:6000
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\dvdplay.exe"4⤵PID:2652
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\dvdplay.exe"5⤵PID:3732
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\dvdplay.exe" /grant "everyone":(f)5⤵PID:1704
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\DWWIN.EXE"4⤵PID:3160
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\DWWIN.EXE"5⤵PID:2216
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\DWWIN.EXE" /grant "everyone":(f)5⤵PID:1840
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\dxdiag.exe"4⤵PID:4416
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\dxdiag.exe"5⤵
- System Location Discovery: System Language Discovery
PID:2068
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\dxdiag.exe" /grant "everyone":(f)5⤵PID:2876
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\EaseOfAccessDialog.exe"4⤵PID:4684
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\EaseOfAccessDialog.exe"5⤵PID:4476
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\EaseOfAccessDialog.exe" /grant "everyone":(f)5⤵PID:1852
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\edpnotify.exe"4⤵PID:6912
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\edpnotify.exe"5⤵PID:5308
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\edpnotify.exe" /grant "everyone":(f)5⤵
- Possible privilege escalation attempt
PID:6284
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\efsui.exe"4⤵PID:2156
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\efsui.exe"5⤵PID:4120
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\efsui.exe" /grant "everyone":(f)5⤵PID:4620
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\EhStorAuthn.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4820 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\EhStorAuthn.exe"5⤵
- System Location Discovery: System Language Discovery
PID:5252
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\EhStorAuthn.exe" /grant "everyone":(f)5⤵PID:5444
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\esentutl.exe"4⤵PID:2452
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\esentutl.exe"5⤵PID:468
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\esentutl.exe" /grant "everyone":(f)5⤵PID:5872
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\eudcedit.exe"4⤵PID:3744
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\eudcedit.exe"5⤵PID:5840
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\eudcedit.exe" /grant "everyone":(f)5⤵
- Modifies file permissions
PID:756
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\eventcreate.exe"4⤵PID:6224
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\eventcreate.exe"5⤵PID:6608
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\eventcreate.exe" /grant "everyone":(f)5⤵PID:2848
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\eventvwr.exe"4⤵PID:4240
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:6212
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\eventvwr.exe"5⤵PID:6816
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\eventvwr.exe" /grant "everyone":(f)5⤵PID:7128
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\expand.exe"4⤵PID:920
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\expand.exe"5⤵PID:3928
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\expand.exe" /grant "everyone":(f)5⤵PID:4892
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\explorer.exe"4⤵PID:224
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\explorer.exe"5⤵PID:6160
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\explorer.exe" /grant "everyone":(f)5⤵PID:6736
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\extrac32.exe"4⤵PID:6708
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\extrac32.exe"5⤵PID:5152
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\extrac32.exe" /grant "everyone":(f)5⤵PID:2184
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\F12\IEChooser.exe"4⤵PID:5340
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\F12\IEChooser.exe"5⤵PID:4492
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\F12\IEChooser.exe" /grant "everyone":(f)5⤵PID:7076
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\fc.exe"4⤵PID:4664
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:3496
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\fc.exe"5⤵PID:708
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\fc.exe" /grant "everyone":(f)5⤵PID:3732
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\find.exe"4⤵PID:472
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\find.exe"5⤵PID:2064
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\find.exe" /grant "everyone":(f)5⤵PID:1840
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\findstr.exe"4⤵
- System Location Discovery: System Language Discovery
PID:6908 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:5548
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\findstr.exe"5⤵PID:6548
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\findstr.exe" /grant "everyone":(f)5⤵PID:2876
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\finger.exe"4⤵PID:3056
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\finger.exe"5⤵PID:2916
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\finger.exe" /grant "everyone":(f)5⤵PID:1852
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\fixmapi.exe"4⤵PID:3088
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\fixmapi.exe"5⤵PID:6864
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\fixmapi.exe" /grant "everyone":(f)5⤵PID:5308
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\fltMC.exe"4⤵PID:1512
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\fltMC.exe"5⤵PID:6772
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\fltMC.exe" /grant "everyone":(f)5⤵PID:4620
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\Fondue.exe"4⤵PID:1628
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\Fondue.exe"5⤵PID:5316
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\Fondue.exe" /grant "everyone":(f)5⤵PID:5444
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\fontdrvhost.exe"4⤵PID:6168
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\fontdrvhost.exe"5⤵PID:5816
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\fontdrvhost.exe" /grant "everyone":(f)5⤵PID:6420
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\fontview.exe"4⤵PID:3864
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\fontview.exe"5⤵PID:3964
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\fontview.exe" /grant "everyone":(f)5⤵PID:6156
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\forfiles.exe"4⤵PID:6900
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\forfiles.exe"5⤵PID:5184
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\forfiles.exe" /grant "everyone":(f)5⤵PID:3992
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\fsquirt.exe"4⤵PID:6392
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\fsquirt.exe"5⤵PID:4172
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\fsquirt.exe" /grant "everyone":(f)5⤵PID:6320
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\fsutil.exe"4⤵
- System Location Discovery: System Language Discovery
PID:6228 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\fsutil.exe"5⤵PID:3956
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\fsutil.exe" /grant "everyone":(f)5⤵PID:2252
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\ftp.exe"4⤵PID:6252
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\ftp.exe"5⤵PID:4784
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\ftp.exe" /grant "everyone":(f)5⤵PID:5380
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\GameBarPresenceWriter.exe"4⤵PID:6176
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:4856
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\GameBarPresenceWriter.exe"5⤵PID:1696
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\GameBarPresenceWriter.exe" /grant "everyone":(f)5⤵PID:6464
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\GamePanel.exe"4⤵PID:6892
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:116
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\GamePanel.exe"5⤵PID:4492
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\GamePanel.exe" /grant "everyone":(f)5⤵PID:3048
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\getmac.exe"4⤵PID:6576
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\getmac.exe"5⤵PID:708
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\getmac.exe" /grant "everyone":(f)5⤵PID:3764
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\gpresult.exe"4⤵PID:1384
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\gpresult.exe"5⤵PID:3004
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\gpresult.exe" /grant "everyone":(f)5⤵PID:5200
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\gpscript.exe"4⤵PID:2280
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\gpscript.exe"5⤵PID:6548
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\gpscript.exe" /grant "everyone":(f)5⤵PID:5112
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\gpupdate.exe"4⤵PID:4568
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\gpupdate.exe"5⤵PID:2916
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\gpupdate.exe" /grant "everyone":(f)5⤵PID:4572
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\grpconv.exe"4⤵PID:2612
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\grpconv.exe"5⤵PID:2456
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\grpconv.exe" /grant "everyone":(f)5⤵PID:6632
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\hdwwiz.exe"4⤵PID:7124
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:1820
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\hdwwiz.exe"5⤵PID:4188
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\hdwwiz.exe" /grant "everyone":(f)5⤵PID:6580
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\help.exe"4⤵
- System Location Discovery: System Language Discovery
PID:6004 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\help.exe"5⤵PID:5872
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\help.exe" /grant "everyone":(f)5⤵
- System Location Discovery: System Language Discovery
PID:5444
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\hh.exe"4⤵PID:6420
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\hh.exe"5⤵PID:6432
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\hh.exe" /grant "everyone":(f)5⤵PID:2932
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\HOSTNAME.EXE"4⤵PID:4436
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:3064
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\HOSTNAME.EXE"5⤵PID:3964
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\HOSTNAME.EXE" /grant "everyone":(f)5⤵PID:6860
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\icacls.exe"4⤵
- System Location Discovery: System Language Discovery
PID:6224 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:4548
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\icacls.exe"5⤵PID:3992
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\icacls.exe" /grant "everyone":(f)5⤵PID:2312
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\icsunattend.exe"4⤵PID:4240
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\icsunattend.exe"5⤵
- System Location Discovery: System Language Discovery
PID:6320
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\icsunattend.exe" /grant "everyone":(f)5⤵PID:5704
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\ieUnatt.exe"4⤵
- System Location Discovery: System Language Discovery
PID:6048 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\ieUnatt.exe"5⤵PID:3956
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\ieUnatt.exe" /grant "everyone":(f)5⤵PID:3124
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\iexpress.exe"4⤵PID:6732
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\iexpress.exe"5⤵
- System Location Discovery: System Language Discovery
PID:5380
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\iexpress.exe" /grant "everyone":(f)5⤵PID:6832
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\IME\IMEJP\IMJPDCT.EXE"4⤵PID:6796
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\IME\IMEJP\IMJPDCT.EXE"5⤵PID:1696
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\IME\IMEJP\IMJPDCT.EXE" /grant "everyone":(f)5⤵PID:7092
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\IME\IMEJP\IMJPSET.EXE"4⤵PID:4220
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:6384
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\IME\IMEJP\IMJPSET.EXE"5⤵PID:4664
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\IME\IMEJP\IMJPSET.EXE" /grant "everyone":(f)5⤵PID:2216
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\IME\IMEJP\IMJPUEX.EXE"4⤵PID:3764
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:6688
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\IME\IMEJP\IMJPUEX.EXE"5⤵PID:2064
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\IME\IMEJP\IMJPUEX.EXE" /grant "everyone":(f)5⤵
- Modifies file permissions
PID:2068
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\IME\IMEJP\imjpuexc.exe"4⤵PID:4652
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\IME\IMEJP\imjpuexc.exe"5⤵PID:4296
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\IME\IMEJP\imjpuexc.exe" /grant "everyone":(f)5⤵PID:6232
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\IME\IMETC\IMTCLNWZ.EXE"4⤵PID:4336
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\IME\IMETC\IMTCLNWZ.EXE"5⤵PID:3428
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\IME\IMETC\IMTCLNWZ.EXE" /grant "everyone":(f)5⤵PID:6440
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\IME\IMETC\IMTCPROP.exe"4⤵PID:6284
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\IME\IMETC\IMTCPROP.exe"5⤵PID:6100
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\IME\IMETC\IMTCPROP.exe" /grant "everyone":(f)5⤵PID:5308
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\IME\SHARED\IMCCPHR.exe"4⤵PID:6772
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\IME\SHARED\IMCCPHR.exe"5⤵PID:5792
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\IME\SHARED\IMCCPHR.exe" /grant "everyone":(f)5⤵PID:4224
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\IME\SHARED\imecfmui.exe"4⤵PID:6124
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\IME\SHARED\imecfmui.exe"5⤵PID:1628
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\IME\SHARED\imecfmui.exe" /grant "everyone":(f)5⤵PID:3884
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\IME\SHARED\IMEPADSV.EXE"4⤵PID:232
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\IME\SHARED\IMEPADSV.EXE"5⤵PID:5816
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\IME\SHARED\IMEPADSV.EXE" /grant "everyone":(f)5⤵
- Modifies file permissions
PID:756
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\IME\SHARED\IMESEARCH.EXE"4⤵PID:6220
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\IME\SHARED\IMESEARCH.EXE"5⤵PID:2028
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\IME\SHARED\IMESEARCH.EXE" /grant "everyone":(f)5⤵PID:6608
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\IME\SHARED\IMEWDBLD.EXE"4⤵PID:3848
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\IME\SHARED\IMEWDBLD.EXE"5⤵PID:6900
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\IME\SHARED\IMEWDBLD.EXE" /grant "everyone":(f)5⤵PID:6816
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\InfDefaultInstall.exe"4⤵
- System Location Discovery: System Language Discovery
PID:5372 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:2312
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\InfDefaultInstall.exe"5⤵PID:532
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\InfDefaultInstall.exe" /grant "everyone":(f)5⤵PID:3928
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\InputSwitchToastHandler.exe"4⤵
- System Location Discovery: System Language Discovery
PID:5512 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\InputSwitchToastHandler.exe"5⤵PID:2472
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\InputSwitchToastHandler.exe" /grant "everyone":(f)5⤵PID:6160
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\InstallShield\setup.exe"4⤵PID:484
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\InstallShield\setup.exe"5⤵PID:3124
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\InstallShield\setup.exe" /grant "everyone":(f)5⤵PID:6664
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\InstallShield\_isdel.exe"4⤵PID:7052
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\InstallShield\_isdel.exe"5⤵PID:4964
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\InstallShield\_isdel.exe" /grant "everyone":(f)5⤵PID:5984
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\instnm.exe"4⤵PID:1704
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\instnm.exe"5⤵PID:6892
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\instnm.exe" /grant "everyone":(f)5⤵
- System Location Discovery: System Language Discovery
PID:3732
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\ipconfig.exe"4⤵PID:4912
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:2652
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\ipconfig.exe"5⤵PID:7108
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\ipconfig.exe" /grant "everyone":(f)5⤵PID:1840
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\iscsicli.exe"4⤵PID:5600
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\iscsicli.exe"5⤵PID:1384
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\iscsicli.exe" /grant "everyone":(f)5⤵PID:2876
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\iscsicpl.exe"4⤵PID:6800
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\iscsicpl.exe"5⤵PID:2280
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\iscsicpl.exe" /grant "everyone":(f)5⤵PID:4308
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\isoburn.exe"4⤵
- System Location Discovery: System Language Discovery
PID:5576 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\isoburn.exe"5⤵PID:4680
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\isoburn.exe" /grant "everyone":(f)5⤵PID:1948
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\ktmutil.exe"4⤵PID:6372
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\ktmutil.exe"5⤵
- System Location Discovery: System Language Discovery
PID:4840
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\ktmutil.exe" /grant "everyone":(f)5⤵PID:5072
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\label.exe"4⤵PID:6596
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\label.exe"5⤵PID:6112
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\label.exe" /grant "everyone":(f)5⤵
- Modifies file permissions
PID:4620
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\LaunchTM.exe"4⤵PID:4188
