Overview
overview
10Static
static
10foo/0044d6...f7.exe
windows7_x64
1foo/0044d6...f7.exe
windows10_x64
1foo/034e4c...a9.exe
windows7_x64
4foo/034e4c...a9.exe
windows10_x64
4foo/035fa2...72.exe
windows7_x64
10foo/035fa2...72.exe
windows10_x64
10foo/04884a...1b.exe
windows7_x64
8foo/04884a...1b.exe
windows10_x64
8foo/06ed82...59.exe
windows7_x64
7foo/06ed82...59.exe
windows10_x64
7foo/07470b...68.exe
windows7_x64
8foo/07470b...68.exe
windows10_x64
8foo/078adb...c0.exe
windows7_x64
10foo/078adb...c0.exe
windows10_x64
10foo/09e5c8...b4.exe
windows7_x64
1foo/09e5c8...b4.exe
windows10_x64
1foo/0becfe...f4.exe
windows7_x64
10foo/0becfe...f4.exe
windows10_x64
10foo/1a78d3...a3.exe
windows7_x64
5foo/1a78d3...a3.exe
windows10_x64
5foo/1ffe82...a6.exe
windows7_x64
10foo/1ffe82...a6.exe
windows10_x64
10foo/255028...e1.dll
windows7_x64
1foo/255028...e1.dll
windows10_x64
1foo/27601d...cc.exe
windows7_x64
8foo/27601d...cc.exe
windows10_x64
8foo/27f911...49.exe
windows7_x64
10foo/27f911...49.exe
windows10_x64
10foo/28408c...c5.exe
windows7_x64
10foo/28408c...c5.exe
windows10_x64
10foo/296822...e4.dll
windows7_x64
3foo/296822...e4.dll
windows10_x64
3foo/2de7b8...a4.exe
windows7_x64
10foo/2de7b8...a4.exe
windows10_x64
10foo/2e00df...8b.exe
windows7_x64
9foo/2e00df...8b.exe
windows10_x64
9foo/2e90a1...22.exe
windows7_x64
6foo/2e90a1...22.exe
windows10_x64
6foo/2f215e...b0.dll
windows7_x64
10foo/2f215e...b0.dll
windows10_x64
10foo/30bc06...3e.exe
windows7_x64
10foo/30bc06...3e.exe
windows10_x64
10foo/312e67...f3.exe
windows7_x64
4foo/312e67...f3.exe
windows10_x64
4foo/383497...1b.exe
windows7_x64
10foo/383497...1b.exe
windows10_x64
10foo/39555e...ec.exe
windows7_x64
10foo/39555e...ec.exe
windows10_x64
10foo/39e531...04.exe
windows7_x64
10foo/39e531...04.exe
windows10_x64
10foo/3aba72...cd.exe
windows7_x64
1foo/3aba72...cd.exe
windows10_x64
1foo/406c9b...fe.exe
windows7_x64
10foo/406c9b...fe.exe
windows10_x64
10foo/457cfd...ca.exe
windows7_x64
7foo/457cfd...ca.exe
windows10_x64
7foo/4761e4...60.exe
windows7_x64
8foo/4761e4...60.exe
windows10_x64
8foo/487f1b...04.exe
windows7_x64
8foo/487f1b...04.exe
windows10_x64
7foo/4a74c9...cf.exe
windows7_x64
10foo/4a74c9...cf.exe
windows10_x64
10foo/4b2d78...4b.exe
windows7_x64
8foo/4b2d78...4b.exe
windows10_x64
8foo/4c49c2...ba.exe
windows7_x64
1foo/4c49c2...ba.exe
windows10_x64
1foo/4cfe8f...77.exe
windows7_x64
9foo/4cfe8f...77.exe
windows10_x64
9foo/4ea454...13.exe
windows7_x64
8foo/4ea454...13.exe
windows10_x64
8foo/52d6c5...7e.exe
windows7_x64
7foo/52d6c5...7e.exe
windows10_x64
7foo/55fc11...e0.exe
windows7_x64
foo/55fc11...e0.exe
windows10_x64
10foo/59f0fb...06.exe
windows7_x64