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\LaunchTM.exe"5⤵PID:3784
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\LaunchTM.exe" /grant "everyone":(f)5⤵
- Modifies file permissions
PID:4820
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\LaunchWinApp.exe"4⤵PID:5560
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\LaunchWinApp.exe"5⤵PID:5444
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\LaunchWinApp.exe" /grant "everyone":(f)5⤵PID:5596
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\lodctr.exe"4⤵PID:5124
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\lodctr.exe"5⤵
- Possible privilege escalation attempt
PID:2932
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\lodctr.exe" /grant "everyone":(f)5⤵PID:2028
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\logagent.exe"4⤵PID:7036
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\logagent.exe"5⤵PID:4716
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\logagent.exe" /grant "everyone":(f)5⤵PID:1928
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\logman.exe"4⤵PID:6392
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\logman.exe"5⤵
- System Location Discovery: System Language Discovery
PID:6224
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\logman.exe" /grant "everyone":(f)5⤵PID:1964
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\Magnify.exe"4⤵PID:4240
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:2252
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\Magnify.exe"5⤵PID:1152
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\Magnify.exe" /grant "everyone":(f)5⤵PID:6520
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\makecab.exe"4⤵PID:6696
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\makecab.exe"5⤵
- System Location Discovery: System Language Discovery
PID:408
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\makecab.exe" /grant "everyone":(f)5⤵PID:3124
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\mavinject.exe"4⤵PID:6176
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:2740
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\mavinject.exe"5⤵PID:6488
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\mavinject.exe" /grant "everyone":(f)5⤵PID:6708
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\mcbuilder.exe"4⤵PID:1696
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\mcbuilder.exe"5⤵PID:1184
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\mcbuilder.exe" /grant "everyone":(f)5⤵PID:3048
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\mfpmp.exe"4⤵PID:5996
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\mfpmp.exe"5⤵PID:116
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\mfpmp.exe" /grant "everyone":(f)5⤵PID:472
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\mmc.exe"4⤵PID:6936
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:4476
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\mmc.exe"5⤵
- Modifies file permissions
PID:6452
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\mmc.exe" /grant "everyone":(f)5⤵PID:5428
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\mmgaserver.exe"4⤵PID:6548
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:1852
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\mmgaserver.exe"5⤵PID:6908
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\mmgaserver.exe" /grant "everyone":(f)5⤵PID:5168
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\mobsync.exe"4⤵PID:7056
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\mobsync.exe"5⤵PID:5916
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\mobsync.exe" /grant "everyone":(f)5⤵
- Possible privilege escalation attempt
PID:4684
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\mountvol.exe"4⤵PID:2612
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:2456
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\mountvol.exe"5⤵PID:6284
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\mountvol.exe" /grant "everyone":(f)5⤵PID:5252
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\MRINFO.EXE"4⤵PID:3020
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\MRINFO.EXE"5⤵PID:6636
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\MRINFO.EXE" /grant "everyone":(f)5⤵PID:4620
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\msdt.exe"4⤵PID:5456
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\msdt.exe"5⤵PID:6472
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\msdt.exe" /grant "everyone":(f)5⤵PID:4820
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\msfeedssync.exe"4⤵PID:1960
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\msfeedssync.exe"5⤵PID:6924
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\msfeedssync.exe" /grant "everyone":(f)5⤵PID:2848
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\mshta.exe"4⤵PID:5184
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\mshta.exe"5⤵
- System Location Discovery: System Language Discovery
PID:5988
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\mshta.exe" /grant "everyone":(f)5⤵PID:3704
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\msiexec.exe"4⤵PID:3620
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:3992
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\msiexec.exe"5⤵PID:4716
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\msiexec.exe" /grant "everyone":(f)5⤵PID:4892
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\msinfo32.exe"4⤵PID:6228
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:7000
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\msinfo32.exe"5⤵
- System Location Discovery: System Language Discovery
PID:6292
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\msinfo32.exe" /grant "everyone":(f)5⤵PID:1964
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\mspaint.exe"4⤵PID:5580
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\mspaint.exe"5⤵PID:6320
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\mspaint.exe" /grant "everyone":(f)5⤵PID:5152
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\msra.exe"4⤵PID:5492
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\msra.exe"5⤵PID:6848
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\msra.exe" /grant "everyone":(f)5⤵PID:6464
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\mstsc.exe"4⤵PID:5208
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\mstsc.exe"5⤵PID:6732
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\mstsc.exe" /grant "everyone":(f)5⤵PID:6796
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\mtstocom.exe"4⤵PID:5324
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\mtstocom.exe"5⤵PID:6824
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\mtstocom.exe" /grant "everyone":(f)5⤵PID:4316
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\MuiUnattend.exe"4⤵PID:5944
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\MuiUnattend.exe"5⤵
- System Location Discovery: System Language Discovery
PID:4912
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\MuiUnattend.exe" /grant "everyone":(f)5⤵PID:2016
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\ndadmin.exe"4⤵PID:3764
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\ndadmin.exe"5⤵PID:1384
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\ndadmin.exe" /grant "everyone":(f)5⤵PID:4444
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\net.exe"4⤵PID:2280
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\net.exe"5⤵PID:5012
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\net.exe" /grant "everyone":(f)5⤵
- Possible privilege escalation attempt
PID:5780
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\net1.exe"4⤵PID:4680
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\net1.exe"5⤵PID:924
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\net1.exe" /grant "everyone":(f)5⤵PID:5072
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\netbtugc.exe"4⤵
- System Location Discovery: System Language Discovery
PID:6864 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\netbtugc.exe"5⤵PID:6372
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\netbtugc.exe" /grant "everyone":(f)5⤵PID:1400
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\NetCfgNotifyObjectHost.exe"4⤵PID:5316
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:3696
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\NetCfgNotifyObjectHost.exe"5⤵PID:6112
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\NetCfgNotifyObjectHost.exe" /grant "everyone":(f)5⤵PID:2156
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\netiougc.exe"4⤵PID:756
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\netiougc.exe"5⤵PID:1628
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\netiougc.exe" /grant "everyone":(f)5⤵PID:5872
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\Netplwiz.exe"4⤵PID:5444
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:5680
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\Netplwiz.exe"5⤵PID:6624
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\Netplwiz.exe" /grant "everyone":(f)5⤵PID:2028
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\netsh.exe"4⤵PID:6436
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\netsh.exe"5⤵PID:5988
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\netsh.exe" /grant "everyone":(f)5⤵PID:3848
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\NETSTAT.EXE"4⤵PID:1928
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:532
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\NETSTAT.EXE"5⤵
- System Location Discovery: System Language Discovery
PID:7036
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\NETSTAT.EXE" /grant "everyone":(f)5⤵PID:7008
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\newdev.exe"4⤵PID:7060
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\newdev.exe"5⤵
- Modifies file permissions
PID:6392
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\newdev.exe" /grant "everyone":(f)5⤵PID:4496
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\notepad.exe"4⤵PID:1560
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:6520
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\notepad.exe"5⤵PID:2472
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\notepad.exe" /grant "everyone":(f)5⤵PID:6320
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\nslookup.exe"4⤵PID:7076
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:3124
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\nslookup.exe"5⤵PID:5380
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\nslookup.exe" /grant "everyone":(f)5⤵PID:6848
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\ntprint.exe"4⤵PID:2740
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:5636
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\ntprint.exe"5⤵PID:7052
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\ntprint.exe" /grant "everyone":(f)5⤵PID:6892
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\odbcad32.exe"4⤵
- System Location Discovery: System Language Discovery
PID:708 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\odbcad32.exe"5⤵PID:7108
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\odbcad32.exe" /grant "everyone":(f)5⤵PID:4316
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\odbcconf.exe"4⤵PID:2068
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\odbcconf.exe"5⤵PID:6232
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\odbcconf.exe" /grant "everyone":(f)5⤵PID:3632
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\openfiles.exe"4⤵
- System Location Discovery: System Language Discovery
PID:3056 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\openfiles.exe"5⤵PID:2404
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\openfiles.exe" /grant "everyone":(f)5⤵
- System Location Discovery: System Language Discovery
PID:4444
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\OpenWith.exe"4⤵PID:5168
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\OpenWith.exe"5⤵
- System Location Discovery: System Language Discovery
PID:4724
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\OpenWith.exe" /grant "everyone":(f)5⤵PID:4684
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\OposHost.exe"4⤵PID:4024
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\OposHost.exe"5⤵PID:6996
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\OposHost.exe" /grant "everyone":(f)5⤵PID:6284
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\PackagedCWALauncher.exe"4⤵PID:5828
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\PackagedCWALauncher.exe"5⤵PID:6372
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\PackagedCWALauncher.exe" /grant "everyone":(f)5⤵PID:4620
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\PasswordOnWakeSettingFlyout.exe"4⤵PID:6124
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\PasswordOnWakeSettingFlyout.exe"5⤵PID:6004
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\PasswordOnWakeSettingFlyout.exe" /grant "everyone":(f)5⤵PID:2328
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\PATHPING.EXE"4⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4820 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\PATHPING.EXE"5⤵PID:6168
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\PATHPING.EXE" /grant "everyone":(f)5⤵PID:6432
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\pcaui.exe"4⤵PID:6924
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\pcaui.exe"5⤵PID:2028
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\pcaui.exe" /grant "everyone":(f)5⤵PID:6860
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\perfhost.exe"4⤵PID:4632
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\perfhost.exe"5⤵PID:3848
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\perfhost.exe" /grant "everyone":(f)5⤵PID:4720
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\perfmon.exe"4⤵PID:2528
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\perfmon.exe"5⤵PID:6324
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\perfmon.exe" /grant "everyone":(f)5⤵PID:6756
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\PickerHost.exe"4⤵PID:6308
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\PickerHost.exe"5⤵PID:6832
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\PickerHost.exe" /grant "everyone":(f)5⤵PID:5984
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\PING.EXE"4⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:400 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\PING.EXE"5⤵PID:6708
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\PING.EXE" /grant "everyone":(f)5⤵PID:352
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\PkgMgr.exe"4⤵PID:6152
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\PkgMgr.exe"5⤵PID:4856
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\PkgMgr.exe" /grant "everyone":(f)5⤵PID:4896
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\poqexec.exe"4⤵PID:7096
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\poqexec.exe"5⤵PID:6892
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\poqexec.exe" /grant "everyone":(f)5⤵PID:6384
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\powercfg.exe"4⤵
- Power Settings
PID:4664 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\powercfg.exe"5⤵
- Modifies file permissions
- Power Settings
PID:4316
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\powercfg.exe" /grant "everyone":(f)5⤵
- Power Settings
PID:3496
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\PresentationHost.exe"4⤵PID:6576
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\PresentationHost.exe"5⤵PID:3632
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\PresentationHost.exe" /grant "everyone":(f)5⤵PID:1948
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\prevhost.exe"4⤵PID:4444
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\prevhost.exe"5⤵
- System Location Discovery: System Language Discovery
PID:4308
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\prevhost.exe" /grant "everyone":(f)5⤵
- Possible privilege escalation attempt
PID:5012
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\print.exe"4⤵PID:3088
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:2280
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\print.exe"5⤵PID:1492
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\print.exe" /grant "everyone":(f)5⤵PID:5072
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\printui.exe"4⤵PID:4212
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:4744
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\printui.exe"5⤵PID:6280
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\printui.exe" /grant "everyone":(f)5⤵PID:60
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\proquota.exe"4⤵PID:4620
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\proquota.exe"5⤵PID:5792
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\proquota.exe" /grant "everyone":(f)5⤵
- Possible privilege escalation attempt
PID:3356
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\provlaunch.exe"4⤵PID:2328
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:6112
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\provlaunch.exe"5⤵PID:1820
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\provlaunch.exe" /grant "everyone":(f)5⤵PID:6612
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\psr.exe"4⤵PID:4604
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\psr.exe"5⤵PID:5560
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\psr.exe" /grant "everyone":(f)5⤵PID:6420
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\quickassist.exe"4⤵PID:6624
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\quickassist.exe"5⤵PID:392
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\quickassist.exe" /grant "everyone":(f)5⤵PID:6212
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\rasautou.exe"4⤵PID:5184
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:3620
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\rasautou.exe"5⤵PID:7008
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\rasautou.exe" /grant "everyone":(f)5⤵PID:920
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\rasdial.exe"4⤵PID:6324
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:6228
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\rasdial.exe"5⤵PID:4172
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\rasdial.exe" /grant "everyone":(f)5⤵PID:6308
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\raserver.exe"4⤵PID:7060
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\raserver.exe"5⤵PID:2472
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\raserver.exe" /grant "everyone":(f)5⤵PID:408
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\rasphone.exe"4⤵PID:352