1foo/59f0fb...06.exe
windows10_x64
1foo/5b1c0d...cb.exe
windows7_x64
1foo/5b1c0d...cb.exe
windows10_x64
1foo/5bc72a...ea.exe
windows7_x64
8foo/5bc72a...ea.exe
windows10_x64
8foo/5d3305...2a.exe
windows7_x64
7foo/5d3305...2a.exe
windows10_x64
7foo/5d9775...39.exe
windows7_x64
8foo/5d9775...39.exe
windows10_x64
8foo/60121e...3e.exe
windows7_x64
9foo/60121e...3e.exe
windows10_x64
9foo/62565a...fd.exe
windows7_x64
10foo/62565a...fd.exe
windows10_x64
10foo/62a3fd...64.exe
windows7_x64
8foo/62a3fd...64.exe
windows10_x64
10foo/63e9ce...d0.exe
windows7_x64
8foo/63e9ce...d0.exe
windows10_x64
8foo/6497ba...c5.exe
windows7_x64
10foo/6497ba...c5.exe
windows10_x64
10foo/698cc8...31.exe
windows7_x64
7foo/698cc8...31.exe
windows10_x64
7foo/6f2c5c...d5.exe
windows7_x64
7foo/6f2c5c...d5.exe
windows10_x64
7foo/798f5e...ba.exe
windows7_x64
10foo/798f5e...ba.exe
windows10_x64
10foo/7aec86...51.exe
windows7_x64
1foo/7aec86...51.exe
windows10_x64
1foo/84bf6e...64.exe
windows7_x64
8foo/84bf6e...64.exe
windows10_x64
8foo/907b7d...b3.exe
windows7_x64
8foo/907b7d...b3.exe
windows10_x64
8foo/928f1d...ee.exe
windows7_x64
1foo/928f1d...ee.exe
windows10_x64
1foo/9401b0...6c.exe
windows7_x64
1foo/9401b0...6c.exe
windows10_x64
1foo/97dd87...84.exe
windows7_x64
10foo/97dd87...84.exe
windows10_x64
10foo/9b8c48...a4.exe
windows7_x64
8foo/9b8c48...a4.exe
windows10_x64
8foo/9cde71...cd.exe
windows7_x64
6foo/9cde71...cd.exe
windows10_x64
6foo/9d3438...4b.exe
windows7_x64
8foo/9d3438...4b.exe
windows10_x64
1foo/9f8818...2d.exe
windows7_x64
8foo/9f8818...2d.exe
windows10_x64
3foo/a17bdc...cf.exe
windows7_x64
9foo/a17bdc...cf.exe
windows10_x64
9foo/a29811...46.exe
windows7_x64
10foo/a29811...46.exe
windows10_x64
10foo/aa3b51...52.exe
windows7_x64
10foo/aa3b51...52.exe
windows10_x64
10foo/acf0b7...c4.exe
windows7_x64
8foo/acf0b7...c4.exe
windows10_x64
8foo/aeca5c...f7.exe
windows7_x64
1foo/aeca5c...f7.exe
windows10_x64
1foo/b10714...f3.exe
windows7_x64
8foo/b10714...f3.exe
windows10_x64
8foo/b23652...9f.exe
windows7_x64
6foo/b23652...9f.exe
windows10_x64
6foo/b514b5...fc.exe
windows7_x64
1foo/b514b5...fc.exe
windows10_x64
1foo/b64196...23.exe
windows7_x64
7foo/b64196...23.exe
windows10_x64
7foo/b693df...60.exe
windows7_x64
7foo/b693df...60.exe
windows10_x64
7foo/b6e7c9...bc.exe
windows7_x64
10foo/b6e7c9...bc.exe
windows10_x64
10foo/b7d5f0...4a.exe
windows7_x64
10foo/b7d5f0...4a.exe
windows10_x64
10foo/ba2d46...29.exe
windows7_x64
1foo/ba2d46...29.exe
windows10_x64
1foo/bad78e...e5.exe
windows7_x64
9foo/bad78e...e5.exe
windows10_x64
9foo/bc6536...b9.exe
windows7_x64
10foo/bc6536...b9.exe
windows10_x64
10foo/be85e0...2c.exe
windows7_x64
1foo/be85e0...2c.exe