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\rasphone.exe"5⤵PID:5380
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\rasphone.exe" /grant "everyone":(f)5⤵PID:4856
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\RdpSa.exe"4⤵PID:3124
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\RdpSa.exe"5⤵PID:3572
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\RdpSa.exe" /grant "everyone":(f)5⤵PID:7096
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\RdpSaProxy.exe"4⤵PID:6488
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\RdpSaProxy.exe"5⤵PID:5288
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\RdpSaProxy.exe" /grant "everyone":(f)5⤵PID:1184
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\RdpSaUacHelper.exe"4⤵PID:2068
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\RdpSaUacHelper.exe"5⤵
- Possible privilege escalation attempt
PID:116
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\RdpSaUacHelper.exe" /grant "everyone":(f)5⤵PID:5200
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\rdrleakdiag.exe"4⤵PID:948
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\rdrleakdiag.exe"5⤵PID:4296
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\rdrleakdiag.exe" /grant "everyone":(f)5⤵PID:4444
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\ReAgentc.exe"4⤵PID:2840
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\ReAgentc.exe"5⤵PID:4512
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\ReAgentc.exe" /grant "everyone":(f)5⤵PID:1492
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\recover.exe"4⤵PID:5112
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\recover.exe"5⤵PID:2612
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\recover.exe" /grant "everyone":(f)5⤵PID:4212
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\reg.exe"4⤵PID:6996
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\reg.exe"5⤵PID:5624
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\reg.exe" /grant "everyone":(f)5⤵
- System Location Discovery: System Language Discovery
PID:1512
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\regedit.exe"4⤵PID:4840
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\regedit.exe"5⤵PID:6612
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\regedit.exe" /grant "everyone":(f)5⤵PID:3696
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\regedt32.exe"4⤵PID:6188
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\regedt32.exe"5⤵PID:5816
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\regedt32.exe" /grant "everyone":(f)5⤵
- Modifies file permissions
PID:5560
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\regini.exe"4⤵PID:2144
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:6924
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\regini.exe"5⤵PID:5880
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\regini.exe" /grant "everyone":(f)5⤵PID:6436
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\Register-CimProvider.exe"4⤵PID:4632
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\Register-CimProvider.exe"5⤵PID:1172
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\Register-CimProvider.exe" /grant "everyone":(f)5⤵PID:1348
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\regsvr32.exe"4⤵PID:1928
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\regsvr32.exe"5⤵PID:5704
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\regsvr32.exe" /grant "everyone":(f)5⤵PID:920
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\rekeywiz.exe"4⤵PID:6392
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\rekeywiz.exe"5⤵PID:5580
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\rekeywiz.exe" /grant "everyone":(f)5⤵PID:6308
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\relog.exe"4⤵PID:1560
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:4796
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\relog.exe"5⤵PID:1028
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\relog.exe" /grant "everyone":(f)5⤵PID:2472
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\replace.exe"4⤵PID:3732
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\replace.exe"5⤵PID:5492
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\replace.exe" /grant "everyone":(f)5⤵PID:5380
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\resmon.exe"4⤵PID:6176
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:6892
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\resmon.exe"5⤵PID:2740
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\resmon.exe" /grant "everyone":(f)5⤵PID:3572
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\RMActivate.exe"4⤵PID:4492
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:5996
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\RMActivate.exe"5⤵PID:708
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\RMActivate.exe" /grant "everyone":(f)5⤵PID:5288
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\RMActivate_isv.exe"4⤵PID:2652
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\RMActivate_isv.exe"5⤵PID:4652
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\RMActivate_isv.exe" /grant "everyone":(f)5⤵PID:3632
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\RMActivate_ssp.exe"4⤵PID:2404
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\RMActivate_ssp.exe"5⤵
- System Location Discovery: System Language Discovery
PID:4572
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\RMActivate_ssp.exe" /grant "everyone":(f)5⤵PID:6908
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\RMActivate_ssp_isv.exe"4⤵
- System Location Discovery: System Language Discovery
PID:6440 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\RMActivate_ssp_isv.exe"5⤵PID:4336
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\RMActivate_ssp_isv.exe" /grant "everyone":(f)5⤵
- System Location Discovery: System Language Discovery
PID:4568
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\RmClient.exe"4⤵PID:4416
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\RmClient.exe"5⤵PID:5112
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\RmClient.exe" /grant "everyone":(f)5⤵PID:5072
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\Robocopy.exe"4⤵PID:1660
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\Robocopy.exe"5⤵PID:5792
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\Robocopy.exe" /grant "everyone":(f)5⤵PID:3356
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\ROUTE.EXE"4⤵PID:6124
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\ROUTE.EXE"5⤵PID:6156
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\ROUTE.EXE" /grant "everyone":(f)5⤵PID:5596
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\RpcPing.exe"4⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:6472 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\RpcPing.exe"5⤵PID:4436
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\RpcPing.exe" /grant "everyone":(f)5⤵PID:5560
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\rrinstaller.exe"4⤵PID:4716
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\rrinstaller.exe"5⤵PID:6592
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\rrinstaller.exe" /grant "everyone":(f)5⤵PID:6436
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\runas.exe"4⤵
- Access Token Manipulation: Create Process with Token
PID:4720 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\runas.exe"5⤵PID:6624
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\runas.exe" /grant "everyone":(f)5⤵PID:6292
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\rundll32.exe"4⤵PID:7008
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\rundll32.exe"5⤵
- System Location Discovery: System Language Discovery
PID:5372
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\rundll32.exe" /grant "everyone":(f)5⤵PID:6664
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\RunLegacyCPLElevated.exe"4⤵PID:5516
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:4172
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\RunLegacyCPLElevated.exe"5⤵PID:5464
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\RunLegacyCPLElevated.exe" /grant "everyone":(f)5⤵PID:6308
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\runonce.exe"4⤵PID:1028
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\runonce.exe"5⤵PID:3956
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\runonce.exe" /grant "everyone":(f)5⤵PID:4896
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\sc.exe"4⤵PID:6824
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\sc.exe"5⤵PID:6708
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\sc.exe" /grant "everyone":(f)5⤵PID:6384
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\schtasks.exe"4⤵PID:7108
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:5340
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\schtasks.exe"5⤵PID:3776
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\schtasks.exe" /grant "everyone":(f)5⤵PID:6452
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\sdbinst.exe"4⤵PID:2916
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\sdbinst.exe"5⤵PID:900
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\sdbinst.exe" /grant "everyone":(f)5⤵PID:5944
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\sdchange.exe"4⤵PID:6232
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:3764
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\sdchange.exe"5⤵PID:6500
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\sdchange.exe" /grant "everyone":(f)5⤵PID:1384
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\sdiagnhost.exe"4⤵PID:4444
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:5168
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\sdiagnhost.exe"5⤵PID:4572
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\sdiagnhost.exe" /grant "everyone":(f)5⤵PID:4724
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\SearchFilterHost.exe"4⤵PID:4512
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\SearchFilterHost.exe"5⤵PID:5576
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\SearchFilterHost.exe" /grant "everyone":(f)5⤵PID:4568
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\SearchIndexer.exe"4⤵PID:5828
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\SearchIndexer.exe"5⤵
- Modifies file permissions
PID:6284
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\SearchIndexer.exe" /grant "everyone":(f)5⤵PID:5112
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\SearchProtocolHost.exe"4⤵PID:1512
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:6004
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\SearchProtocolHost.exe"5⤵
- System Location Discovery: System Language Discovery
PID:1660
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\SearchProtocolHost.exe" /grant "everyone":(f)5⤵PID:3020
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\SecEdit.exe"4⤵PID:3696
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\SecEdit.exe"5⤵PID:2820
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\SecEdit.exe" /grant "everyone":(f)5⤵PID:6156
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\secinit.exe"4⤵PID:2848
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:1960
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\secinit.exe"5⤵PID:4436
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\secinit.exe" /grant "everyone":(f)5⤵PID:2932
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\sethc.exe"4⤵PID:6916
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\sethc.exe"5⤵PID:2528
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\sethc.exe" /grant "everyone":(f)5⤵PID:6436
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\SettingSyncHost.exe"4⤵PID:1348
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\SettingSyncHost.exe"5⤵PID:6160
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\SettingSyncHost.exe" /grant "everyone":(f)5⤵PID:6292
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\setup16.exe"4⤵
- System Location Discovery: System Language Discovery
PID:920 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:5984
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\setup16.exe"5⤵PID:6520
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\setup16.exe" /grant "everyone":(f)5⤵PID:6664
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\setupugc.exe"4⤵PID:2216
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:7076
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\setupugc.exe"5⤵PID:6552
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\setupugc.exe" /grant "everyone":(f)5⤵
- Possible privilege escalation attempt
PID:6308
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\setx.exe"4⤵PID:7052
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\setx.exe"5⤵PID:4856
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\setx.exe" /grant "everyone":(f)5⤵PID:4896
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\sfc.exe"4⤵PID:4508
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:2876
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\sfc.exe"5⤵PID:6708
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\sfc.exe" /grant "everyone":(f)5⤵
- Possible privilege escalation attempt
PID:4664
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\shrpubw.exe"4⤵PID:5324
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\shrpubw.exe"5⤵PID:1184
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\shrpubw.exe" /grant "everyone":(f)5⤵PID:6904
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\shutdown.exe"4⤵PID:6912
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\shutdown.exe"5⤵PID:6492
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\shutdown.exe" /grant "everyone":(f)5⤵
- System Location Discovery: System Language Discovery
PID:6936
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\SndVol.exe"4⤵PID:6800
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:2652
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\SndVol.exe"5⤵PID:948
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\SndVol.exe" /grant "everyone":(f)5⤵
- Modifies file permissions
PID:1396
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\sort.exe"4⤵PID:6548
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\sort.exe"5⤵PID:1492
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\sort.exe" /grant "everyone":(f)5⤵PID:6632
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\SpatialAudioLicenseSrv.exe"4⤵PID:5308
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\SpatialAudioLicenseSrv.exe"5⤵PID:2280
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\SpatialAudioLicenseSrv.exe" /grant "everyone":(f)5⤵PID:4620
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\Speech_OneCore\Common\SpeechModelDownload.exe"4⤵PID:3616
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:7124
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\Speech_OneCore\Common\SpeechModelDownload.exe"5⤵PID:2156
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\Speech_OneCore\Common\SpeechModelDownload.exe" /grant "everyone":(f)5⤵PID:5792
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\srdelayed.exe"4⤵PID:7132
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\srdelayed.exe"5⤵PID:3020
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\srdelayed.exe" /grant "everyone":(f)5⤵PID:4840
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\stordiag.exe"4⤵PID:5872
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\stordiag.exe"5⤵PID:4820
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\stordiag.exe" /grant "everyone":(f)5⤵PID:3744
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\subst.exe"4⤵
- System Location Discovery: System Language Discovery
PID:3964 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\subst.exe"5⤵PID:6432
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\subst.exe" /grant "everyone":(f)5⤵
- Modifies file permissions
PID:6592
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\svchost.exe"4⤵PID:532
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\svchost.exe"5⤵PID:4632
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\svchost.exe" /grant "everyone":(f)5⤵PID:6436
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\sxstrace.exe"4⤵PID:1348
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\sxstrace.exe"5⤵PID:2184
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\sxstrace.exe" /grant "everyone":(f)5⤵PID:6756
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\SyncHost.exe"4⤵PID:7060
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\SyncHost.exe"5⤵PID:484
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\SyncHost.exe" /grant "everyone":(f)5⤵PID:6152
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\systeminfo.exe"4⤵PID:4856
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\systeminfo.exe"5⤵PID:6732
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\systeminfo.exe" /grant "everyone":(f)5⤵PID:6824
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\SystemPropertiesAdvanced.exe"4⤵PID:1796
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\SystemPropertiesAdvanced.exe"5⤵PID:3632
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\SystemPropertiesAdvanced.exe" /grant "everyone":(f)5⤵PID:3428
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\SystemPropertiesComputerName.exe"4⤵PID:708
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\SystemPropertiesComputerName.exe"5⤵
- System Location Discovery: System Language Discovery
PID:4652
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\SystemPropertiesComputerName.exe" /grant "everyone":(f)5⤵PID:2716
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\SystemPropertiesDataExecutionPrevention.exe"4⤵PID:4308
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\SystemPropertiesDataExecutionPrevention.exe"5⤵PID:6440
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\SystemPropertiesDataExecutionPrevention.exe" /grant "everyone":(f)5⤵PID:6284
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\SystemPropertiesHardware.exe"4⤵PID:5828
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\SystemPropertiesHardware.exe"5⤵PID:1628
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\SystemPropertiesHardware.exe" /grant "everyone":(f)5⤵PID:6352
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\SystemPropertiesPerformance.exe"4⤵PID:7132
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\SystemPropertiesPerformance.exe"5⤵PID:5136
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\SystemPropertiesPerformance.exe" /grant "everyone":(f)5⤵PID:3696
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\SystemPropertiesProtection.exe"4⤵PID:468
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\SystemPropertiesProtection.exe"5⤵PID:7036
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\SystemPropertiesProtection.exe" /grant "everyone":(f)5⤵PID:6924
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\SystemPropertiesRemote.exe"4⤵PID:2848
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:6484
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\SystemPropertiesRemote.exe"5⤵PID:3036
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\SystemPropertiesRemote.exe" /grant "everyone":(f)5⤵PID:3840
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\SystemUWPLauncher.exe"4⤵PID:4136
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\SystemUWPLauncher.exe"5⤵PID:3068
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\SystemUWPLauncher.exe" /grant "everyone":(f)5⤵PID:6376
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\systray.exe"4⤵PID:3488
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\systray.exe"5⤵PID:236
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\systray.exe" /grant "everyone":(f)5⤵PID:6316
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\takeown.exe"4⤵PID:6160
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\takeown.exe"5⤵
- System Location Discovery: System Language Discovery
PID:2216
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\takeown.exe" /grant "everyone":(f)5⤵PID:5404
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\TapiUnattend.exe"4⤵
- System Location Discovery: System Language Discovery
PID:2184 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\TapiUnattend.exe"5⤵PID:6832
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\TapiUnattend.exe" /grant "everyone":(f)5⤵PID:6856
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\tar.exe"4⤵PID:6944
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\tar.exe"5⤵
- Possible privilege escalation attempt
PID:6488
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\tar.exe" /grant "everyone":(f)5⤵PID:6908
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\taskkill.exe"4⤵PID:1948
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\taskkill.exe"5⤵PID:3468
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\taskkill.exe" /grant "everyone":(f)5⤵PID:4400
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\tasklist.exe"4⤵PID:3144
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\tasklist.exe"5⤵PID:332
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\tasklist.exe" /grant "everyone":(f)5⤵PID:6284
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\Taskmgr.exe"4⤵PID:6864
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\Taskmgr.exe"5⤵PID:4416
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\Taskmgr.exe" /grant "everyone":(f)5⤵PID:2156
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\tcmsetup.exe"4⤵PID:4820
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:5872
-
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\tcmsetup.exe"5⤵
- System Location Discovery: System Language Discovery
PID:5816
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\tcmsetup.exe" /grant "everyone":(f)5⤵PID:6592
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\TCPSVCS.EXE"4⤵PID:3964
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\TCPSVCS.EXE"5⤵PID:4140
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\TCPSVCS.EXE" /grant "everyone":(f)5⤵
- System Location Discovery: System Language Discovery
PID:3584
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\TakeOwn.bat "C:\Windows\System32\ThumbnailExtractionHost.exe"4⤵PID:2028
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\System32\ThumbnailExtractionHost.exe"5⤵PID:3672
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\System32\ThumbnailExtractionHost.exe" /grant "everyone":(f)5⤵PID:1992
-
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1884
-
C:\Windows\system32\regsvr32.EXE"C:\Windows\system32\regsvr32.EXE" /S /i:SYNC C:\Users\Admin\AppData\Roaming\6fwpuclnt_9.drv1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3092 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:SYNC C:\Users\Admin\AppData\Roaming\6fwpuclnt_9.drv' }) { exit 0 } else { exit 1 }"2⤵
- Command and Scripting Interpreter: PowerShell
PID:5776
-
-
C:\Windows\system32\regsvr32.EXE"C:\Windows\system32\regsvr32.EXE" /S /i:SYNC C:\Users\Admin\AppData\Roaming\6fwpuclnt_9.drv1⤵
- Loads dropped DLL
PID:1080 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:SYNC C:\Users\Admin\AppData\Roaming\6fwpuclnt_9.drv' }) { exit 0 } else { exit 1 }"2⤵
- Command and Scripting Interpreter: PowerShell
PID:5208
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4676
-
C:\Users\Admin\Downloads\crypted.exe"C:\Users\Admin\Downloads\crypted.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4844 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Modifies system certificate store
PID:5960
-
-
C:\Users\Admin\Downloads\needmoney.exe"C:\Users\Admin\Downloads\needmoney.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exeC:\Users\Admin\AppData\Local\Temp\svchost015.exe2⤵
- Executes dropped EXE
PID:664
-
-
C:\Users\Admin\Downloads\esign-app.exe"C:\Users\Admin\Downloads\esign-app.exe"1⤵
- Executes dropped EXE
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\is-6802K.tmp\esign-app.tmp"C:\Users\Admin\AppData\Local\Temp\is-6802K.tmp\esign-app.tmp" /SL5="$2047A,1592193,247808,C:\Users\Admin\Downloads\esign-app.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:3504 -
C:\Users\Admin\Downloads\esign-app.exe"C:\Users\Admin\Downloads\esign-app.exe" /VERYSILENT3⤵
- Executes dropped EXE
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\is-85F6R.tmp\esign-app.tmp"C:\Users\Admin\AppData\Local\Temp\is-85F6R.tmp\esign-app.tmp" /SL5="$304A8,1592193,247808,C:\Users\Admin\Downloads\esign-app.exe" /VERYSILENT4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4320 -
C:\Windows\SysWOW64\regsvr32.exe"regsvr32.exe" /s /i:SYNC "C:\Users\Admin\AppData\Roaming\\6fwpuclnt_9.drv"5⤵
- Loads dropped DLL
PID:1972 -
C:\Windows\system32\regsvr32.exe/s /i:SYNC "C:\Users\Admin\AppData\Roaming\\6fwpuclnt_9.drv"6⤵
- Loads dropped DLL
PID:480 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:SYNC C:\Users\Admin\AppData\Roaming\6fwpuclnt_9.drv' }) { exit 0 } else { exit 1 }"7⤵
- Command and Scripting Interpreter: PowerShell
PID:1348
-
-
-
-
-
-
-
C:\Users\Admin\Downloads\esign-app.exe"C:\Users\Admin\Downloads\esign-app.exe"1⤵
- Executes dropped EXE
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\is-T5T2J.tmp\esign-app.tmp"C:\Users\Admin\AppData\Local\Temp\is-T5T2J.tmp\esign-app.tmp" /SL5="$504EC,1592193,247808,C:\Users\Admin\Downloads\esign-app.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:2028 -
C:\Users\Admin\Downloads\esign-app.exe"C:\Users\Admin\Downloads\esign-app.exe" /VERYSILENT3⤵
- Executes dropped EXE
PID:5152 -
C:\Users\Admin\AppData\Local\Temp\is-Q1S4C.tmp\esign-app.tmp"C:\Users\Admin\AppData\Local\Temp\is-Q1S4C.tmp\esign-app.tmp" /SL5="$604EC,1592193,247808,C:\Users\Admin\Downloads\esign-app.exe" /VERYSILENT4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3376 -
C:\Windows\SysWOW64\regsvr32.exe"regsvr32.exe" /s /i:SYNC "C:\Users\Admin\AppData\Roaming\\6fwpuclnt_9.drv"5⤵
- Loads dropped DLL
PID:2292 -
C:\Windows\system32\regsvr32.exe/s /i:SYNC "C:\Users\Admin\AppData\Roaming\\6fwpuclnt_9.drv"6⤵
- Loads dropped DLL
PID:456 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:SYNC C:\Users\Admin\AppData\Roaming\6fwpuclnt_9.drv' }) { exit 0 } else { exit 1 }"7⤵
- Command and Scripting Interpreter: PowerShell
PID:5448
-
-
-
-
-
-
-
C:\Users\Admin\Downloads\needmoney.exe"C:\Users\Admin\Downloads\needmoney.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6252 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exeC:\Users\Admin\AppData\Local\Temp\svchost015.exe2⤵
- Executes dropped EXE
PID:6396
-
-
C:\Users\Admin\Downloads\crypted.exe"C:\Users\Admin\Downloads\crypted.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6448 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:6504
-
-
C:\Windows\system32\regsvr32.EXE"C:\Windows\system32\regsvr32.EXE" /S /i:SYNC C:\Users\Admin\AppData\Roaming\6fwpuclnt_9.drv1⤵
- Loads dropped DLL
PID:6692 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:SYNC C:\Users\Admin\AppData\Roaming\6fwpuclnt_9.drv' }) { exit 0 } else { exit 1 }"2⤵
- Command and Scripting Interpreter: PowerShell
PID:6708
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:7084
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
- System Location Discovery: System Language Discovery
PID:6500
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{5BD95610-9434-43C2-886C-57852CC8A120} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
PID:6548
-
C:\Windows\system32\regsvr32.EXE"C:\Windows\system32\regsvr32.EXE" /S /i:SYNC C:\Users\Admin\AppData\Roaming\6fwpuclnt_9.drv1⤵
- Loads dropped DLL
PID:456 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:SYNC C:\Users\Admin\AppData\Roaming\6fwpuclnt_9.drv' }) { exit 0 } else { exit 1 }"2⤵
- Command and Scripting Interpreter: PowerShell
PID:2292
-
-
C:\Windows\system32\regsvr32.EXE"C:\Windows\system32\regsvr32.EXE" /S /i:SYNC C:\Users\Admin\AppData\Roaming\6fwpuclnt_9.drv1⤵
- Loads dropped DLL
PID:3344 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:SYNC C:\Users\Admin\AppData\Roaming\6fwpuclnt_9.drv' }) { exit 0 } else { exit 1 }"2⤵
- Command and Scripting Interpreter: PowerShell
PID:1240
-
-
C:\Windows\system32\regsvr32.EXE"C:\Windows\system32\regsvr32.EXE" /S /i:SYNC C:\Users\Admin\AppData\Roaming\6fwpuclnt_9.drv1⤵
- Loads dropped DLL
PID:6576 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:SYNC C:\Users\Admin\AppData\Roaming\6fwpuclnt_9.drv' }) { exit 0 } else { exit 1 }"2⤵
- Command and Scripting Interpreter: PowerShell
PID:6552
-
-
C:\Windows\msagent\AgentSvr.exeC:\Windows\msagent\AgentSvr.exe -Embedding1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5912
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x310 0x4f81⤵PID:1708
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:5152
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:4052
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXk0k6mrh4r2q0ct33a9wgbez0x7v9cz5y.mca1⤵PID:7052
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 444 -p 5152 -ip 51521⤵PID:5600
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4180
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Modifies registry class
PID:4792
-
C:\Windows\system32\regsvr32.EXE"C:\Windows\system32\regsvr32.EXE" /S /i:SYNC C:\Users\Admin\AppData\Roaming\6fwpuclnt_9.drv1⤵
- Loads dropped DLL
PID:6624 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:SYNC C:\Users\Admin\AppData\Roaming\6fwpuclnt_9.drv' }) { exit 0 } else { exit 1 }"2⤵
- Command and Scripting Interpreter: PowerShell
PID:5560
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Accessibility Features
1AppInit DLLs
1Power Settings
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Accessibility Features
1AppInit DLLs
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Modify Registry
4Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53eb3833f769dd890afc295b977eab4b4
SHA1e857649b037939602c72ad003e5d3698695f436f
SHA256c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485
SHA512c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72
-
Filesize
1KB
MD5642a811e3352108a3660e8168285e2e0
SHA1a3b687a125988754aeb15bfee6bfeba67a11982a
SHA25600113e0ea4340ecd1778afd1672eb0c0d68a4075360c7d4b71a37f7884abd8f7
SHA51219b977547095d4bc7214bf1df0b656d4f0ac3e6139c87d11f5f4f4e581bf4f544e6738dcf953b71aed7a4bd7f7e482575121a32457cb04c6e2f16fa7138ab3ae
-
Filesize
1KB
MD59613e25c71c8a3c30095ac47633cc35b
SHA1b54a46a1b6885d4eb2133c326baca3dc8a10c43a
SHA2562a59e28b0851b6689ab0b40c2ec3ffa7077cfc1b9cfd3e73d3d141b312803199
SHA51202895a7fcecbb8464f1abaf7e69f6a19aa422e42b1d7f6ceb4e1c46231aeb66e0ebffc03c88d96b5a7451620e056f76c41a6855835e04709e0bd3e2e03c19966
-
Filesize
1KB
MD556ec5d58ea60d497c4332e312874c7a9
SHA1612d871c2922e5157f0907582502e5760561eafd
SHA2564ee4527847f2f5a3d6f22b731e650130178f7f0f7af297c193ca3e309b62ec1c
SHA512185f199f6e9f6c9b98a8dbc89b5a0551c898ae1e13968fd93c974e893902056eb11c2e43e0e44bc49ce225374064f01403b9164fd59199eefd46cfb756c468c7
-
Filesize
1KB
MD5d8d7aa0fa134f748201458c017b5682f
SHA1eab823b449a0926042f47f97039aad611aff3bc3
SHA2567f5640202e6963b46d96139c361ebb7b6949951b9bac1c771d329cad75199324
SHA5122f0b9e67c8362b536b25fd47e74a17c0693b0c0b9509cf1e70011da0d16fa70b080111fc0992884ec6e6da4a4fb7304a3b49acf88d334672c960235620078d43
-
Filesize
1KB
MD5638689e24b53e8caab89dd1b996a300e
SHA156c32116b8c356ffb31a15ce846d11fe9d2afe10
SHA256cc639b0f9604ce6c48f760f7e310cc838c881695222eece4e1bf69764f09ea8a
SHA5127a900241441be7d5f3506eea0e7206a44506200c7c4438a7714fbc58f9ffa70b262a2b3638bc8fb8e92e3a684c8eedae719b1db84da959822cbce770bcff2977
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\activity-stream.contile.json
Filesize5KB
MD5a8d458548ad9409ee8691edcb91827a6
SHA196b48772629dbe5ff510d87733101c57a408fd5c
SHA256af044a8273da8dbee8d048c852d5347da873db500a4f23b6f169918af2bd2cbe
SHA5126b5d7f629977062f9b615fe86ef5f1930a7e5d5b902bad864b6d12382fbbf2a0dde9795f020dad6c7b9555d69e352fedb0e674d4c627c306e85009ce9db2a2c8
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5dffb6aa32bad5cc9b9121468de1ca812
SHA14cffe359f178ad7b948b92dbdbb3c6bec63cb3ff
SHA2566b0744a1a008b977e3cd2e960d2e6ade328661ccd846aa18ef39f78f6815cbc8
SHA512286f952016c1adef402b426dcfdd8740ed65e8995b16761561902712d113fd111004582e30daafe0c1b2f048dee2354d24ab36f71a4ab00895ca581ed1263bf8
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\017BC7F2540A06AFE31D210041CD6C2730DD987E
Filesize75KB
MD5c448b566abfc8b312aa0bc41a1ba9c62
SHA1815ee15d78a60fe8ea3af862b0adf2ad42b96bc7
SHA256526da770b56dd7f78b89c5e0767e4d8bdd3284c0a622dfe5e0590cea6dbcbffb
SHA512d2accfe8ade6e99bdff65ba56bab98db7f8f6589b9604a7906b926baccab47ab993dd3bf821c4f2f6147eb67f7c11c6247cd6ff855d31d335ebb0241905e5cf9
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\0AD48CCCFED71D622CD5EA652F441003DD8917AC
Filesize16KB
MD59a6c81c89513c9b32da76303994e22c6
SHA1903ab829e2a4b9eef8736fb277854fd175dc70d4
SHA256b89d2bc3d95dbf97f839abc9efa361165782e4fed636dd8631306ca4b75d69a9
SHA512d32090ffc70f68690117d608de8de1070d211618755fafe06f9633bda8eb3030a5f67738ceb3d350d39aa52154589feddae8720a671606df3c2cc707dcdba98c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\0CF0F1407EB86AC3B8E6EABC426A42AC2C48A4C0
Filesize96KB
MD57b5d7ec7a88c53e946dd6bb2d891b357
SHA1956e6c8ac89829752c0fdafa81e5be8c240f225a
SHA256df31727648114bd085d52815e9ce63500664f8180472bc78b40c8953814b70da
SHA512f7108f1ed825eee4d0ff5a7f9fcd5d1f81b313b3d1ae28a5c13b3e77870519e63987e5591665947c674ac14a3b4150bc15bacfe78359bdf3caa1c0f15715e115
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\11FA061F062D84952304A04AABA2CA92F9E30C62
Filesize224KB
MD55bf4303eb165f77c54757d63866587df
SHA19a887861d25f3e58b50f21a3b9d4f55fe788b563
SHA2565d5130bb8762e5d8a79b64b5e51bd1cdba0535ce12c355c165a1b8e08c9cac02
SHA512cb8803f34792a9921ea9881366a9f4a6dc59f1a30753e1c51945f5a1e98be3705415b061b0d05749f5f7047f8e7f03fa175f879cb5fafa123c666027b6b3ab43
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\1A5996C16946393FC0B184220943714409DE2FE0
Filesize106KB
MD5dca9e58790c939a0b83730082b4dff1b
SHA1816d740361e07e85664263fc8134ba0504ba2ca6
SHA256cb31bbdb9f40342dfa9379c5cbb02bca18cd8df59365804369e1095dbe581459
SHA512a14e0f04546b99a6828d9ef37919dd0de8f0c3214db7a6e18d0eadade75d5aa4aacf86e8811f5a2a57e78c6e80e2e5c6c6f7b205a6203c31600493b2ded096fd
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\1BABCB54677568DDB2D555AFE2334CA5C9900BCB
Filesize84KB
MD5eee048a6384cbef4ba921bb64e221963
SHA1c875d0b7853fed3ff9f5ccc5c58fd291b9713724
SHA256d390ba67a4fe86dca6238fc72dff7b283fb88aed7ae0d3818d246bfe0b3decc3
SHA512f7ed30b0d749fa321b6330f8f8417cf3c401f57a10743dce4ee0ad85aa0711fb03fff55b66f114bdd433774d349a2f5fe464f1bc4a0d29497db9096c1b645521
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\1CEAE45C047B1428410D2893720062C74BCEB3C2
Filesize78KB
MD5a324ffd78f6db4206329974b9b76272e
SHA16587621aafab6a5c9f35a6c4e827a07aac6a6ceb
SHA256a6f2ab93032885e03f6f96a15874d1bbe9548548c3a64583291a150174468aa6
SHA512f9dee49103c4604484c08da15bf6113093bfae58d9e9ffbeb7d0c552d4524440c2df9be679b0b9101b7e4af3da985c0660f8a5b21937ff94c76381b30d944b5d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\23B59AAF99AC8BB82475E6E66CB122C93FEC2627
Filesize16KB
MD51627b6f669f549954d4c6f44ea9eb76c
SHA1db2de9d85b64716a0ece41168938dd9d27948163
SHA2561b1c2c120f548e1dc9c39a18191eadf97ff88b0cec6c33823cd3559d69745b99
SHA51258c5f2406c3d91bee604f11893801a79d124c7bf03535901eebe95ac3abbdd8900bca14eb36eb13546ceedf5ad67e5ed8a6c6b1b95bec3ced8afa69d3a1e0d3a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\28F891DB2FC45303B804141BA493F71B401BFFEE
Filesize88KB
MD5de721ae81d5497e04b0b6f239a60af0c
SHA19a7002ac6a2f87a017eab74cdcbfce3e3b44421d
SHA25607a88971e050162cd8faefc673fd9e44805982d0e7ac57352fc15e57556d8ac9
SHA512fd5b3705801d7b78a759068eff3ecc690909acd54359c85c22becdf184e3161e8970e6582de63b15faa0c6c30d871d74aa5dc49fa927b61f1052e3293f1a79b1
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\2A01DB41595DAB44D2F84B3F0F396867A3EE7013
Filesize58KB
MD5cd9b466c055e85de40d9941b251455f9
SHA15192f68eef0b48c1f59c5908d23490dd1b8d5879
SHA256b7dc5d493a97988889d617fb3052d5afa401d674252aaff4bb9b742468f8f068
SHA512d91ff226c3d2d392bbe0c05c085a4d6de7f340048ec9ae5da91bdd6ea5f1b27caa8380c9ce918ee00662609de01ef38ab83a23787db44dcc935f4582c06d1d07
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\2D1C9043F1D2781E618429DEAA41E52E7D9C9AA9
Filesize545KB
MD5188c368b1a72e707d407be4060d11ec8
SHA13f07cdbeab3ba997c4aa0b561b31c7efa213454c
SHA2566fe3b34ce5bdc510ba08b7df30d70603cf2e210eb4db45dde7e12d56198b3c92
SHA512130bd82df9d23d38ef596fe7da05da05ab3c67c774f10ff4ccdd46cee47838d997a64ae2aaa3d21a9e64837e77946b16af2382dd3711ddbc92b62f2c1ea9f2ff
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\311589B5F7E27FD8DAEE1AEB3F2A1C1A3FFED5A9
Filesize103KB
MD5c90a86f2a83e2904ef8e40148d30e4bc
SHA1f7bfd501d42f009dd3987ed12992e046c337d37a
SHA2569554282cbe42e1ccbe6d52f91dcd7250bd2560184a308edc5c327580e5932d02
SHA51267d81c57a25437cf3dee152d14c69e6a2ac45cc69a9656bf4eace24aa84562e7cc075ab77fea685b35e4aefb1a60ff684991592cc8c4a461e38a375746273e8c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\333B26B98F1EC5DD800EB6431717BD8EB238CED3
Filesize145KB
MD5cd51efa31adcd465113fec11f14b14a4
SHA14b13e53d390b76af19ec928910e404dbe14ffb38
SHA2562c1d43160ad5da6def32e062b1abbd7ab43a580b30cf079d01d446d955584cb8
SHA51263ccda7d323c15ced1c89fab7ce727bff3616b9957256bde464cebbf31cc32ff4ee0ad5407c5854ed1ae89dc193ddb58653daae514be9084919cbe1dac3315b5
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\34605B1DA553FE327FB6F55B2D773F0302A21F95
Filesize5.6MB
MD511bd523ea11774d0d7ff34ac99a7eb96
SHA10937d4c3e60fbf88e73025123265dc7ac9ae46a7