windows10_x64
1foo/c914b1...ee.exe
windows7_x64
3foo/c914b1...ee.exe
windows10_x64
3foo/c944ea...cc.exe
windows7_x64
8foo/c944ea...cc.exe
windows10_x64
8foo/cad363...8b.exe
windows7_x64
6foo/cad363...8b.exe
windows10_x64
6foo/cd89b6...df.exe
windows7_x64
8foo/cd89b6...df.exe
windows10_x64
8foo/d81e76...c4.exe
windows7_x64
10foo/d81e76...c4.exe
windows10_x64
10foo/d86d2c...08.exe
windows7_x64
10foo/d86d2c...08.exe
windows10_x64
10foo/d8e37d...98.exe
windows7_x64
9foo/d8e37d...98.exe
windows10_x64
9foo/dea515...e1.exe
windows7_x64
10foo/dea515...e1.exe
windows10_x64
6foo/dfcc55...b8.exe
windows7_x64
7foo/dfcc55...b8.exe
windows10_x64
7foo/e03bd4...fe.exe
windows7_x64
8foo/e03bd4...fe.exe
windows10_x64
8foo/e16ec7...2d.exe
windows7_x64
8foo/e16ec7...2d.exe
windows10_x64
8foo/e61c0e...0e.exe
windows7_x64
7foo/e61c0e...0e.exe
windows10_x64
7foo/e78fad...51.exe
windows7_x64
8foo/e78fad...51.exe
windows10_x64
8foo/e7ad45...88.exe
windows7_x64
3foo/e7ad45...88.exe
windows10_x64
3foo/e95678...8f.exe
windows7_x64
1foo/e95678...8f.exe
windows10_x64
1foo/edf723...ee.dll
windows7_x64
1foo/edf723...ee.dll
windows10_x64
1foo/f2366f...f5.exe
windows7_x64
1foo/f2366f...f5.exe
windows10_x64
1foo/f645a9...1f.exe
windows7_x64
1foo/f645a9...1f.exe
windows10_x64
1foo/f65e75...56.exe
windows7_x64
1foo/f65e75...56.exe
windows10_x64
1foo/f66028...2b.exe
windows7_x64
8foo/f66028...2b.exe
windows10_x64
8foo/f6c1c7...89.exe
windows7_x64
10foo/f6c1c7...89.exe
windows10_x64
10foo/fbab90...7c.exe
windows7_x64
7foo/fbab90...7c.exe
windows10_x64
7foo/fcdc00...b3.exe
windows7_x64
8foo/fcdc00...b3.exe
windows10_x64
8foo/fffb61...ba.exe
windows7_x64
1foo/fffb61...ba.exe
windows10_x64
1Analysis
-
max time kernel
154s -
max time network
77s -
platform
windows7_x64 -
resource
win7 -
submitted
11-08-2020 12:30
Static task
static1
Behavioral task
behavioral1
Sample
foo/0044d66e4abf7c4af6b5d207065320f7.exe
Resource
win7
Behavioral task
behavioral2
Sample
foo/0044d66e4abf7c4af6b5d207065320f7.exe
Resource
win10v200722
Behavioral task
behavioral3
Sample
foo/034e4c62965f8d5dd5d5a2ce34a53ba9.exe
Resource
win7
Behavioral task
behavioral4
Sample
foo/034e4c62965f8d5dd5d5a2ce34a53ba9.exe
Resource
win10
Behavioral task
behavioral5
Sample
foo/035fa2f2fae0a8fad733686a7d9ea772.exe
Resource
win7v200722
Behavioral task
behavioral6
Sample
foo/035fa2f2fae0a8fad733686a7d9ea772.exe
Resource
win10
Behavioral task
behavioral7
Sample
foo/04884a82d01d733f245d921e1f74fb1b.exe
Resource
win7v200722
Behavioral task
behavioral8
Sample
foo/04884a82d01d733f245d921e1f74fb1b.exe
Resource
win10
Behavioral task
behavioral9
Sample
foo/06ed82e88e1f68cc08602d7cd8ec5f59.exe