SHA256286cc39ba4fd8eddde09edc421f09772639d282f62dd18907babae663ef87f20
SHA51276a7776826f05c23bd72d12ff6cc5db7b9c20d92f163277404ab8b8efd0b8b04fc5ff7d2e5ec9c077231392d533246f106d091f5962f66a4fd7b30b02f2420a1
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\3A1FDC6B34A57BABDC117F984BC456C512AF3C8A
Filesize241KB
MD5ae7353fcf3b620f4ef9051a6deabd90f
SHA112ce0c26e00ce318bef1301d05764fac286a2b15
SHA25665370f5c81eb8281e04376278187dc8900c8edbc5df2451427c45a31f92e96b3
SHA512f3cc161c5ee77389b65d33353b88851e2e7cb2eb3593ce4300af808763aa651a5681b56b8c1059894d1db4ca29f0246267c83be7ae3cb0c3f430b2c2a2071598
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\3BB9C2A4A67F0C8E82DC320DEFDDB8590711193A
Filesize76KB
MD5cddbfc3d2f09db054f930f468e04f4a5
SHA166183def7af372491f6934f14227159fe1869882
SHA2568742b429f60956819416bb082b52ba6d9f100ccbded33772bf4696562e40b9f8
SHA5123e132caeda8e279368bf6d33f4ff32f190f398574508a7e4a51b95a492c8448a962104bd5518ac177fc04efea707fd4798632535c3c671bf134cecc812273499
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\3CD3193A1BF5DD1F68A18C865CABDB5A989C8AF5
Filesize105KB
MD5366e664bfb95cfa08904307938ff0476
SHA150730b9de8c6a72a77de396e1f73b49bb1f93169
SHA25699b19e74b86b844f4f2b8c3fd63718fd6afb2b7e76686c8364025a6034669a5b
SHA5126b4d7e1b8e945eba5380e7c3814aede3fc9b357545c91df28237b1d6676b4f7f238424e9482aa10b3fc4bb8cfcc862302e3299842cb2de7882870c8c0d82f574
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\3DB20E232714B43E45DA2DAD10B04E5A4DC567A5
Filesize206KB
MD5ac3e9af0ee6404817fdd0849597c5623
SHA17a3b39bf4ab5d0c6f4dd9345771bfe08c26cff27
SHA256fe523edecfb08233b432dedebbfa5da0621612d3d0a97efb4eb434da0685eba9
SHA512f5122d808df13662faa958e3cfdbd49f89f1a47f18b4a022404adb217fc4b0c76f8a8c7a610c65d2bdcf780579c26f4c69b6395c0fe09726af6acf3a4dfaf06d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\410EAE2B1441AE4133033C22CC3E874D18F2EE85
Filesize147KB
MD5a93c326eda3cc006f5d704ec23dd5df5
SHA1b182202347ef207f2332673cbf7322a5ae35298b
SHA2564ea105c3000611eb722956dfd0e541bf8623a7034062da7ef9cdbb534b64ea91
SHA5122d5dc3e79a07e6f516a53826b909634a2975ba56e81f058a8a20d891d487d11b8478203771e429a729f3d69454b6e029b9a4908ed8d616fcfe7f20215820afda
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\45374012ECBB9FBBB6677A204FCC1FB70DFF8825
Filesize1.0MB
MD5e529b351d4f83bbfb6d57346d84224a2
SHA1a34fe6baa2598204ade62b29192a86cda10d42a4
SHA256882dbf7503e374a05914a9d577da20f88e8d685a3dddac6b4de868be0f2c09cf
SHA512c28a3391d59509ed7618e3d78beb19809ebcfbeeb9a1cfba35b60548258c00eb14768666571f1257f4e8e9b7099bf582912ec60cc5f3e8f12474500acced7142
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\49E9C0F458BD0B1C825F28B8A982F8A81762E56F
Filesize174KB
MD563275f1e5d5a4b707aa3c2c6955fde08
SHA151d144da12817349d08b74f29b0c2518077331c7
SHA256b705ae0cb16127079f44c87b56190621802ead05101c0e0f42ac2e7e9ed6a2f7
SHA5124a15f4fcb3bb6d80d042056da358638b3a8d6a50880373092f2f191c26e59177b265a98c380e17fee70a71e56b4a88f1e5af8c9106ff2f332eee1982da21d7f7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\4A5B9E0FB792A4FF08AB57D2BE340D3867D9ECE4
Filesize1020KB
MD549d3d39740cd608234cafea7a1533589
SHA165585f5f29d59aaf74f4b747f32e18d5bad9dbf8
SHA256d9d2b77e524242fa008bc9bca4dc60b37179df548134a47fdf2680ee89edbe53
SHA5124f5c66a67e4c4c45ca6da9ec73534d3b0a8cff22f52efac279940758ccf0e17c8c0dd2d4b5da22edcccbc606d7cd4917ae7fd53083d5bb18d268afff3ff26c27
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\4A67B6AD4E5BA09B00D3F3FD2D042809C8F19749
Filesize31KB
MD594318671c2d4e333176e7adb10658c6d
SHA196be235c902942843181ad426bb6db695d8a3ca2
SHA25655c5786ebcdd88eec9a04ae716d12ffb4b2a445196ef7c0792d5ff0ebe9fa704
SHA5125337c733e88ce088dc5cfecf0446b1f8b339c8832710fb33bd2a3779d6291dbc12b33516790bf9976d2acf39da9c4bfc3399aa1c9b6b463df003cdf4c1c99feb
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\4C3BAACB5222888D0F9C6C99BCB711EEE930961C
Filesize63KB
MD59cd45509d83ce854a01a27871c86512a
SHA1e4224676f353907bdee3409e5c3eae4e4297bcf9
SHA25601f4c3bc96928be3d66a23f026f9ed4f570b5bd3d13abd186276ef25e16e2bf3
SHA5124ad81a4b34387d89f3375fe289b262f9630351e045c3d7059e2b4e2973982b16691a50aa9b6d9b894db43f9456b6e9e1427321b116ec9587e8be5b56e3d26788
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\4E2AFFF4CF85E0D61DB34447EE7CDBDC357604DE
Filesize794KB
MD5afe029f20c4de42a46e8bc2f755880f2
SHA15f319ef2ed9402060c077af282e8874cd68212b2
SHA256026255bcb333fab197c1650468a0c3fb378b7988ffd91761a1b8d0f2834ccd6a
SHA512ede9975eb4f37b845341c6fef91ba7775a3fc0bd7404f7acf791f810f3a0c02fde75ff79e2da486ded1b3a8163e3b27bb46f91c66acbe2b7df1ffb35492236aa
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\562FF196D836F1AFC2AE5F16AF4FED1BF683B7E4
Filesize300KB
MD52cba1123a84de1b09a2f9486ae0f7ae6
SHA194636e573d096f9def0e37f828b41ecf566c7130
SHA256e4a6c3714dfa28d82e27dbd767994267e92fb70245197fc8661efe7fe653709e
SHA512c347bc05e6f10c9ddf7c79387791982aebad8d5450350f1280a04b5da6a6757020e17a7d93268b856adf6a92eeebdefa7a88dd303c81b76a48a3c60e5676094f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\57C2853562EE2D47A5B908D8944F8026EF589306
Filesize173KB
MD5d181d4bdb3f58c9f0e8c73a4a66a1e1c
SHA10b4bf574c152c9a5750cb9d4049fec8fa0da0d39
SHA256e62ce5cabcd4014e8c0ed19f271b1023cdfc59f77ebbbd7f1606b00ae702124c
SHA51200d2475a0c7d8479019c8c275cb5d671f9236ae3d6f0b5a0541f2710387bafe6a12add5800064764326a0dcf9f8a29159df633f8834c2c46dcd42040bbe76b1c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\58F35E6A8C7F904D87B186D56CEF87132E1168FB
Filesize264KB
MD5df96777e1e4196294364952d11f5338f
SHA1ab03ca1997c93a8efa0806bd957b41cae02cf49c
SHA256d78329d8245ef22c6eeb0854a7c399e1f2f3f8b1aaca5ae3434b7da2da7b21ad
SHA512f1978c7fff8d571e176cd028bf32af096aa2356b199e448d29d7c3b2d73715c1a17ed5c109ef481560a5c198f35453553cc061df410dac16738a93d9d57e57af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\5ACB46A5A72DCA2C675A19F9DCC5C68E4EEE16B7
Filesize74KB
MD56dc3c96bb5ab616adb4dfb16ca6d7950
SHA11aa63321580ef96d148bb6bb34b259a4e310f795
SHA256c3644bb9b5c592594f70c27fdd5a299eb8f138a26dcbd15577b0e60283a6b3a8
SHA5121e366fb2c5277daa0992f63b07f5a9a55b1f2a6a9feaaf700d18e1550b25237c59ec1b23a8ae63290754e2240db591e5077e6c35d0363c13908d0204dea8651b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\5B2229BDB395F90BD36DEB8AC6207436CAB7997A
Filesize76KB
MD528dfcd6adbe9d5aee92caeacf224e87d
SHA17015104297be3b840a892d8e11574e2d514c20b2
SHA256ca30926b3d17b10eac7610ed91b3aac4b7f010f251d6fc0e394fb5becc4ea51a
SHA512c1ad72874bf872bf4da8f980a137c1f6e98d79dd1a6ec72f0c1853ba6370f6d93f11c8d08475fce710786c473195197c2fc8e2c71b1ae51ff62ae046a09d7ef5
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\5B23235D54208C34AFF88FC6F18585FD8A8F8FAD
Filesize32KB
MD5bbbf85e05c441e64a4b9a4f09d5a4d46
SHA1eff586cf8bb4d3c305eb051c0d5d2dc0f8802e9a
SHA2569952803fdf6303b262b3496ca1ee7d9e5ac0f9dde26d2d7bc67930887cdd2c7b
SHA512f743abe8362a321446acd1f8bdfab3898e6fd99e396d9ff4de2082f3c67b6efab2f0f66f6570870e2a6536717ebf81ca5a9a8dc015112669f4e4465cf02cf43d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\6861C853182D152D10996A8B97C753363C7D2126
Filesize99KB
MD5d8cffca560bd409a8637a7ebe4ab3287
SHA1614ada1af9c73edd9b37c8c038d26ca789d2700b
SHA2566afa379ed4d39a8c3eb654667f631be456e1a17adfc5a69d9da3d22b95be773a
SHA51217118f73d2f67eb1d50612ad73297fa9ba989e1a4569be14404ad7303d310b55120a46e1440f433f2a64f1316038464809a3d3f11e9728da4df46a89bf383834
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\6CC018184AB2CEDE13A12B468231840323786EF1
Filesize75KB
MD550c302642d5da33e2f844047d4b7ae51
SHA1c9227f0982be6a48947b695bcb137dd3a9af77b6
SHA256c36a2db797c38a9852588a7810cb3d17569d093defbbdce83e080afee5aacc86
SHA5120f61110cf41b99b6d2d3edcf31379a872e161fb52fb145aeb750c76ac947f1ad2c170c6aca70b7f0b8380a950df92311f049423f717b909f4c807ff8b35cf62f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\7E1B749189CEFD6C269BFB469C2CC4D0F488441C
Filesize1.4MB
MD56afaac7483b4eb93ee4493317ce9773c
SHA13beb6e5a0ee3af6aab5b71436c6cb3dfeb1b4088
SHA256e14f441032d48993ba918f7f4b65b8604907372d89f35f3bc0332876157d010c
SHA512ecf432952fcbc4325773524d8e8aa30bd291f6eb0f995d81e35c2f16f86576cd1e270c893a06ceb14b7e744122f56e1cb32054fae7238ae3429a7a8547478344
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\888590F5E760C55D103720CF0E66CC2EB33EB9C8
Filesize1.4MB
MD5cbae048273e980f7bc5ae6b362a11ec4
SHA1eb5bd25132cc5d5a83012f4d19a0ea425ef9f5d5
SHA2567a810a832851a1ea66b7992843825c1f0e33e87c50d7d631376167843609456a
SHA512f148c273fa59fda49fdb51d1b3a95b21c09263592b46e88013b15624e4a707b7be4af036719a8c7663d30cdf36aade7265beb2b4960195604444182171adcff2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\8C2C0BC97DE6B313E11C23586632C54149F3EE06
Filesize123KB
MD5a62ee7e0ad860bbb95f30d3196847b22
SHA1cd9495a73153b17aca2877de590ee589abeb47c9
SHA2569ca594340d16a2e27b09d04584ad16fcd85dd46e9574e4fc7d51f01d6c198208
SHA5126a09c786806c77b50674dd9be6d4061b2b68ba8538ab0d50b22e050ab02f2790862742848b7189c0a7427c3d62fa1c581e9cbfecf792c09eff07bdaf40e9e288
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\8D11864F69B6D9276086D87F1C72386DC26A1DF7
Filesize118KB
MD5d4a790ba0395a7cf0ab50867fcd80355
SHA1c96e9dd5b06ae1d629ab1d6519a5ddb4e700833e
SHA256fab9182b192fcea839b1a1b9ecbf6eb293378ecd088a9d6af0a70f2e9cfb97eb
SHA5126a4cfb790ebdaa2d97da64ccacdc7117b10927ac06a4965b183df9f0657a557b91b0c89342a33d276700a448ac6e1cb1d918104dd7058a97bf9c0ce5bf0cbcc0
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\8FC913831B9FA76A287AD81C3AC6702280163985
Filesize115KB
MD53d470acf2e68d26070e8f99c0c772ce5
SHA13b8ac8eae58ae448025f0adf3334ae7290d7af24
SHA256089257c57ecaf16cb5d55834bbe4e3ec42afcfe093144854b8a8f524e2f8c928
SHA512c2b63692b36d1279e63af08f84683be8aafc3247754abc4d04c4d2a21531da9bd95942110df7d604a1e79b97e34658f9f4e56aac7bae38854552b27771a63f0e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\923174161B1979BDDC4EE970CE230100791312B3
Filesize751KB
MD50472b2bde0077886fe91276d1699eab1
SHA134c44bc444f4591c2eea29ae6d6c51d029d563ff
SHA25626ceb1682c4b7f152d72e226c16ecc6d86e1a17c1ae62250d5ddc04cfab65402
SHA512c5710329741933a77cfc569fccbfc1bf964c87f314c26e202bc7293d860f3f83bf0bff1d921d48ae9812f8322faeccd00e0e0d28baf4e53d5e84f059d8b07ede
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\94BC798672D0C7BAAFFA506B8943B6A3D248491F
Filesize156KB
MD5bb300f86c299eb28c84df5264a74355f
SHA1f6f054595c41d8ac01a719dc8f491a989725dc77
SHA256a3890744e4052f1696d71721795729f19b040580353f515fa9131fc85c9fdf00
SHA512d3599dd945dffab0bbe139e061e8f0cdd9d38c3e8c27c39529fb950c2b26d5ddb72a0c397c8740941ecd2d342a5507c0fd7e02f630f259a5df7d776b0d302951
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\97AFFA25C9ED84269BA5F8059413E057B9831B3A
Filesize94KB
MD5cdf3acd2f00653b1b03be0f34edff1d0
SHA125bb0033f76527bcfdda365b34913da0eb1a0d40
SHA25655858ab4270c2454daf8d15b08ab45ceb67b159550dafdc545c777a60bbde0a3
SHA512b389506596fc136669790f0f92e9849053f3ba299d85c6330b223f798a761b45c5514b8ac40be8b89af45d4b3a435d6cfb1ef35fa8728150436607696a3c71c2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\989319F0F0E68FBB0035AE1686B6D495D7A3B216
Filesize65KB
MD5c480c7f0dce1cbd7267c59f8aac2651a
SHA1ae6c0a83fe2950c4ecf96a87d8baf946ffc0de55
SHA256ec4dccbed43ad9b80c180c961287f0324c336d85044a622f22b1291318b924f0
SHA5129953ceae649095240f18d997c5d69304b81ab69618deea4796ade36d2095278f60d7655b81c027c3f52ae490ae72dbd7e3399ef7d7c98745d8304e2730408062
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\9B4ADE18D4C6D4D7D38F8A06CC927B6E10CDF2A8
Filesize96KB
MD563aaab5a384be34075fc2c7a186d66c2
SHA1d35231ca778ff9316eb6749a8687de66e853e561
SHA256a0617c401709fea5c50cc7b673e1adcf816e1419fd222c2dffe55815fd6b5e7f
SHA5127f45e59ae77ccd9da02d299c6a2fd40de4bacf8bbb60266f4a4c12503786bdd225eee6aae817117456a428671e46b1450b016ee7939d78479fa0bc270d60cfa1
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\9D033246B88529920FD93FDFF568F2C5FB4176D6
Filesize137KB
MD55620c3b832c812eb2c7878f1113548ad
SHA168b883c3e39b6d2b6f05eb8b169d21e58918de1f
SHA2567f265ca00af8007da263beff630eb778240d6833f9a63084c3063abba3c2ce77
SHA512cfe113d401e38d7512db4ed4e7e7020a155a1b74a1edf873f7d745b43fdfd18719c74db5804c088d5cd4700dba981e57f43adae52fb0dcee273b1ec03ad6e627
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\9FCC642E6F04F6DC5FE848F65F3652C6F3C21C7E
Filesize188KB
MD545a77ff407969448f993b09913e0da51
SHA1fc65a84b30170a8d8d4ba65dfc3724a882b1651e
SHA25682a311c53b807550e13bc034c89d60268fb6d6a56566dcd77d8f588ae4fcf5aa
SHA512914ff3db2f32c752fcbf9cd74c5a38a585a2f3ace3d861b6be66e380ef05f49abf603f4750a946299e94b02d31d1bfb5438631e1740f105d6d24ec171fe1b50b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9
Filesize13KB
MD5e95d1e3141f1deb8046dee0524bb2bc5
SHA118e942df73ffe6437c4c91f2429f0f060aa32a3d
SHA256b73a769d1a528cbe50f66e06f3b7c08e2adabf899477462d795a79b60b374a92
SHA5127b8543023aa4eddd069fb877fb72dc54c47b4df4cfbaaea62917b577d758eb5bf340811ee01353bcd81c9a9aa970e6afbcc8bf261345486a008488e33f046edc
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\A6C74BC2260EAFF823C7AED38BBA607C962CCB55
Filesize39KB
MD50d2e1e779a1e50b4a4112ab94e79fe1b
SHA1e7672cadc5686f6fdef9fe285457e0a1e89b7ede
SHA256c83f4e2ec4d165fd23fddb68037d5583713f568472c61b4f3a7096ef778462b8
SHA5129efb6ddaa388dae31239e759c3244cb2b6cd20aad8ceff1ce09e16dc6d49fddd0d0a53a48e7e0db021cdd745fd4c74bc762ce3cd576b3d37533495334224b6d5
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\A8E1B82B0A93B82C56A14A940B09D1683790A792
Filesize98KB
MD55829048044a97eda670ace198041d999
SHA12c41a2ace4635c23ec9327637845e5578d7dcf74
SHA256ded9d85befed5abcd027afb31ada5a60412c5d895950d60847142ed78d3995fd
SHA512d641536d96fc9af23b048596da30b617791feaa8a6f97250e2fff7604db3376da7345e1ba0ff04099bb1adda18eac8f816ac73d80c88c943e5710ed22e74bfe8
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\AC09D9320798EC24FC34C6936C60E698F3611531
Filesize129KB
MD5da2a4e0755898b363e22d8e6a6dfc12c
SHA10a713b59185aa6dbe47e196e39e7c772be63128e
SHA2566387cbacf13d133d0a93c74415d0333fc97f082d2e719c0f7a9e13a3fe30832d
SHA512d3924c35fa63ddf08212963b16bbc751703ed772f80c80865892b17d8ba81e731efa33e9af496f4bd8f6f87e174e2ec7d355f2c5c50a855341055ee961b45b08
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\B0D571D21BBA0E8842F5922F0302DA4FEE45E818
Filesize81KB
MD59481b416cbade954b3781e402a0906ab
SHA13d6531d92cbdc977370dd78cace1b44a7edd83b0
SHA256901958db158020a173a5e8f2a7098c2ed3d4fbcfeb92dade584ba5e217c245a4
SHA51285fbbcd40306fd9d8ddb48d71f0fe0cdf3ad80add1a8860a31a7d9535c41067f2b38c3c87a7f7bff3021d313f4de6bbec285ea59e67d541581248bba4e6cb227
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\B6CF3ECF1AFD8B196D80E8BB76971F786A8A08A9
Filesize1.1MB
MD5757f6921d3fd1929a871f2ccb3e75504
SHA1858db1fc4a1fcd1ff6844e6976d39cace6224702
SHA2565717b90513a9146bf03e4c0ce42c546bafdf4d19e3503f64562d0746a7888a47
SHA512f53e8e3e0e11e50cc969b8e3be969a8b0c54463de7754f794b04ef35dcf28afbc5941fb5d49bd6e03dea02d42de0bf36a6ae001911208c1a0102170aca446b8f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\B6FC0C27B04EEAF43D0C858A6818F7DBBE380FC1
Filesize2.2MB
MD538f82d8a55f866cf74f277d0a42150b4
SHA1ce1d5631ef9e2eb8bfab7c8d8c9d4051d643be25
SHA25615ccd2d63fa2ae5a31e05ecc9288b5225528f22503877f60c51f41a64a7c3eb4
SHA512955b755424917bc63ed7301f1d8dec927113c9b9165307db275ceeddf76d1d65b267c12443de6532d4dc4a92b305d56ce0bf129a44cdab596f3569150206c28e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\BC02779E4549B742F87E407101403B7CA65078CE
Filesize109KB
MD595fb01300fd4d835a2a3c9ad64a9b55d
SHA1bcfa29b539133695106ff5d167fe985156b3f1c5
SHA256996f5f6631e0749f53a04dd5020bb3683ab60cce33d78a7fee803b6c910f7667
SHA512bf70dd842cdc652a8c24cb30c57b7e74fecbea6bc666f85718ddc281ecc50f8d431cdec6d6921bda5919f7fb7a6b11df8412199c25dfb19a9c84665e20c6d1bf
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\CE42AFFBFACF98583EBF80F3523831BA7410F7D2
Filesize65KB
MD52d2baee4f1dfb32ff0a28ed4705f1ab9
SHA103ffdb816fee6b5d75593466aa036e44ebc7c67b
SHA2567d9f0d40d44341774aa49a3b39e534b31d3182f49fb6ca95cf956adc39f363da
SHA512af84259d927f8639cfbe1d35938d88af517ec535f11f2f633459b819f1378a7fd82e83faa49c6af44aca8bb27484a5a810e94fdb7eefa21d7204c27e788a2996
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\D57B4C047D8634C9248C86EF1B8EF631880A5AA5
Filesize60KB
MD50faa108bf6d5fe140bfb99c9abbb1c8d
SHA10f0202a6e1e43150685a65df7b986752a89d90ef
SHA256669db3d14701562a15350599ff01be5e45e0dea75a16eea32a9f8ab3744fce49
SHA51215a8346a40f1a31b90d83a3c42488a257dea57b91ba9fb4e2e81254d7fb9cd5e5128571eec72dd3815e3524c769883f7fe2e37359eca1beed3032a9c34c47811
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\D8AB09ACC3B7536F2258769A4C5A08D14BCE5E04
Filesize815KB
MD57053fd4f29e19e12a79b2edef39f3b55
SHA126f14fadfc23252ef4a73d75c91b8ab90dcb2295
SHA2567acac5b83f60e1138c23a50deaccba70e103ed19d905b995467238367e7e7584
SHA512484905494cf94485db18940d99f90397679d011db129ac69f28884bc857ec33eff671259831ddeb960ef08090d113bbb170e612fb15efc49afb9a05faee49d9a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\DA8DE68D10BF040EA4E3725A5EDDB56991A9D339
Filesize17KB
MD5650b05ed3afe27a4bfcbf762d6f9ea9d
SHA1285a48525ecbb92b8a59794e29a151353584e1bc
SHA25683cadadd93156a689d7892dd0c7046eb376401a94d96188ee572dd498b1d7b21
SHA5123ecc25d557169dcf712f970e1a692dc57322faaef215ba26da9e1d628f232823ad8ec7c6df4ff13d9877d3aad9c923ecf73a92fe215b6e830dbe154a578a2818
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\DE85D62827752B0B12863DFE1B17F987285FE5D6
Filesize321KB
MD58d9e4cdaaa3698debb444ab23ddb7eb6
SHA1bd7a65ea1b50e28b1f8caacbef7b9062d331e063
SHA256d39bac78c610ce843c0b4cab913e209bf692a5ba124717e471a5567e80b27a03
SHA5125c90ee49b824ec5d80335c0aab93cadfefb5baa3ce6d67e4e241dca2e1bf18d6345a2d3288517a6435aedd73779c50f90a52f77ff2e7dd208509ed4624a626be
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\E087E5921E38BAFA525BF7A3E0205266B7790BDC
Filesize90KB
MD56149ebb251b9c2e187d0a4cdc60e8dfe
SHA1c043a010b3166ac6bec840f11955262219d59851
SHA256d654360614417853a49ed9fec5bd79294ce08e14f0ac97ac8cc0924ff6b6d661
SHA512253366965c09dcda0067cb8e099d91eaef6245bce241c334419201b801dd27ef8df96007efaa092e20746436499e9a0a2d94339c2c13a2657f9d248e19be3e7c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\E19316B1CDA62317F9DA2551F9B56E711FCC77AD
Filesize13KB
MD5b95343360e86cc3d6bd05e73b4819c2d
SHA18c5c3e1bf5fa2b7903f85bcda6a5785ac94f56fc
SHA25619485a3106c59c7ff9933fdce3217918c41c1cddc7edbe50cbddb2e245e0e8f4
SHA512a925616ce457b33bd5d9e8755c1f3f22d57825e5cedf69930e0279158b426610214d5c50560ebb17cd00d7a10f71623395efcbccbcc0d8ec7dcdf8c698065772
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\E2B13323F63A0E2EFF9C39711F74532619C05A3E
Filesize28KB
MD5ae96064ece3436444f1a77fa22de6a95
SHA1a36f14b7a28c44499a4a17e13f62c953b11e9033
SHA256c35af62df1d8264f20f48c0d4e384a0dd232602096713b2da23e63b2287e0f7a
SHA5122c603b9e3494c64a8cdf78c740211862f922d2263060281a9e3ad9177656f14ce3a82227bf2f6c8834b71ecd6b6e330fc9ceae27ad0742e38e7fc7ef599f7365
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\F17716DBDC571DF9373A748DF3F176DB8F739B2A
Filesize82KB