Resource
win7v200722
Behavioral task
behavioral10
Sample
foo/06ed82e88e1f68cc08602d7cd8ec5f59.exe
Resource
win10
Behavioral task
behavioral11
Sample
foo/07470b6ede84f02ec31ab0a601cdc068.exe
Resource
win7
Behavioral task
behavioral12
Sample
foo/07470b6ede84f02ec31ab0a601cdc068.exe
Resource
win10v200722
Behavioral task
behavioral13
Sample
foo/078adb95b1a0a6449d8c4ece796deac0.exe
Resource
win7
Behavioral task
behavioral14
Sample
foo/078adb95b1a0a6449d8c4ece796deac0.exe
Resource
win10v200722
Behavioral task
behavioral15
Sample
foo/09e5c88a0592763e0c4f30fb88d663b4.exe
Resource
win7v200722
Behavioral task
behavioral16
Sample
foo/09e5c88a0592763e0c4f30fb88d663b4.exe
Resource
win10v200722
Behavioral task
behavioral17
Sample
foo/0becfedf4d0b9ad5251aca33274a4cf4.exe
Resource
win7
Behavioral task
behavioral18
Sample
foo/0becfedf4d0b9ad5251aca33274a4cf4.exe
Resource
win10
Behavioral task
behavioral19
Sample
foo/1a78d313f2891bd468f78694814a28a3.exe
Resource
win7v200722
Behavioral task
behavioral20
Sample
foo/1a78d313f2891bd468f78694814a28a3.exe
Resource
win10
Behavioral task
behavioral21
Sample
foo/1ffe827beb75335731cb6f052a8ec3a6.exe
Resource
win7v200722
Behavioral task
behavioral22
Sample
foo/1ffe827beb75335731cb6f052a8ec3a6.exe
Resource
win10v200722
Behavioral task
behavioral23
Sample
foo/255028f2f37838e92f84f27c68aaf4e1.dll
Resource
win7v200722
Behavioral task
behavioral24
Sample
foo/255028f2f37838e92f84f27c68aaf4e1.dll
Resource
win10
Behavioral task
behavioral25
Sample
foo/27601d095e5b3761d9289584415a73cc.exe
Resource
win7
Behavioral task
behavioral26
Sample
foo/27601d095e5b3761d9289584415a73cc.exe
Resource
win10v200722
Behavioral task
behavioral27
Sample
foo/27f9116902c35a9b784c703762bbd249.exe
Resource
win7
Behavioral task
behavioral28
Sample
foo/27f9116902c35a9b784c703762bbd249.exe
Resource
win10v200722
Behavioral task
behavioral29
Sample
foo/28408caa2961caecd35c9f8f7c1aecc5.exe
Resource
win7
Behavioral task
behavioral30
Sample
foo/28408caa2961caecd35c9f8f7c1aecc5.exe
Resource
win10v200722
Behavioral task
behavioral31
Sample
foo/29682275a385f42634ee312db7f666e4.dll
Resource
win7
Behavioral task
behavioral32
Sample
foo/29682275a385f42634ee312db7f666e4.dll
Resource
win10
Behavioral task
behavioral33
Sample
foo/2de7b886ed3bf5455694d76ac69a96a4.exe
Resource
win7v200722
Behavioral task
behavioral34
Sample
foo/2de7b886ed3bf5455694d76ac69a96a4.exe
Resource
win10v200722
Behavioral task
behavioral35
Sample
foo/2e00df497f82c0bf215548969fefc18b.exe
Resource
win7v200722
Behavioral task
behavioral36
Sample
foo/2e00df497f82c0bf215548969fefc18b.exe
Resource
win10v200722
Behavioral task
behavioral37
Sample