MD5e59993a305acfe1fee335dbd61c6fe42
SHA14b32e03bdd9024d59c3a9ae8045a6b0eda9cd47e
SHA2566c8b0f18feeeb32d6bfe297f0a48f82ce30ec1b62bab3168beb850c9282ba4aa
SHA51229e2f9fc8d520b482042fa10d3eaf4f9f07fa936da7ce46d7cfc5c14581857ea78f8184b4b885feb489095744d9eeecc5ce6b1c020e5829c7247a18afae352f8
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\F2093F74FEC17377ADD0F6EB40A925F233BFD56A
Filesize100KB
MD59af441fdfe0db76aa1cae7d243f934e0
SHA1159e63864fdd036a244d4c5c73ebf2301ac434c8
SHA2560d72d2ddf875d4f935c6a1e846e87d76e196e9a84d4e0dff4dc0834829d72672
SHA512ef3591072bc53fe4d1e9a9e46ef9abd59af5d23394695bf6818655d6bd248f3d41574b3ae76800d8cc0ccfb8c3d281054f7c39719d133f89834ae9dbca2947b7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\F606C36D149E9742ED00B59E17D88281A7CACD13
Filesize265KB
MD5d51f161ece525e312fbb2b42bebe2c61
SHA1a3e37490ce0087d2d349fb810aefeb45c41954c7
SHA256e6e37ce375265ebaf2433e6f13dc5a75b4259907193f17f1c701cc24098d919e
SHA512a64a47ffce939dc5b4b2359676f4ceb4b0879c78aacfd871c2af3a2fb8d1d523f2b84889f87684f83fec4e2f9529e48c198fc4e1d4295ceed9d07300248db1fb
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\F7C08D17302299394AFEFFF3610A4C0AC5163BD4
Filesize259KB
MD5142f38d433e5d844ef93d536678bf2a7
SHA1375814d9a9512cc94ce87d4672275cf15d618853
SHA25616f907b60b21e3eab4754c4802e1e22f7daae72c84b5bb747fdb727ed27c54b7
SHA5121686ff4bc1886c4f7f13b2db43083d6fb0f320983aae9ab0bf2ce9e5c61033c56c6083b1973d763d724932be3f1680a2205908e251ee20e41019fd35bfb4f266
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\F9B4AF3F6202E5E67A673620DA712A339678D1FD
Filesize341KB
MD5a457eb36d643f08c38e0a6b2d7fb5013
SHA1ff342e93ca1efb3fc606e759c84bf0c39860bea7
SHA2564e52ea0bd37884929ce2ea400f48104dfcd1831e5417c5e03ac4c182a424e6b5
SHA512a7206608338e7e186f581b3e3b60d7a074ac62bf472edbfff15e7495cb57e83de3f4fd1aa82f7bd4047261b1a885709b463dfcbf557620ea37f474a8457654d7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\cache2\entries\FCA300641743444E824CC5CBDEE0D6AD30E59CDA
Filesize95KB
MD555d5c5dc74f580cbe28776081ae744ee
SHA1476203ce8b3fc91c9f3230f0a44187dbbb1cd393
SHA2567d16517f9d585ad07116c9764d0ada86e87dd3815fe6188e8f5ffd96a3a270db
SHA5126f38be728e09723aa276d8187919a984dbe989a85f94ba5315ab48d2f298031983468ac5d74b056b49ccb8ebc2a2aa664f3b677a95a087dff0ffbffee46f3ceb
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\jumpListCache\eF9KoRpFX6BSMXyS6Yw3za7TDTLDNddYqUS+DOPUDBY=.ico
Filesize661B
MD5efb0bae31846e0c77faeb13fa08de599
SHA1e4a20d879cb3a1cc685dbebaa3621267e60d2d81
SHA25641ac5fc81b24fe24dc56e4ed6927e36902bf37582ea2f3d8d387920e00bb975c
SHA512e918e2359cdfee2b361a0c819f718f09f022ef813f95cf02f2f218cd73347c694168a0d4e21c0101fec8c9d542bc4d1a350020a4b9279831be38d7ce25d90004
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\50jftte4.default-release\startupCache\webext.sc.lz4
Filesize106KB
MD524464846927d114119e1f9a90ab00574
SHA13581fa2b19672da078fae8a83d46318a945b9482
SHA2568b22041c6d8cba58e3c8d2e726c3e61c30b71f1c35504e6881a41ac144a86750
SHA5126c136b2ba4a5f5ebea9f69df305888374f383cd87145c9415a7aea72cfab2c0f5e7724b716825c0647802b58e9bd76ba41e06c2f6c012daff46c51e7ddaed191
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\0DNSAWKD\microsoft.windows[1].xml
Filesize1KB
MD581d5239d8ee2a4fc97892a65e3a8dfa9
SHA1db5c2c0c672624b520d83b5d24dda140f05c9bc7
SHA256394278121b2ff1b04df3af91d25c1ab5800dbf9d391c5ccf1b77c76bc423ef75
SHA5128518fb80f3455bfbbbe519cb0062f264a0c83840fd8912420e0670dde6a12ee29e3ed8b637b85254cf5369c0e2b0c04330145cdb516dde3c9e24fa8d52d48008
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133874892169001574.txt
Filesize86KB
MD5df6631070f906088242669beabc79193
SHA168c493f0dc3061514684daa2611fb724ec3e2c0a
SHA2563a6eeee3132cb1d52bf5ed092995836688dfe4fafe6a99f55e2403dce5ce994d
SHA5121835bbb58ca395b939898093368747e37a81bedb7baab8920c88660decf5c5b180b96efc5a6cd696be906b77d8149601919431015fdfa955e7a8e93c1a6df164
-
Filesize
73KB
MD581e5c8596a7e4e98117f5c5143293020
SHA145b7fe0989e2df1b4dfd227f8f3b73b6b7df9081
SHA2567d126ed85df9705ec4f38bd52a73b621cf64dd87a3e8f9429a569f3f82f74004
SHA51205b1e9eef13f7c140eb21f6dcb705ee3aaafabe94857aa86252afa4844de231815078a72e63d43725f6074aa5fefe765feb93a6b9cd510ee067291526bb95ec6
-
Filesize
40KB
MD548c00a7493b28139cbf197ccc8d1f9ed
SHA1a25243b06d4bb83f66b7cd738e79fccf9a02b33b
SHA256905cb1a15eccaa9b79926ee7cfe3629a6f1c6b24bdd6cea9ccb9ebc9eaa92ff7
SHA512c0b0a410ded92adc24c0f347a57d37e7465e50310011a9d636c5224d91fbc5d103920ab5ef86f29168e325b189d2f74659f153595df10eef3a9d348bb595d830
-
Filesize
160KB
MD5237e13b95ab37d0141cf0bc585b8db94
SHA1102c6164c21de1f3e0b7d487dd5dc4c5249e0994
SHA256d19b6b7c57bcee7239526339e683f62d9c2f9690947d0a446001377f0b56103a
SHA5129d0a68a806be25d2eeedba8be1acc2542d44ecd8ba4d9d123543d0f7c4732e1e490bad31cad830f788c81395f6b21d5a277c0bed251c9854440a662ac36ac4cb
-
Filesize
60KB
MD5a334bbf5f5a19b3bdb5b7f1703363981
SHA16cb50b15c0e7d9401364c0fafeef65774f5d1a2c
SHA256c33beaba130f8b740dddb9980fe9012f9322ac6e94f36a6aa6086851c51b98de
SHA5121fa170f643054c0957ed1257c4d7778976c59748670afa877d625aaa006325404bc17c41b47be2906dd3f1e229870d54eb7aba4a412de5adedbd5387e24abf46
-
Filesize
64KB
MD57c5aefb11e797129c9e90f279fbdf71b
SHA1cb9d9cbfbebb5aed6810a4e424a295c27520576e
SHA256394a17150b8774e507b8f368c2c248c10fce50fc43184b744e771f0e79ecafed
SHA512df59a30704d62fa2d598a5824aa04b4b4298f6192a01d93d437b46c4f907c90a1bad357199c51a62beb87cd724a30af55a619baef9ecf2cba032c5290938022a
-
Filesize
60KB
MD54fbbaac42cf2ecb83543f262973d07c0
SHA1ab1b302d7cce10443dfc14a2eba528a0431e1718
SHA2566550582e41fc53b8a7ccdf9ac603216937c6ff2a28e9538610adb7e67d782ab5
SHA5124146999b4bec85bcd2774ac242cb50797134e5180a3b3df627106cdfa28f61aeea75a7530094a9b408bc9699572cae8cf998108bde51b57a6690d44f0b34b69e
-
Filesize
36KB
MD5b4ac608ebf5a8fdefa2d635e83b7c0e8
SHA1d92a2861d5d1eb67ab434ff2bd0a11029b3bd9a9
SHA2568414dfe399813b7426c235ba1e625bd2b5635c8140da0d0cfc947f6565fe415f
SHA5122c42daade24c3ff01c551a223ee183301518357990a9cb2cc2dd7bf411b7059ff8e0bf1d1aee2d268eca58db25902a8048050bdb3cb48ae8be1e4c2631e3d9b4
-
Filesize
60KB
MD59fafb9d0591f2be4c2a846f63d82d301
SHA11df97aa4f3722b6695eac457e207a76a6b7457be
SHA256e78e74c24d468284639faf9dcfdba855f3e4f00b2f26db6b2c491fa51da8916d
SHA512ac0d97833beec2010f79cb1fbdb370d3a812042957f4643657e15eed714b9117c18339c737d3fd95011f873cda46ae195a5a67ae40ff2a5bcbee54d1007f110a
-
Filesize
268KB
MD55c91bf20fe3594b81052d131db798575
SHA1eab3a7a678528b5b2c60d65b61e475f1b2f45baa
SHA256e8ce546196b6878a8c34da863a6c8a7e34af18fb9b509d4d36763734efa2d175
SHA512face50db7025e0eb2e67c4f8ec272413d13491f7438287664593636e3c7e3accaef76c3003a299a1c5873d388b618da9eaede5a675c91f4c1f570b640ac605d6
-
Filesize
28KB
MD50cbf0f4c9e54d12d34cd1a772ba799e1
SHA140e55eb54394d17d2d11ca0089b84e97c19634a7
SHA2566b0b57e5b27d901f4f106b236c58d0b2551b384531a8f3dad6c06ed4261424b1
SHA512bfdb6e8387ffbba3b07869cb3e1c8ca0b2d3336aa474bd19a35e4e3a3a90427e49b4b45c09d8873d9954d0f42b525ed18070b949c6047f4e4cdb096f9c5ae5d5
-
Filesize
8KB
MD5466d35e6a22924dd846a043bc7dd94b8
SHA135e5b7439e3d49cb9dc57e7ef895a3cd8d80fb10
SHA256e4ccf06706e68621bb69add3dd88fed82d30ad8778a55907d33f6d093ac16801
SHA51223b64ed68a8f1df4d942b5a08a6b6296ec5499a13bb48536e8426d9795771dbcef253be738bf6dc7158a5815f8dcc65feb92fadf89ea8054544bb54fc83aa247
-
Filesize
2KB
MD5e4a499b9e1fe33991dbcfb4e926c8821
SHA1951d4750b05ea6a63951a7667566467d01cb2d42
SHA25649e6b848f5a708d161f795157333d7e1c7103455a2f47f50895683ef6a1abe4d
SHA512a291bb986293197a16f75b2473297286525ac5674c08a92c87b5cc1f0f2e62254ea27d626b30898e7857281bdb502f188c365311c99bda5c2dd76da0c82c554a
-
Filesize
28KB
MD5f1656b80eaae5e5201dcbfbcd3523691
SHA16f93d71c210eb59416e31f12e4cc6a0da48de85b
SHA2563f8adc1e332dd5c252bbcf92bf6079b38a74d360d94979169206db34e6a24cd2
SHA512e9c216b9725bd419414155cfdd917f998aa41c463bc46a39e0c025aa030bc02a60c28ac00d03643c24472ffe20b8bbb5447c1a55ff07db3a41d6118b647a0003
-
Filesize
7KB
MD5b127d9187c6dbb1b948053c7c9a6811f
SHA1b3073c8cad22c87dd9b8f76b6ffd0c4d0a2010d9
SHA256bd1295d19d010d4866c9d6d87877913eee69e279d4d089e5756ba285f3424e00
SHA51288e447dd4db40e852d77016cfd24e09063490456c1426a779d33d8a06124569e26597bb1e46a3a2bbf78d9bffee46402c41f0ceb44970d92c69002880ddc0476
-
Filesize
52KB
MD5316999655fef30c52c3854751c663996
SHA1a7862202c3b075bdeb91c5e04fe5ff71907dae59
SHA256ea4ca740cd60d2c88280ff8115bf354876478ef27e9e676d8b66601b4e900ba0
SHA5125555673e9863127749fc240f09cf3fb46e2019b459ad198ba1dc356ba321c41e4295b6b2e2d67079421d7e6d2fb33542b81b0c7dae812fe8e1a87ded044edd44
-
Filesize
76KB
MD5e7cd26405293ee866fefdd715fc8b5e5
SHA16326412d0ea86add8355c76f09dfc5e7942f9c11
SHA256647f7534aaaedffa93534e4cb9b24bfcf91524828ff0364d88973be58139e255
SHA5121114c5f275ecebd5be330aa53ba24d2e7d38fc20bb3bdfa1b872288783ea87a7464d2ab032b542989dee6263499e4e93ca378f9a7d2260aebccbba7fe7f53999
-
Filesize
552KB
MD5497fd4a8f5c4fcdaaac1f761a92a366a
SHA181617006e93f8a171b2c47581c1d67fac463dc93
SHA25691cd76f9fa3b25008decb12c005c194bdf66c8d6526a954de7051bec9aae462a
SHA51273d11a309d8f1a6624520a0bf56d539cb07adee6d46f2049a86919f5ce3556dc031437f797e3296311fe780a8a11a1a37b4a404de337d009e9ed961f75664a25
-
Filesize
2KB
MD57210d5407a2d2f52e851604666403024
SHA1242fde2a7c6a3eff245f06813a2e1bdcaa9f16d9
SHA256337d2fb5252fc532b7bf67476b5979d158ca2ac589e49c6810e2e1afebe296af
SHA5121755a26fa018429aea00ebcc786bb41b0d6c4d26d56cd3b88d886b0c0773d863094797334e72d770635ed29b98d4c8c7f0ec717a23a22adef705a1ccf46b3f68
-
Filesize
4KB
MD54be7661c89897eaa9b28dae290c3922f
SHA14c9d25195093fea7c139167f0c5a40e13f3000f2
SHA256e5e9f7c8dbd47134815e155ed1c7b261805eda6fddea6fa4ea78e0e4fb4f7fb5
SHA5122035b0d35a5b72f5ea5d5d0d959e8c36fc7ac37def40fa8653c45a49434cbe5e1c73aaf144cbfbefc5f832e362b63d00fc3157ca8a1627c3c1494c13a308fc7f
-
Filesize
29KB
MD5c3e8aeabd1b692a9a6c5246f8dcaa7c9
SHA14567ea5044a3cef9cb803210a70866d83535ed31
SHA25638ae07eeb7909bda291d302848b8fe5f11849cf0d597f0e5b300bfed465aed4e
SHA512f74218681bd9d526b68876331b22080f30507898b6a6ebdf173490ca84b696f06f4c97f894cb6052e926b1eee4b28264db1ead28f3bc9f627b4569c1ddcd2d3e
-
Filesize
1.2MB
MD5ed98e67fa8cc190aad0757cd620e6b77
SHA10317b10cdb8ac080ba2919e2c04058f1b6f2f94d
SHA256e0beb19c3536561f603474e3d5e3c3dff341745d317bc4d1463e2abf182bb18d
SHA512ec9c3a71ca9324644d4a2d458e9ba86f90deb9137d0a35793e0932c2aa297877ed7f1ab75729fda96690914e047f1336f100b6809cbc7a33baa1391ed588d7f0
-
Filesize
11KB
MD580d09149ca264c93e7d810aac6411d1d
SHA196e8ddc1d257097991f9cc9aaf38c77add3d6118
SHA256382d745e10944b507a8d9c69ae2e4affd4acf045729a19ac143fa8d9613ccb42
SHA5128813303cd6559e2cc726921838293377e84f9b5902603dac69d93e217ff3153b82b241d51d15808641b5c4fb99613b83912e9deda9d787b4c8ccfbd6afa56bc9
-
Filesize
2KB
MD50a250bb34cfa851e3dd1804251c93f25
SHA1c10e47a593c37dbb7226f65ad490ff65d9c73a34
SHA25685189df1c141ef5d86c93b1142e65bf03db126d12d24e18b93dd4cc9f3e438ae
SHA5128e056f4aa718221afab91c4307ff87db611faa51149310d990db296f979842d57c0653cb23d53fea54a69c99c4e5087a2eb37daa794ba62e6f08a8da41255795
-
Filesize
40KB
MD51587bf2e99abeeae856f33bf98d3512e
SHA1aa0f2a25fa5fc9edb4124e9aa906a52eb787bea9
SHA256c9106198ecbd3a9cab8c2feff07f16d6bb1adfa19550148fc96076f0f28a37b0
SHA51243161c65f2838aa0e8a9be5f3f73d4a6c78ad8605a6503aae16147a73f63fe985b17c17aedc3a4d0010d5216e04800d749b2625182acc84b905c344f0409765a
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
6KB
MD54ff75f505fddcc6a9ae62216446205d9
SHA1efe32d504ce72f32e92dcf01aa2752b04d81a342
SHA256a4c86fc4836ac728d7bd96e7915090fd59521a9e74f1d06ef8e5a47c8695fd81
SHA512ba0469851438212d19906d6da8c4ae95ff1c0711a095d9f21f13530a6b8b21c3acbb0ff55edb8a35b41c1a9a342f5d3421c00ba395bc13bb1ef5902b979ce824
-
Filesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
1.2MB
MD5f4e0d271d78d0ab6f8eb7764c0c761f7
SHA159e01bf27764127d8772c804ddce134819c819e9
SHA256a1885560cb6679cb42a6e992266ab8fdcf7e30ca5167f7c62ecf913501939869
SHA5126e34e80b634a6274230f8e3682d8e6df7067ba5e2327461a280502298cb3a74d4afb8af69168ceff7e5ef44b1d664af87d153416b8c1fc8bc69fa2d44a633ee7
-
Filesize
6.4MB
MD59c352d2ce0c0bdc40c72f52ce3480577
SHA1bd4c956186f33c92eb4469f7e5675510d0790e99
SHA256d7e6580054525d3f21f86edfc9f30b7a75ffa829a1eb67ee3cab33f0040dba4e
SHA512c1926d59272df0e049467f4497bcc3631bbc1aa5337e87f4af31bfdba60c9ef460e394380024ffa7e71fef8938761d48d75e9dc93dc7529d2b9c8c638dddae92
-
Filesize
2.9MB
MD5b826dd92d78ea2526e465a34324ebeea
SHA1bf8a0093acfd2eb93c102e1a5745fb080575372e
SHA2567824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b
SHA5121ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17
-
Filesize
11KB
MD525e8156b7f7ca8dad999ee2b93a32b71
SHA1db587e9e9559b433cee57435cb97a83963659430
SHA256ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986
SHA5121211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56
-
Filesize
14.0MB
MD5bcceccab13375513a6e8ab48e7b63496
SHA163d8a68cf562424d3fc3be1297d83f8247e24142
SHA256a6af95a209b2e652ed6766804b9b8ad6b6a68f2c610b8f14713cd40df0d62bf9
SHA512d94483deaae98bf9212699f1ab0bd913f6151a63e65ebc1ea644ab98d5e3ebd74ecaa08f70aca31e11a5d2c64d1504b723817af35bbe9d7b05c758dd6945d484
-
Filesize
502KB
MD5e690f995973164fe425f76589b1be2d9
SHA1e947c4dad203aab37a003194dddc7980c74fa712
SHA25687862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171
SHA51277991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2
-
Filesize
239KB
MD5fbd830b069aec3de441d201b3b5064d5
SHA15902a351eb9dda68bf5fd739870bc8304cffebd0
SHA256220b4dfe40f0f0bac22f6814b71b0fe48503ac777962d24cba1b177a3a4bc522
SHA512dc28514ed729ed99159a9ddfb75daaa08612d7313b178d96f5524635627ba62a24fcb2da31ef031f64354044024574e4ce6eed757d6e7bc1bb835052f4e84fa8
-
Filesize
204KB
MD58cb9137e39ac819c1c160a0cfa079fb6
SHA119297f6030402bcd92a381a9043ee314136dcae7
SHA2565bfc0acdb38c083158be492c06e01aeb6105f1f012cbf2992ca4e1f4cd5ad026
SHA5120f5f655a46e565bccb11442eb2f728ed428ec95a68dc90e27ecd30e2f1bab22ce827eafd22baa218dbce49c957d412ebe36bd78ad8f41ba2f7f73f6f41df5e52
-
Filesize
3KB
MD57b51b3988ffc0cd25a0f379288288668
SHA1066f04eaa6336098d7cde9c5d30f2fc7a3f82cb0
SHA2563447267080e522b060b7344dfcc9b465fad919fb035a801bee7a917a56bd8035
SHA512cbf86d93b6f177e2d24ed4508e014f7a629dc6afc47afa41f006f639d4de8b4d985588218b9a5a32cf4d3e355f6394632c5805a9805cb14cf824b568dbadcb79
-
Filesize
6KB
MD54695e74cbe9526d5b053a63a3a86f15a
SHA14c78281b36962f3042fa1a38bf12086f555f140c
SHA25661b1035eb0eb48073a4279ec68db5c9b26f54d02190d7d6364ca81f9e8f371ad
SHA512ad5f1effb9ff4f3588a674108247089bfdc9111cc701c287b5500c9bf378e1616ad273e51dd907ba5e8f207670d4eba5f17b46793c26046e2191c3332990a252
-
Filesize
1.2MB
MD5d8be5525b1fc1ad093b13f99c300b5a4
SHA156447f0f37c9ed4e4f6cbf1e194dd966802b73be
SHA2563d82fee9f2a66e50d19cc26f8e14a94351d1a8b32fe3c7b790ea3b8046ef9409
SHA512812999291c91cf52b2258e1459ffca4f21d31bc2714a0a567675c266a0d576fbccc94794f646dafb466c06f961b69f52b1bb804a57c2c64aea4d995d47941392
-
Filesize
3.4MB
MD5499b7a906e7a12a4468195ffced35a1a
SHA14426c0e68ac85a5f2fa12367983191de110f5963
SHA256653b829de89240b1fd1e6e850c8ba52741e1dd8aeb04baf946608bb00e0a558a
SHA512247c9689aed0b0e069df128a1ea3c6337449e56b428f0f46e79bf7e77ebaaf1c9e449aa142bbeffe0f5218f4ad4a4985786a4537bac0b66cbb661f410d146893
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize19KB
MD51aa23ab6f1f35757115114fa844c8219
SHA1025fc7437832004f00984348a44eafdc2c972052
SHA2561bc90db68fa63672bcabae9bb7f5e59b93fac761392b4f35b7da402855348147
SHA5125b8cbb31d9f18ba6433a4c3d77729f793f10064111f28efde0670909b52c8ef81a72bc0dd27ed9d1b69c17ccb1dbd6fce62c4349f162d82a1055b91eae4503c1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize17KB
MD5463285b2a62194741fbec3a26364724f
SHA1a8751ea5931a969b8247f8808b092362b75103db
SHA2562ceef1d780209455ae08b4edf5ec2c17095dfaac4be4a2ef53b557fa6ce25904
SHA512739bf31d70ce9c958d4941e617b809b30a5167726f4c54b89f2dbc9749505e12a44a5feeff013f6080fc2948eddac39ab76125ce065a28a83880912fa1fb0473
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize19KB
MD5ef08c3692872e86df8865e3309ea4b68
SHA1b8e72f1213634d92fcc7fa2a1b04c4afb556684a
SHA256e329ab85a75e1735fc1d1dc8f26d05acdfb99249a3c9a9125b653edafd7d22d5
SHA51278bffd3f8b38b96e5fdc65f5276541fde1386fd52fbff48de6caa4924f39733fa21c78f974a70a1b1b786889bd35f1fe475bc4c149f7bc046526fe7a8d09102d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize19KB
MD5b1030aa3b550b38d83af7f5d14254940
SHA1acd016e21413df6fe3a205360d934a1ce0caa62b
SHA25682bde9d2f1d879b3afa18aadec20e0e542da25f4521f7c5276e1ad084fb2d4d1
SHA512bf1e659f30ea187a20ae5508439e56f414c76f21ede4d6bdf5c0775020c90daae6b674f4ea3e581c51b441713fe4a1f31c038543cea00c9b64ca9bf4694fa579
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize19KB
MD5f2846d0cf95fa5238593905505d6a6e7
SHA1b66c04d9d2ac807088e4e4975a6800ac36e5f2ac
SHA25675be5e65d9e7f7d1f790ebeae3027aef3bdda007631eba1631382a4194953fd1
SHA5128fac234b20fd9ab8a49cc0d7a0cda8700dbb80274c21e47189f9ccce20548ab21b5c61da062b5ff4847aa8f18a515087aa8d2de615037f79737ee30d0a500c6e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize20KB
MD5f931ba518e72a04c65b799cce2519922
SHA18ba1a3b0c113626c35d19d804a9dae51b5cbca80
SHA256d8a67361e8c0abc5519027c143f2d22115484f23315e6295fb884be2ad091885
SHA512ad551e17cc586090d659bed0692a3e4c36724b123e5acfa7155645a6f022230f2c909e774fa3cdfc6ff273ddbfc829d027dbca54f07ff8f95f72a7b85ca1490a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\AlternateServices.bin
Filesize41KB
MD56b2920be47ef070aeda62a00b98d4f02
SHA12b2b86657cadb1e77d729f1787d630d3c64286bf
SHA25646ec502faa8552328e68e04cdbff1c0cbd60204989c3c19a1c538f66edd2a834
SHA5127835f0942383ec2a279127f7006512541c8d22e9e483fc4aefcae8e6f0d07db732c2c7a9da3e95a306e77f3323cafbfac5d5c066df74be72d4738b5d8e416e7f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\AlternateServices.bin
Filesize8KB
MD5ba6a813965decfd1cf191aed550e5c75
SHA14dff14fa453f244f7da03709977ee23966eff2f3
SHA2560b55fc51aa592ff3c804a4fb965045e1aa75333237372838eb1f129e5db1504c
SHA512696a7c36e96457de310e9eb795caba4a1237c82a440f61bb56c725259bbaf4ac93de55c9f8476439524d328567c03a25364fb45a0d1a1d7330177e6aa1b17f2d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\SiteSecurityServiceState.bin
Filesize4KB
MD5811c3ed77ce1e89184ea0ffa43d4465b
SHA13c2c52cc637d6f9d7ff37b94a85735f498b3caa8
SHA2560541c8cda3cf8ca510d2108b9543bd5fdc2f7f1375d052e1c30b2ecfb3551aa9
SHA51221325f9e83bf3134e814cec4f1bdadc2ff1a15682a43115e237283312dee8714883a9773f6e5ad470b5372db01513dba04bc5957e80221a993d78380fae196bd
-
Filesize
512KB
MD521bf65e17dbbeb954006ba419c83f563
SHA194f027bfe577e47b5f18303599ac52bec4851af1
SHA256f1f21bc4f195c4cde951eb96fea6e5d6f174329e34cc3211274374c122583667
SHA51232fa192c4f1b5f24add0467a8f3027e0ec76dd4afadffc75bd9be17d7c82e4fea5b5d59b613c1c97af560a847797432ee5c8efea9075cf3a14c63ec36d91de0d
-
Filesize
512KB
MD504004f134ba1d8dedb663495667f0724
SHA10bef45151bd9d5119b39da2bd09a5ad71a4924c1
SHA256de2a84e6002f3a85ac1bc818837156103e0a6886b27a309c22cf9e1786a01d56
SHA5122363e56f9dc391f8ebe9cf2db43ac7ffac6496676db7498587c854d510e0ca722ecb3a45fa108fc13f4d1490478b88dbdeed21a423de2fbb0c49a4f27a1309a4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\crashes\store.json.mozlz4
Filesize66B
MD5a6338865eb252d0ef8fcf11fa9af3f0d
SHA1cecdd4c4dcae10c2ffc8eb938121b6231de48cd3
SHA256078648c042b9b08483ce246b7f01371072541a2e90d1beb0c8009a6118cbd965
SHA512d950227ac83f4e8246d73f9f35c19e88ce65d0ca5f1ef8ccbb02ed6efc66b1b7e683e2ba0200279d7ca4b49831fd8c3ceb0584265b10accff2611ec1ca8c0c6c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\datareporting\glean\db\data.safe.tmp
Filesize103KB
MD5deb8c0e2a13ffd10df30e50e54721fb0
SHA1f99b88e8b12413f1528af66bbfe1e20ed3a02021
SHA256dd55dc1e58229e24757326a1daa58f34915fb9e99678e00bd170a7ea4fe8c50e
SHA51222a10ee6642724afaa6d2185c610ed5c11e3caf6378b937e82c79a4eb23d1bf9775423b2b5ab375f31e4234f1a5e082ff6e38b2695f4c5488a5b146d6a3b9cc8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\datareporting\glean\db\data.safe.tmp
Filesize103KB
MD50426cd67a61daea2ed32488c80934f32
SHA1bd68c8d0357c6815c0d3f6250ca9a8878853e371
SHA256af23fcc105e34f38e2610e3c9b53391eb0a63f85e40ef37a927d8cefad17d24d
SHA512f83488bbf16489fcddb244f0bd52725289eb884a805bb189855e6bee0abc17bb3a08aa7afb9298d523fe856ee41dd94ea704fa507ae3334e8cdc6cb9fee16498
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\datareporting\glean\db\data.safe.tmp
Filesize147KB
MD5341de61d6c71252d16c262ede1a6068c
SHA170a54591dab1d5bf90d8dd8ee53e2a4f85f9c985
SHA256dbeaafec4dcafedeb58a852827009525cd8403c03c330af180a88b833b013147
SHA512c49749c889f9d0f376930caceaa924ca30c205d9e08f6fd170db5e8a2d5cacd393eccb2d164da1b41c25550b4cbca2d5ad46199bbc2c4309a7f2c09018c81f29
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\datareporting\glean\db\data.safe.tmp
Filesize148KB
MD57ef8918fe1f1eab9047cac5b2ad1fa0d
SHA17c07d7301d0579a962eca612ccea9028bce433cd
SHA2566364fd53dd7d571505840d3d3c065d67c7553d3b2389bfe380db25aa2fadb770
SHA512686d8043e5b14f79e524603259fac74f147915af4a5c2c3c20664b0e2f88d9839f244ba677efb01f583e699d7408b3e2855ac6d109bf1d09b1200af34d6c0ad1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\datareporting\glean\db\data.safe.tmp
Filesize2KB
MD525ccfcd16efaa6690a5c47f0d0af6d45
SHA14fba9f416dd9ce25a315c9b63e2d1b37b3a5bd12
SHA256399ab833ecb5296bc7ba51de296a8ae725951b4ef5841c1dce724b6c1972dbec
SHA512c0cca123715d6cb9a0287205708793cad05b21ebb6e6e360e0aefdb9b2b5754b36ae8f54f23dacf2bd4b9f437302ce634c2dd76bbaf07329fd261428bae9c46c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\datareporting\glean\db\data.safe.tmp
Filesize103KB
MD5eb54b1c55511e4a5624a1190ad315e66
SHA104ed7ed8c78f145bdc200d3078d81fe31aa734a5
SHA25668faa69b4f9a543d50f443dadd805e5fb4cb0f68f3b7f5222c3ed07be168774c
SHA512605416b1f9a91171a25bfcb5aec1c0cb50674070a222f4846626b86cbc32adc8cc2f1b1adc465f4e7254ce11fcf545740371582e8acd79c0e2ed4b80e20e0690
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\datareporting\glean\db\data.safe.tmp
Filesize103KB
MD531aad1c34da8fdce0a11edc41641e4bc
SHA164fe0a67de441ece18ece88bb3a5d4373b7f75ad
SHA2562ea93919769d33965fb795ea1750b657f3fd53c14e3ef0b087254dc5ff981541
SHA512540d78f57425cb72d976cdc3d65fb79619b072516d5a1b0271fa0dbebb3126b1f0137ca87964eab3b3fa7b9cef30a812a47bf7bfa2c0d8816df459bf69f062ff
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5693c066e5566167f039681c9626ebb5f
SHA1859265052bc097081acb431d7a5d728fb5b55b63
SHA2567f4d12779a1144d48c84f76bce85b729ad179dfa549a7814dd8f39e4ac741f92
SHA512d0fc3ca7d6a2ca9ab0504baad440adae06de8314d6dcaae0a240e4b78ec5a154b70a58ae63bd445339e725cf48fba31d16cb7316c4f64fdaa600d721ecbb8102
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5de00166ba20c8804a67811be87f85ad1
SHA17a76c2d49be8687dc5959765c8ed42ce04fc25ef
SHA2566cde5577fe84ba24898d043bb793ddaa14c8c0ac48224c3206acb9cacc76d0c4
SHA51267b90079eb83601bb1aa1ab8ef19504ad32b9aa817433c38a3d4f61d6fbd391e04a58d847ae34ece5c7ae6b6035bc3108d24c8b424773e34a858e3e3890ac5d9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\datareporting\glean\db\data.safe.tmp
Filesize27KB
MD5ff907fa2c0c4e835d828c8972fabd0c0
SHA159c003d43c5947ce77123bcb80dd6b41dce543db
SHA256a31b90eaddec2fa024ba61fb46f7e008a5a80f33a3e60ca86a61d34dfeeb5743
SHA512e3621c59bcf66f3421cc4412caa6315f537eb695701656e9e7d6e01f1fcd9b10d69fb7fcb90c4cee8b1a0bb1bbb466bab158b637bd300a70c460b96f9069ec06
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\datareporting\glean\events\events
Filesize5KB
MD5b6a1e08091bd8abc6167b204dd0390d2
SHA122c075774723b01dfd75259bd25238760e649101
SHA2564bd1d2d9ae11c85f74e6f92f90ce7dcb0469eece76d8682f4e66850adfd77048
SHA512cae5df65517226694f6c9c1b6408fb8abdce6517a69d4e54e9cf35d3a1a215837ed0f32d4af03676176e7ab83045d6a096adaca1095c54a9e41cc29054d3c626
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\datareporting\glean\events\events
Filesize1KB
MD55f884950adf90a63af552358086b71d3
SHA1ef10b79cb2c8e950b979f3bbff33f70783d3ad02
SHA25695aaca5ec7f89f3462f2390f9bbdd66518a28d0bb8982ee1d22ca4b7587adfe4
SHA5128246abc32da6f1daa51bc3b6b67876f1f3f5c4ed13ade0e8a53309bb5f0b29778da7c636df4f020b00dc5039edb738c16ef825bd60014757eae4c4b1041f0744
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\datareporting\glean\events\events
Filesize4KB
MD57f3b6555c4db439e58d7b79f60489657
SHA1d456a00c2df88b48dd092c885f5084968a15fa36
SHA2565615618a69a9590a466f55137b0dab38c1ed5fa80de295d0b1f479315afb88e5
SHA5123a893f06aa5fa8dd8b810890b72a743c6234d1aaee4aa0d37fa030bb05fa590cad95266b6c97184e8c20456ba180bed35bf0a7ec403ec9f8c68c381c4a42b871
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\datareporting\glean\events\events
Filesize1KB
MD50a64cd7247c4c825e0c55d8b7ab8eaf0
SHA1a1cf3992668366a39cf56c88096509480bf0c55a
SHA256a57a75eaba31650f3e7bcafebf53010d9586b97e222db9bf9ed852f923ece0ed
SHA5120222381b22fa74535a792181a5bf7d94c929953c68311b38809b722b08ca7df086ca646915502b0560102fbb5cc125f0ab2330b0f9708408490842fef84c5f7e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\datareporting\glean\events\events
Filesize5KB
MD5073bdfd8c696bc47ac30f8a4d500d4c4
SHA16cb9f76882d076e98bf99455d0c6037d5b70eb06
SHA2564e9ab966d9e96266b2b8374212e9114cdbe6461cec1424b4fda09a0f574c48a9
SHA5121cd7feaf9820d91b03a6facdfdf77b04a47045e7b0e2524b5e49a283f00146b73470734b26974f3e252f3dd970673a623c8aef20c6e9e1f52e7ec60cf3ea1f1f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\datareporting\glean\events\pageload
Filesize5KB
MD538b0e058792cbf60d93c2833f84ebe5f
SHA1d63a59086901bd4998576941748e37830be767bd
SHA256b667b26c245448e6328353a7425792159e2f11b0a5d6bb6d8cfaafe947fa818b
SHA512b0604cde99268ac7e519943bb0ec0474893affcf9682d0b4e901d360e1d041401bb9940ef738d634ac4353411c00d34e863cbc65ff45e35a847ddeb896ed005e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\datareporting\glean\events\pageload
Filesize5KB
MD52d39c43b37c7e0d5fc5ba9fe657e0733
SHA1afc77107b606bff5903becb961f4ab6bc6d515cd
SHA256dfd8975215be3ac576787b497033a3159c279d7c021bba6edc72490b9f909da2
SHA5124a090526b849d233c5a5020033390893ea8cb1b5e62a9998089b791906d6729b2c2b44cdf8997c21c7933ba28288bd7f02d2025b0b272244e0be9b721c3722f5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\datareporting\glean\pending_pings\032126c3-cecc-406d-9aa9-96fc8f152e68
Filesize9KB
MD5d2c8eb32dee8b70a75f7d412b9892cb4
SHA18d9effe25264ec7bce438c5c4363f2827f58184c
SHA256d565ef78c526d45385daf34f58546dc88d0f36366866871b52bd412c97b4ba7f
SHA5125bc1e867651df2af8e8a85a161f7207a374930e09f2b6e6aeb90fd5725748d98ae04e036b2e9b8de0c9a91afd86652ce7be68e86cd3af76de0814aadf7060b00
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\datareporting\glean\pending_pings\15d6d25e-93ff-41a8-92be-f4d1f406f9b4
Filesize11KB
MD5510ee1148401d03719d625bbac777c6d
SHA1181cbc424c5227ded6318cff02977a844eb90e68
SHA2560ffbfd01a6e522108bf9c936a60e5ca9bf7a835210eff633c9844f693453dd3b
SHA512701f329792a2967894e59c36b3baaf49bacfeb19608d9e7f4a1dbf835ae555ef9ec94462bd5a09dcb2d7606117594259c8d60ffa07d52bcfc08942a10a8630fb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\datareporting\glean\pending_pings\3d3e729c-7edd-4d5e-b610-da4985a6aefe
Filesize10KB
MD5e9af2489893c93f7bfcac123eca5894c
SHA11149b42c4ace16e309047847184c013e718b4eb7
SHA25623f519598ed42539d1c7c62830d835d71352a8e4926587b5344a7abe14cdefae
SHA5127a3a6dbd42661ac94912f2260b0f71d1a84e0b98dc941ddfbf80d5e4bdbc09a8832e6c7b4cb21ea6e76de3456d6628f303ab66ad66fd5b5fcff2ecfa57c1318b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\datareporting\glean\pending_pings\478127ef-9130-4259-bb0d-65fa1939cca0
Filesize1003B
MD5d55be8d8986a596599817ab72696985a
SHA171a9411fb22d7a535910d03480f01045e5822e2c
SHA2564549c01fd843fd4b85538247f314d780421446b013d6a4b01e05e8948acaf207
SHA51292c126f45671d59759fd1c8cbb4135f965449ff273be51447015f7457fa3044787c06e8befcc1b4582dbe620a0aef6deeeeec0ec989316cb3b04f420706bc449
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\datareporting\glean\pending_pings\5e7e9214-6ebc-44bd-b915-5b9f8cd8a1bc
Filesize886B
MD57ab070ddb3cc602e4a3da4a093b32889
SHA150be8a7029f670573230a878eaac37d2800fcaa3
SHA25620ba6c1ec55027f9e684c982befb50dd717a4722a86b79173a5de5c16f862006
SHA5126d47d903c7783f61d424099f64806b5d206b7e4dc737a8572a920524816df99f878f13489e90aa6102b0580f8cd03a1660a4a0c588a75572abb15c144c87c5cf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\datareporting\glean\pending_pings\6645e9fb-b76c-4b9e-abbe-ecd91bd5110d
Filesize1021B
MD5253f8b19992e68c4dcbf21d0d2030c70
SHA1afbed12c4e048b236a8754484305f4f1b0f45628
SHA256954c2d115ec76eb6dc130234a868aa2fc2ac0d1f00b2b152e84b1f94300d7a3f
SHA51215602cb8bf8b40fc7d568133d29c49ead577a6711d9dd10621d2d3151144cf22882570f08d5ea3980763acd75ffff1496ad83bcedb89b3c5d180586c4e97e9a4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\datareporting\glean\pending_pings\7a301159-402c-4df7-8d33-fa270f0af5cd
Filesize281B
MD504421255daadb66f2eb248d07251c776
SHA197038ab915842cde96440cfb584875dd36d39207
SHA2563388f7e74e194871af19bdae81d242c8a87396ef719e97a36f9df0336b620aa0
SHA512a506f53a8062b2dc8de40110be90c2ddaf8bcbf1c754a22985b0b8f88df71ef90d741de37ab4aa317daaf8584cc4aa40305e8bfc5fbcd14db1ae35703bb7e66a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\datareporting\glean\pending_pings\8d0020d2-ecd6-438e-9747-ea446d2906bf
Filesize281B
MD53b958b68104d1ff0bf7f280792224519
SHA1ea20ea620a31a1ba1aba02f57d75a95d8b15459d
SHA2569c131d28fc8c99c30da0349662b4e45e4092bf0f4981946b9e4b31435c764b1e
SHA512414462a1d923b17b54e5aeea210220c85cd4e8c9e3c2bfe02a4fb0b79862075998a83a2970037b4ae5b8344d3a89ba6c86048add8f689544165a394a2a8d849f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\datareporting\glean\pending_pings\8d8900d2-f114-4b72-9b7a-3c8fdbead154
Filesize235B
MD5f91f94764c156410eec9dbe2f60cc19a
SHA1771050a0f14725451e122c630ae970f49976f3ff
SHA2561c34a7a127642afb3c63c45a8ea05f8cf823238005dc0a9d238499e7ef1d3b67
SHA51223e64bfe7f39e04e259c22e7e8371bd0fa6409fdb8e709336bd4baba97dafd855d171fda7236c73d6ef125fcd7752a475116268661ebf0bca8af6373caad4e84
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\datareporting\glean\pending_pings\8ffeb5bb-79d0-40ff-a502-8278b5df4026
Filesize2KB
MD5d0788e0949201b6b365b2293dd9ea401
SHA1a221c60797da169036c00079f150ccefc039d793
SHA256a037611c13e404cc23ff63eceeee0532e7d3cd2ccd037058426d4e1a06d6c01d
SHA5125880a03cc9c42efb532f30c3c87a6cea7edfa5cd67edd65a9b49897edf3ff4b0c46e46deda104d2a387e7839505fd496040e9870a264ce952a35e75c2dbb0347
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\datareporting\glean\pending_pings\9ba15f86-faff-4c63-8dca-dbdc8d8bdfc4
Filesize877B
MD500a42f5780b5bd69194c3d3dd9a47b94
SHA101f4bcfcadcb1f6f03e5ca7aa6bcf5a80206bd53
SHA256d7c6b6b35ec4bb2e8e9f1241e5958c0083508d1927d347804b3d134c7fde81c3
SHA512ec17047cc5711e254bbc2c261e7c6d2b28f699a5dea576b779a45c0009fad707b5662aade0ee2e8021d44a39e31ddbc354b9eebfb520f2b736f7d15892af419b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\datareporting\glean\pending_pings\a0783456-ccbf-4f6f-b99b-1e7c63d6e891
Filesize16KB
MD5bc9f75e9e9fc31ec8a123716725c07d3
SHA1ec2675aeba07c11eeeb052cf39fb1be95d0919b3
SHA256cbb8aeed808efe4c9ddb421e37de667e8a8f8214371c226b4a631020095e1215
SHA512dbf98b1901ebf0e994d1eeda86315726b6c62bf0fe89530745a8f7335f003f671b56c1823b527b0abaffbada08d2dea57e569d5b83c87e6fbda1072ecb13a360
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\datareporting\glean\pending_pings\bb158200-e973-4794-8fba-e764d86375cb
Filesize7KB
MD59fccf70bef5579658d63bd1de731742f
SHA11ff6a907e34640a85aa26b3166522480ca7bbdad
SHA2566b35f3623bd1026c07c05b7ffc268423b523d16d8e0c78fd13d3895895e2c496
SHA51206e2407f08af9cc53ea8f7e897686e813b143faf98a3b3beeb4c550483ec5a6aaad7e6f8b13fb7ce492f4de838d9593cf082a99cb1d535c8de9178c50e83b106
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\datareporting\glean\pending_pings\c43d4e80-8d5b-4dff-9f90-ae2964f52834
Filesize235B
MD5f2769cf4adef12b4b0f23538f626f0ba
SHA110e59311907403e32ea0b0b3e81fb3ee68b71610
SHA256c317ba927a1527bfa81eb64e9f369159d59bb42f78765f752a5bd96d1b7f86ce
SHA5126f8e0fe7f05c8a8202b89038bff0c1ed3471c9ce0a6a2c933649d6ef5e0db0bc28466c085364b2331119f88381b78885bccb54df2d2fe979673e4b45ce91e826
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\datareporting\glean\pending_pings\ef010b4a-f2f1-4727-81e0-93b1c8f841fb
Filesize235B
MD59a5cac7b474717ee8c6c6dfc4519d968
SHA1ba4b4d07f619ad8efc016c27f09c0b86c593667f
SHA256c87a841fa4156b434886b5e06a95fb1b1000d52f77674de862c8c46090879f92
SHA5123d1dd45799763b066f5a240a770cbcbca5ffab69ad69209b7677ae6c766914bcce1f204be2d265f6d0af9fd134484da4263cc00e5f758c419589bb405be7e277
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\datareporting\glean\pending_pings\f8c96118-7d8c-42cf-a043-b4037e70c8a4
Filesize1KB
MD59788f5412c1448597c7783effd922af1
SHA1aac4cb9540e9640e445272f5293b0dc572eb6d23
SHA2566d4d64d8ac3683c792c7ab35d70a3f263b8cc54b788c7b76f971784d87c2fb13
SHA512c57a39fb263ff23f71f8667f60690a506ac0e5f2386406ca06e1ce17b76c1274cd09db29bb1b46b85066889d8359ef6dea87959518e2b8fe85449e156d2b2595
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\datareporting\glean\pending_pings\f93c1045-b627-48ff-80ca-d4b28101d733
Filesize883B
MD57ab2c7ea3550abf4faee6a59cbbf8957
SHA1d15cf2e73ae1a69940fc2692b0cfc4e22fa1c61b
SHA256eae8f817101db6e04c058af70b61b7d90b7a97ef7eb2723e2b00ce3ea1058616
SHA5125721772288680c3d90535986532b41fa6cb0d76a6808d619369a6804a48615d3a860d21a4a760908c9997c5819bc53817a23b88a27a7d53a4de0ab8f96592af0
-
Filesize
16KB
MD53f5af021c0bc03a5559a7c8f1ff200d7
SHA1421d2ea771834cd029777ea101612c3bf2cd9ce5
SHA25626ce5ebd9589b44ab481795e577befb4c6595dd9d5aabdcc5a90bd4bed56d5ec
SHA512317bf0f05f288832c18ba575b4e81ef50f00a63b8416a9c566d64f78e6a40800a451e13e0638c60c23c650e76c06989e004bfb643ce2906b0f47da51414020a4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll
Filesize1.1MB
MD5626073e8dcf656ac4130e3283c51cbba
SHA17e3197e5792e34a67bfef9727ce1dd7dc151284c
SHA25637c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651
SHA512eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info
Filesize116B
MD5ae29912407dfadf0d683982d4fb57293
SHA10542053f5a6ce07dc206f69230109be4a5e25775
SHA256fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6
SHA5126f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json
Filesize1001B
MD532aeacedce82bafbcba8d1ade9e88d5a
SHA1a9b4858d2ae0b6595705634fd024f7e076426a24
SHA2564ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce
SHA51267dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll
Filesize18.5MB
MD51b32d1ec35a7ead1671efc0782b7edf0
SHA18e3274b9f2938ff2252ed74779dd6322c601a0c8
SHA2563ed0dec36754402707c2ae4fbfa887fe3089945f6f7c1a8a3e6c1e64ad1c2648
SHA512ab452caa2a529b5bf3874c291f1ffb2a30d9ea43dae5df6a6995dde4bc3506648c749317f0d8e94c31214e62f18f855d933b6d0b6b44634b01e058d3c5fcb499
-
Filesize
11KB
MD52660bead9591d464ca93fc3f38d5d4af
SHA13edb65e173b8ebbfaecc9e40f63dde5adf22400f
SHA25624f226c9a0cc1342f9ecd70be786eb8e9b7d7e60a47aefae0394ba4cc1804ac2
SHA512209368e0a3297add17821abbf7190f1cc76990dbf3578dc6ebd27d0e96b2860ee2a70641a6fb5530532a809f1459c8d0b51243e1f6c1ac898f25bd1f37c592ea
-
Filesize
11KB
MD5cfe36edff065593bb2ab8831b73e6827
SHA149cb30ba2e0074da0238013c018881752c8e9c55
SHA256971946c40218f6697c7adc6c00d8fe973c00c4e77a83d8bfcdeb0230b1a357de
SHA512ac7fae980509a39808253df8c4688c7ccd887359476d2c1a1c296b44f9e29806e032e0cda845d7afdf5c4fad11f4769852c4bab0895819576d1765ab17f162f5
-
Filesize
11KB
MD503f40870f4af63746229452969f6bf3f
SHA120081339c4f2e7ec4505f03fc78116878ac5fded
SHA25655e6404702e1a7ad68c74c2123cdf6badc7afe628ce93bf7c8870e767fe8e871
SHA51231475116d824bdbe25f6184188215bd7095250eb405f0e0b88f37496b9a81fd65da52f3ff42d73fa6d3e4ca0ff63056a8edd23a5b9d2f4def28f16fcb9dc39eb
-
Filesize
6KB
MD5f443b1b96cf2899409387871892d8c54
SHA1200eaca38758855e3fe57487b59a99d2bf423abb
SHA25641ed20cdbecce9ad701114f157f642457bcd45ca3941bb7f787be62c8bc37ac7
SHA512362185a317e7e1d859cd6e000df8933d8594dcf8e57cc00d7d1b06d915408ed2ea3512a53f330ac5ebefa620bbd89bb644de9dba87123dc73c4e9b34c9171432
-
Filesize
11KB
MD5a629f8f5a03040dd7bf529b5009f20a2
SHA1ef3f557e1dcc0ac6fc97ba76f963958ddd6254b3
SHA256072c2fc6973f1bccc362046f648fe8536d5a32deeebfa62e7401e330ea16fdd2
SHA512e49a5cff15d840ca6b3d782caf8b4ce4670f0a03cc6629f78dfeeaf4a5a8584559f3304579aaab2e37f5726c8f522cad74e56223e4e93f0918427d4b04e4160b
-
Filesize
7KB
MD51d56389184686bcd898c8eb1c95bbad7
SHA1b52dc16bee2cdb204884fb815d126beb5a99ee12
SHA2565b998697391de75e0a128ea8bcee9f664a5334332866ae66ffe177ae269ac65c
SHA512f5c8ccd8090b923b1b5347cdd4f119165ad94d5e2f76a398a80e1f8b8b352df53d6a8b42e7c810f1a7459efdb6289a579fa022c2fc267030b89d18f5f5e29fd7
-
Filesize
6KB
MD55f4387e5bbe09682477eed672ef68223
SHA1a741dbff451c9f37a9c156f6157a334e5fc1462e
SHA2562b30ac719d704a1b6931dec56a5a8c967590c98c7c9851025c90d319d321612c
SHA5126c16acbb3fed30dbaac9cebfef6b98f343e9a77d8187ccb601ed3b84075e024ffee1f0583749a23a7400da61cd612debbd70e1bc72a1d40957bff58c1f80b2a5
-
Filesize
8KB
MD581cea4cee7eff4f509ee710e62dc6ec1
SHA1da187ac6a157cecfac54afa21bb203e1f78b61f3
SHA2567336710220ede32ea1cc35ec1e290269761446493d0a3f8784d9eba53655ad44
SHA512b5f12928c8f0a126e8b2c30646dca464979f31f321b25ddad3798a4a14cd1309737c65ef4e6ed3b701b5a8a04f40a1df3d2d135c6336672101ac3264b0cb0f23
-
Filesize
11KB
MD57459c1f549e47374f54dee4d7e2e9434
SHA1578d2eeb36368e244fba11c7432c1a919dc22c05
SHA256726070f6caf43f4d731ae7987109130c5b2a8e9f22354a61614ba88c3392148d
SHA512df47596c2ab8ceec5c595a9cdc034a302d733819bcab5790dff43f3bc84675348d263fc916b245d1a1b3e8352f3e6ff391939059a32f3f873a6aece4de05e500
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\serviceworker-1.txt
Filesize519B
MD5eef8fc360d99332fff668301fd602136
SHA1704087be32e6a204b199956080fc74b2abbd0939
SHA2566e12dbe353c98a877a198acc18bcb2313f8d6fbc1f3d9091dfcc9e3c473a385e
SHA51235a7d043235e738c5dd0186643654dd9ee509af3db7897e2bef982ca07636089aea72dca3af91dd268f565f8b91bfd2a72e495e6b36ee1449e56d8fe52e8812e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\serviceworker-1.txt
Filesize353B
MD502507a00083b3bc50c280c93f54ad7b0
SHA19dbd577898b347d6df5ad405efac79392586df5d
SHA2565ea54811ef61fdf5da5eedd86783ccd64ba77558a7a8d05b64d91428cb056a5f
SHA5129567dc30278ec973600fed2bff44474212c2669dd0de5c1403c5daa78c9da7ed3183eabe49f513484cedee303faf8bb6f59e13498f1499c97e67efaf311ffa01
-
Filesize
190B
MD548921a1f10ef6f7753f1b20a65924b55
SHA1617c208422e68f1d54ad216cf6da61e658b20a58
SHA25630d3611023d70c131cd1d0d49be6182dae8afe6a161b8d335f00fe7a7eaf7eb2
SHA5128378741516ba833640350b2cfc70b60a74984b145e49040545e5820cbefe2bf9eeefb5a3e5f5bbc07195cdee8191da744661761817361373bd9b086275483f50
-
Filesize
338B
MD548110d097f82152b35bbe8344916cb85
SHA10dda32dd53c7e4bdcdee035fcbd6d2a9909726e1
SHA2567e4b120bd0f8977d8f54c5ebf1be56a8859c4a2ea64781f222f2bb7c2ebb4e9d
SHA5127886786a20c45aae592c44b242f5ce95b2bbf474c28cea357e3674c03b2aaac8d47021efad808bda46d9daf05b683265dabcd6f2304eed8e1ce56ec9d5ff9a99
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionCheckpoints.json
Filesize53B
MD5ea8b62857dfdbd3d0be7d7e4a954ec9a
SHA1b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a
SHA256792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da
SHA512076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionCheckpoints.json
Filesize90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionCheckpoints.json.tmp
Filesize259B
MD5700fe59d2eb10b8cd28525fcc46bc0cc
SHA1339badf0e1eba5332bff317d7cf8a41d5860390d
SHA2564f5d849bdf4a5eeeb5da8836589e064e31c8e94129d4e55b1c69a6f98fb9f9ea
SHA5123fa1b3fd4277d5900140e013b1035cb4c72065afcc6b6a8595b43101cfe7d09e75554a877e4a01bb80b0d7a58cdcfe553c4a9ef308c5695c5e77cb0ea99bada4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize7KB
MD52b0ebcbde133501b2108576ef218401c
SHA1c74abd764444dd14700e8b69aaea86134ac018f4
SHA256138c5346b732eac071f8c5fc063e5c2166696449a05ed0125ceeaa9f846a1a11
SHA51287800c45e5d0b75d574359737b3bab7216e6f88adb53931667183a8492d45f41792d5319103cbba09188baac7765b1ab032fc1c3faf42f75e323617bde4398dc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize21KB
MD5ba6c53954592bccaa91ea6210f9847ca
SHA1da9b8cf65365122a9f1b359eed81ee14921938ad
SHA256da705b7c0e92a381bf4fdafe9af84d5cefb6772968dc5d871b2a42b71795fd4b
SHA512138e701e6e77f56401971983d2e51bf151d965df6a83e6bd06e963ea416bfe0fc220c0546276a416480e01f97831b24f3c308cfa1c7d90f93ccb9dbe198721ee
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize7KB
MD5748b167c4108b9f4d13aa04769c82d9f
SHA154bb3d4cb91ce02aa6ffab276056794c84f7f66a
SHA256b3d7c1fa8904a1756f782c2499e008cf563f84dbb43ebc4ab8edf37b31cd6a8a
SHA51228812204517f4f63c1260ae9a7568e5fd6c2629c2d83c63548dec75ca9443ae962ed0e7695af0c8482b381d8288fb33258e2f2ddd07caa31ea1bfa937c343fe1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize3KB
MD5e2b7b380fa96e7a28cc4a80486c970a2
SHA1a171d105eb90e34437bebfee1acdc7614a1fda59
SHA2564be230170a8670d2635507220f6de4ceb939304431eab1ffa1d24fa28c139ace
SHA5123ad6df9310590c49a45b6a177499e5b6cfb74682fb9cf3ccad2c7e67855b7ea7c86373563a260dd629ead860c4b76377f30e6bc115a62fd3a5e87ee984b4c392
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize21KB
MD56429e5a64d2c148314acd32509dbf7d4
SHA158e044d12fa6191c51c9d9165c8d9aef5e2c20ad
SHA2564c99dd706f807b61c2b656ca4ee9cc601f4f4309b9ed08798689ed92a2c53f38
SHA5128abde85ddde96a29d3f07fdc07366b224855f8980c95359af697525147e409d8f90af9c63059aec742bcedb3de6fe4a798cd9c52ba61d792d91822e789f44729
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize21KB
MD5f3b01bd871e6c4e469824f6467bfcfd1
SHA1e2f43861d68b5bac81209fa120faf4dda72e100e
SHA2566ecac819b4971f2c4501976e6ab186131af0475d4b973699d4c6453844f0f5df
SHA5120c52e6e19c9abf4a62b816f4b25b83976d0dee8fbf73f91a794c073b3a2fa36c29aea40f540b8f54b9384f51b833b455a469d99cb4f03bdf1246b161c1ffdad9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize4KB
MD5e2bbcbebb1fb25eefc57f56f8f329e7a
SHA1472021ad6f0080ed7b9e1afc9340d113ccdea9a5
SHA25662b1ced55a1522f66718c3f8631fe4ca9a6b507d42655ea451c4578aa26bf8c7
SHA512151b66b6b65942e5101ec01a8147214ad8a4c939dc663178b1c3b46dac9b64a7e554829fc92e68c62f8960a59a1c9428324019ead093daa4fa1e59407599a67f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize4KB
MD5f3e93ff5d2a236161bf25f3628b2c052
SHA1a73f79c9e7fca32af7d52841f9acc248b2d69d93
SHA256db31ea26171a202b2ef7fee3b7669b3be18dca7d055d4b8b4132357c970ea5a4
SHA5122aa7cc73f5f352a7823d61961f957fb96db0668f022632f3529d0f1502b35915764f862b41e8ded5fac20859a9b2a095da437829bdd99d578e08a9e1a2d1236b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize20KB
MD5552a6bac4a660869c6139dcd63424bfb
SHA1a51b5c25a544927c6f2fa4aa6b1707c1430b4da9
SHA25670a6d46c92f226cb442ac51187ce0910cc0b45fc7aa2815a2f27112ade59ee90
SHA512c54922364df42c1b3d3a1462885a4f71036d85bb10bfa016a74ba3cc73ff926768b7b6d9acf00f9902b1914fb5b6077a992054980680fad368c630064112d076
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize21KB
MD5f29f3a03db2bc74f1593a038e65b7927
SHA14351edc82d240cdaeac6905c54d7cf53dcfae504
SHA2567dec19071094af60d12f36558cfa8ecdf3e5999e34e0f2156251828578330be1
SHA512e0ee72e6c856001be06594d12204f2abfb6bab343a975eb494acbdbd6f683bf7593d8350d0e650f5f6f6372c37ce2e51dc62eb1a7a8d3eda63e59f7aec317eba
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize4KB
MD5d01136f6821080c56b022ec3c9518906
SHA133e1b0a3086f5c7ee5616649e91b9d3a6ad50c8d
SHA256482645b7133d56011a8c311f098d52e564513a089641b9f31dc6a627d9db2118
SHA512e3925f610bd7ee7a5247599f04d9ed375944d47037490a34b0c2b7cb200dbf1e2f5ee8d984c117449a829536eb504540cb6aedf40113759531e2a7da48ab3941
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize3KB
MD55b55658ed556cd281c4d30326b942d80
SHA1eb1571fd5a586f03221c4cd6bfed841ad88a1bc5
SHA2569ea13e803f75db5de7baee6a87dabb158a632e629d611f3b304670522bedb1ae
SHA5127a47ed99091536c4ac53152582fdd3d08fca3022f4491663297e1ad953e9939726e67315a0d69911edb61e92b1c3610db29e8a038034b13c54bf21f6ed6e8ada
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize22KB
MD5e779bec98ff8333deb4bd0077e3a1323
SHA1f2db2554a532403aad0b8c2e9f78924a79142bbe
SHA2561ff096c4d2325a00c90f00184824e98da035aea8312e34f23dd0f50e9c488473
SHA512d9db3c336f7090ed5343fee00cf1e5f72da73c902543583679561e3e21c798542e076ff135c97fe2e93aef2ce29a02e5ed5f2d2a20e71e2896bc0fe5a586c10e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize21KB
MD54c4801ec32a9648e46dbd616b74c6860
SHA121ddb2476264658a0ae65c4fff213b5de6f87335
SHA25691bec7d8115f929c975e2a6ab19fdb8a536173b04d7f635b88d8df7a4afb4f3d
SHA5123d0bbeb423b95ea6eee2f46d992486aefa8e83e7fc4a6a426c1917dbdd3c75ea4f23e73443e08919e5b461b51c1f16dce36012149cbd480383f4cecb5bfc2f56
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize4KB
MD51d0db3dded1f49abdf6160dfe5970b46
SHA121199620b169b09869a4818c9af71ecb367852cd
SHA256198435d06e753dde09911c574319d1559fef87594d75a55412096a34576b18bd
SHA512266546e1cf05baeec09d318183903c1627fde3d277ec2bf398f4b5fe1c813640b678ea2da77c3868c292a0ed4a4875c2a9b334ac5a01b3cc73002fa9bb29069e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize4KB
MD5c71e99e6140f23d2ed47f3588bd96d94
SHA149099bbfe4fb271a0b9c6889db4a41a0c49a368c
SHA256bbc2f71ce90c683d750290de61188d6d6cc0b1c1e96ac8bc73f0e8a3232c9daf
SHA51261a0b07fa5cce4bbaae32f60ecbcc5eee90203682d30684fb0441ecd3d9e84200abcdc7fcdc743d2921ae59ece10eb3947b211dd9bed2ba4a3189e5b5b504fdc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize22KB
MD5ad35c070a8440ca5a4fb5daacbcb57bd
SHA182ac428e40f971e86895987268171171d4480fa4
SHA2567f3171b4b115bb47f981bbdf59c029db76595cc685f39a1c6de74fce1202b3af
SHA512eb5d26099fec3daa300596123e28571639c23433755e93ec3976176d60f74e3b5e3a5eedd68dbc38442b3abd4a6819df990c8bd78ba86fc66473562f468e0f49
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize22KB
MD57735ed0ce853744088cf603c424705f2
SHA134ba68819d8765692541a44074bb5dbd4f7652fc
SHA256a63bad49ecf24da8cd5634387bb273c574313ea5d887174ccde34d92537efde5
SHA5127f08bb92796e096027ed95048f0a8855abf916fb0feceb03a08fa896159a28bb7837f43a38b729e54cf33f446a4c2194abd8c81654581af3516300bbd6dd22c6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize4KB
MD58ee8d5f7b3a7dfdceb144c8911c1d07e
SHA1a936270fce13f69433066aba03d40cc37b5be396
SHA25684147dffd108863b1456ac306bc3d7f9dca923ea3efeb3e0398459bba7365fbe
SHA5123165d08db1f2a74f976b7cb69af27680b04024bc2730bf75332fb23b5ef04966bc1cb3f0a9b3144cd5b786935435dab807dd378aeba35d0935ff4cc813afb2ca
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize4KB
MD55daa8fc2855f490426038ec22ecc976d
SHA1a59000d762f93388fc8006a1a04027a48d1af0a8
SHA256b8a3ade92fecd502d829583df21ca05d670392ab4f5d04a3033b573f09934480
SHA512edde8051aa4d9db671fca2d37a58cf14e3127a339320b2dbf32f1b02ec990e0c1af4779918a933aeb15570adaab4bfa4889b2958518f827dc3e2b9132b1487ab
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD5e65063d98f9f172dcaca6e944abb9cc6
SHA16fa3028b42177e53a230eb16ff8c70d2f02bc3b5
SHA25695944a61307f4cc71a4a83d0c4d6654dd25bd374822ba820be0727e1c88cab4c
SHA5122962c59494f0805e5dd1198c870d275d451d4ba8cc3546fce21190ac2f4fb523375c319a37a78acda29bdee8301109b83572d492b4359dcf123f21a3c22eb65e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize22KB
MD55600f4fa4f75dc222a22e3e382f996de
SHA1fd7a3aa8adcd0ae58dffe5dde978cfbd308746ce
SHA256b9941f6453cb149439ab26616669f73fe3de04f65320d984bc77fa760e535a98
SHA5126619b51d1a0ae12e98fcf3ea4333f21175d15f0ba5656bcfddb5e5a8d71119ccf2a66a7fe075b2624f844ba12c8aec1d4a6fc8bce47efd19e4f3e2afca2c2d9b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize22KB
MD5cbc321e5889a6349b4f6c606f51aa4f6
SHA1313b3e5b5acbbbb6a7a93326639424f8d8607370
SHA2567350b0c0ae2ed6ee90ab013e2d29dfa4ff81d2d60792f29955608ffe2db6c5e1
SHA512cfe62742d9a1908de8b61521d00d30bea025539258217d12636d310f2c1cd7a6bd03cc0534dbf5def5fd997f54a06bcf26f43482cd1f6652aa9eee83f85c678a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize5KB
MD56ccbe56f551ce0f9d79e11d3ed005039
SHA10c18900bf9b9c6643790384defe14f2441386c5a
SHA2560cd59362f90c1deaca0a9fdc2358792a49c5c499491a112544191923b2067f82
SHA512d4dbf2262f0355e95ca145549e2a0c4c8fcd5817da447dd6cee3f10bf06ee49babbee5ba382c636acadc9c27967fdf9a18fea9158a40a036d8b765046a207bdb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize5KB
MD5bcff58e961c0adcb68055f0d47a54e91
SHA1cdc179191e6dfc401769ef5ce68134e884ff54a0
SHA2562c05457fa3773b61a402955c46edb2f5a7995f8d4707686214d25ecd48e08f47
SHA5124186f03c632d7c27e25103034f15a65724cde5d3f1c80c0317f169a693dcadef10ed2bcd5b234fb54065104087cff476aa30d62bcb46b29a93268b386a4f7b0d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize8KB
MD586be1c91950442d4bd1944120655d7aa
SHA1cadfcc71d0cf9d9ada20447576243c4cc6754fa1
SHA2568ae56b62ccbc45bd8b383ceefb3f4283e49ec416a329d709b5f01802a91e366f
SHA51297a91212658f3ac69f232113790f96487b176aa255dfb804d11b7824c218042670ea05c6c7ce2f017f3ff015763c21a3b861052d50fefe8e27779035bb6e7439
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize8KB
MD53aebba70173603282922d6fd739e1d73
SHA177c6cbe7ae079b986688c04ab2a69b9933ae8221
SHA256521c3bd9605067760efd28c15428efcb1fd51076b8b68e2ee2b151262cd4ebde
SHA512af5e3a7e0a3e547f4dcda5d0f7ac084220314203f1affeb5e34c919d41468f09a12c4d0f2b799dcc7dea54e7268235ac464fa6fc93947ddabe926fb08c6b2c0c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize6KB
MD5008f36b85b7d6f2743fe7463347b8b7e
SHA1e82454a087844e3579e52a7d94e793729b549481
SHA256297c82121d8c881426aa593bb5622bb9ec2069fa068e4a7df66b1431067b893b
SHA5126e49053c9c5a7ab2123ee4388d9c388351df81ee05ce71de05204c03cde78ba8ccf6c70c7261fe330001cccf03dd10944b0cc7e3ad4773de26638ad573c2743e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize8KB
MD585195035fe4bcf3a299daad4fa25ad1d
SHA1720613395c2de0980144e13bdc6b3b2a4b967f44
SHA25688cc4a4c3cf092463168686ee719736b9c323942f1427ffed07a966ab2592113
SHA512acd71e6fd4c0f79653ab52a711a4704a652b63f42723e72dd16912fb3833101dee1c23bdf46833eecb5806a4b50558f5756504ab0058de4211fbe02f39c6a27e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize8KB
MD5f7787afc28b25a5bf11f8f31d55f6279
SHA14410808fe0c4ecc5dff19ef14cf73db0cde6a5e7
SHA256a78e2a822b4203465851328533255fdcd0686c770badb03642cdb9b85d1b0b9e
SHA512eba336501dd09589f62a9d56ba531085da5901c69bfc5d46454078fb7112567b8de58a0e3488a856d9800d71b705ca3431774659b69788f987624b74e04ece94
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize6KB
MD5b51f488b19f3fe8c4d6f0e0fcace9145
SHA15d599b29da78b5ab8fe1277737a8dbe11c2adf3f
SHA2567b5bec9c0c48d6380b4283233f3fdc710d0ae66a0efaa947167b2d8095a3fc5e
SHA5129c18f27048abdecf40e68464e18737a1576cba433e574125c0924edf4c79e0b479b87e4059855ffbf770c98fb1e7833fc2b7720e2dc24ef4f4042704369ffd0a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize6KB
MD5251e82280d53c392ed2b1f0f5b6e4b8c
SHA14d6d1c996949b0b5954eb89988eefd93b17ea270
SHA25697d466fd6e47bd5a8dbb6311e536fe69bb04a94b2f04c28a41b96006622a3ac2
SHA51249241cf377181907c662c6caf752e87f91c3354a09ccc8b3ecbd92e800fa5ba8b80df8c773819bdec43e7d2fbb502f3616fcb3b681488f87e243797c17609b7b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize12KB
MD59d0be19b002d9f1a590569eaa4842bd3
SHA1d08bf9a5d7680c12af647c3123f566b54687eb3c
SHA256b00ec1b27dbf4b116d7ff95b18a00bc5036d4cce1b3f61639ee21ae456c59837
SHA5122b8892dfd6e87dfbe9ed6eef459669b1a415aea524ef2ed6176f154798371d7247387d73562c18b8a2562ac7b6f94beea30d65697a2148bfb28cca38aa8073c6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize9KB
MD5bd91d9083f104ee780a4afaf1f77346a
SHA1b6f9cd020a230b7970a060432ffeb1fcdc11b3c5
SHA256bd7c64028b6263701c8634fe059bd854883e1aa41551575b1772e9aaff588920
SHA5125ca8c4bbba3a09213668c88b3ff22bd4ce9b1978a9ec20388befeb34144453cc8d864ec4f129fc42ef86b48b34ab572be16b3cb62414ee3d936ec8308c77bf5a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize7KB
MD58e19bc2670fdc431725457f0e279bd27
SHA1b894dffe3690372799c7b1c73123f3ce7bf25a81
SHA256fb1db990b2a0dd8a6f2b57be6f9c286f3642f992526624f5267ba938714d6aae
SHA51201f91c3fbc6dc7cacc9d2e4efcef44a4bd7abbc0e7bad60c9d82fe1300a591e946817716d9c9f1a3272b8678d217f9b9ff1a9c0798af77e285246b2284e168e6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize7KB
MD580e74c661269cf2c4eb17a5e2f935b4f
SHA1dcb899f85b33b51d594fb62c52beac446b9c0182
SHA25604cc18ba9bace2bb358ba39d2fecf35f3395998247c2b0e20396490e281fb220
SHA512368ddc3602491ed5777b44885d8d086ff5d3fb5671f7c64f08f83620a6a90252dbd771df8491abf5174afae94e212b3dd3a687d61aeafcf4dd271810b0e5fe82
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize12KB
MD54a0b770352bbfbb23466e908348ac2ec
SHA1fd6e0e311124d2f96113f7341ee377ac7e24cf08
SHA25662429cccde8cada19f3800bd29e257cca033ed8678e5ef9721d4dd388f1db833
SHA5129fe89f48cabefa4884ce740f1adafbf4309ae85ab50e8f891d7f276f7f7a96ef792169457da91e930a4504e9c58cc9a54654c26eaad080bf0641782794a9f749
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize9KB
MD5e0a555c9f4cfd558dd7099aead63665c
SHA133ea5535244f0aca39dbb5099abd100654a6f671
SHA25636bad48febd64487eff53845fec8495a1ff8060b371c32c06452e126fbc5881a
SHA51232cd9013c50e7ef850218238e99b76bdd663b980dbdf73dca8046eea30eea8fc1caa8ce75925b886e9fc19bc0143030559a99e3160ed565a73a1d98e7f368a52
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize15KB
MD5f0fd9d76ed9d11c36e2667b5a93d0fab
SHA1a7d482cb5ec757e64b3d68a1d0e1210cc0876200
SHA256766051803f49dec5790ed95313a837c1dc6deab9c27e8c88f716b6b547f1ab0e
SHA5128916b2bf3fdbe99d8e23f87d6b85f4351f2790c89287bee39c00801b7e08a24d82f7a45c55646b921bf4baa22ccd7373463937286d826a3425e7af8f698b4829
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\sessionstore-backups\recovery.baklz4
Filesize11KB
MD523e852df5c3c2b5dc354f0991f862129
SHA11588b310cc29fa292de1711b68bcd6e72a192c4f
SHA256badd480eee112d92c42373ad175b83579a7ac5cc2681cac16db3ffebefc264d5
SHA512da7a03bce0828cd37cc4278c3c96cebc31a68cc869e6e48e7f648ed25e4f6fabef86d1b1995cfbc5824b4aa369593fb2cfa0976cc0c02f1cc3ebfc01893767e2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\storage\default\https+++uk.norton.com\cache\morgue\154\{14c4b11f-bc81-4bb8-8fc4-9859b1357f9a}.final
Filesize12KB
MD52befa5dff309d1e341ee093e2dfd85e6
SHA1520771fb5f8723a119f2f8d341c2bdf0de090374
SHA256184b64e0dc9db3c6ad243209fcf93ec1837c62d8bc27823a1aea6340aeeb104e
SHA5128a8d3a5557e3eccd9cf579dfde91bd780f4d9542341126c9ee250630a5b8a52b5a8e766d5f56535d15c353e53af2a1266f86f91bc80db9565523df5c68ef71d8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\storage\default\https+++www.googletagmanager.com^partitionKey=%28https%2Cankiety-konsumenckie.pl%29\cache\morgue\12\{4ae488a6-e3a6-4691-9b83-75c4a4748c0c}.final
Filesize10KB
MD5be4b8d06204faba090b711ee174418e4
SHA18b60f0834f1576a131c10514e10f7508db287153
SHA2561f38853b4f515c0aa982835b112cd20e62e9ced63ee6d3ac80bb0a6b08c24cc6
SHA512745f17334e1b89d6227068f926cc7f2ad518a84460575029fa3314fbee86bdd77a3fdec81475f3a5b6f52a7fedb516e0d3ccdd72fd8a30357ff22b759328ef0d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\storage\default\https+++www.virustotal.com\cache\morgue\84\{ea251d51-a8f2-491f-9b52-1356e22e1954}.final
Filesize61KB
MD592fd2eeea8018af11dec43e7a90b9986
SHA1b7847c990797fec55fe6b85a090f15c847431700
SHA2569daa053d131f78a26415b8504f42af296a541b75c27050a26174752589b0ffbb
SHA512373d28e5f830c6151359d44213403e9e130a9fa4f947db92e2d64459009c4174240d4f60a9fdea9460b44af67554f402d0bbd0f0f88f293aca7ab5dba42133f9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\50jftte4.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize3.5MB
MD588c953525007af0a3240a64bb8534dd1
SHA18d72a97b3c5534d76a2bed5d693d1fd367683652
SHA2562e31a18c2906dcf68d2dd0b29780d0f58dded9798c776d55b953e1fca13fc443
SHA512f999791e962f89d64e49d5987e1928c32a5f4049f5ab0fe1359e9f2284e2cba42445c6b3012d00be012049abd5b19ef068025bf45805abf46bde03f16fcd8fca
-
Filesize
14KB
MD519dbec50735b5f2a72d4199c4e184960
SHA16fed7732f7cb6f59743795b2ab154a3676f4c822
SHA256a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d
SHA512aa8a6bbb1ec516d5d5acf8be6863a4c6c5d754cee12b3d374c3a6acb393376806edc422f0ffb661c210e5b9485da88521e4a0956a4b7b08a5467cfaacd90591d
-
Filesize
50B
MD5dce5191790621b5e424478ca69c47f55
SHA1ae356a67d337afa5933e3e679e84854deeace048
SHA25686a3e68762720abe870d1396794850220935115d3ccc8bb134ffa521244e3ef8
SHA512a669e10b173fce667d5b369d230d5b1e89e366b05ba4e65919a7e67545dd0b1eca8bcb927f67b12fe47cbe22b0c54c54f1e03beed06379240b05b7b990c5a641
-
Filesize
314KB
MD5ff5afed0a8b802d74af1c1422c720446
SHA17135acfa641a873cb0c4c37afc49266bfeec91d8
SHA25617ac37b4946539fa7fa68b12bd80946d340497a7971802b5848830ad99ea1e10
SHA51211724d26e11b3146e0fc947c06c59c004c015de0afea24ec28a4eb8145fcd51e9b70007e17621c83f406d9aeb7cd96601245671d41c3fcc88a27c33bd7cf55ac
-
Filesize
1.9MB
MD5538aeeefac0c750a2f506a6f3815c7ae
SHA14ae1eb347e7f73618824d1c5e58dd7f0eab31848
SHA256383af7126e2e28748b4b75c66cc3406933a935931185d37b672a033cb193a26c
SHA512ae7eb66f9e2e83442a72b9b837e3ab0d36fa16cf8b45609055d569d2d1e63c63190eb93079450a60fb3b908844144b186c6e180a0c586a7c82fd0f2290890c81
-
Filesize
4.1MB
MD57fa5c660d124162c405984d14042506f
SHA169f0dff06ff1911b97a2a0aa4ca9046b722c6b2f
SHA256fd3edfaff77dd969e3e0d086495e4c742d00e111df9f935ed61dfba8392584b2
SHA512d50848adbfe75f509414acc97096dad191ae4cef54752bdddcb227ffc0f59bfd2770561e7b3c2a14f4a1423215f05847206ad5c242c7fd5b0655edf513b22f6c
-
Filesize
27KB
MD55da8c98136d98dfec4716edd79c7145f
SHA1ed13af4a0a754b8daee4929134d2ff15ebe053cd
SHA25658189cbd4e6dc0c7d8e66b6a6f75652fc9f4afc7ce0eba7d67d8c3feb0d5381f
SHA5126e2b067760ec178cdcc4df04c541ce6940fc2a0cdd36f57f4d6332e38119dbc5e24eb67c11d2c8c8ffeed43533c2dd8b642d2c7c997c392928091b5ccce7582a