foo/2e90a15707ad3eb4cd06bd8a05463922.exe
Resource
win7
Behavioral task
behavioral38
Sample
foo/2e90a15707ad3eb4cd06bd8a05463922.exe
Resource
win10
Behavioral task
behavioral39
Sample
foo/2f215e008c6a7d8886c578e442b8f1b0.dll
Resource
win7
Behavioral task
behavioral40
Sample
foo/2f215e008c6a7d8886c578e442b8f1b0.dll
Resource
win10
Behavioral task
behavioral41
Sample
foo/30bc06d0add076dd6500fcdfbc12643e.exe
Resource
win7
Behavioral task
behavioral42
Sample
foo/30bc06d0add076dd6500fcdfbc12643e.exe
Resource
win10
Behavioral task
behavioral43
Sample
foo/312e67dc35992949937d1bad6ba529f3.exe
Resource
win7
Behavioral task
behavioral44
Sample
foo/312e67dc35992949937d1bad6ba529f3.exe
Resource
win10v200722
Behavioral task
behavioral45
Sample
foo/383497fda5ca670a06dc688443c2011b.exe
Resource
win7
Behavioral task
behavioral46
Sample
foo/383497fda5ca670a06dc688443c2011b.exe
Resource
win10v200722
Behavioral task
behavioral47
Sample
foo/39555eb0403a69906729713ad20888ec.exe
Resource
win7
Behavioral task
behavioral48
Sample
foo/39555eb0403a69906729713ad20888ec.exe
Resource
win10v200722
Behavioral task
behavioral49
Sample
foo/39e5310f67f0b1bf98604a2e0edb9204.exe
Resource
win7v200722
Behavioral task
behavioral50
Sample
foo/39e5310f67f0b1bf98604a2e0edb9204.exe
Resource
win10v200722
Behavioral task
behavioral51
Sample
foo/3aba72d1f87f4372162972b6a45ed8cd.exe
Resource
win7v200722
Behavioral task
behavioral52
Sample
foo/3aba72d1f87f4372162972b6a45ed8cd.exe
Resource
win10v200722
Behavioral task
behavioral53
Sample
foo/406c9b9529109f835fe7292e6cf3fefe.exe
Resource
win7v200722
Behavioral task
behavioral54
Sample
foo/406c9b9529109f835fe7292e6cf3fefe.exe
Resource
win10v200722
Behavioral task
behavioral55
Sample
foo/457cfd3e7a53e7500f8206b3ea300aca.exe
Resource
win7v200722
Behavioral task
behavioral56
Sample
foo/457cfd3e7a53e7500f8206b3ea300aca.exe
Resource
win10
Behavioral task
behavioral57
Sample
foo/4761e4b165f62d326b9032d96329e460.exe
Resource
win7v200722
Behavioral task
behavioral58
Sample
foo/4761e4b165f62d326b9032d96329e460.exe
Resource
win10
Behavioral task
behavioral59
Sample
foo/487f1b1f30212eaa9104c084a667f104.exe
Resource
win7v200722
Behavioral task
behavioral60
Sample
foo/487f1b1f30212eaa9104c084a667f104.exe
Resource
win10
Behavioral task
behavioral61
Sample
foo/4a74c9f378007412ec2c8b2eea6da4cf.exe
Resource
win7
Behavioral task
behavioral62
Sample
foo/4a74c9f378007412ec2c8b2eea6da4cf.exe
Resource
win10v200722
Behavioral task
behavioral63
Sample
foo/4b2d7854b47943b118e24c6ec79b974b.exe
Resource
win7
Behavioral task
behavioral64
Sample
foo/4b2d7854b47943b118e24c6ec79b974b.exe
Resource
win10
Behavioral task
behavioral65
Sample
foo/4c49c2496ae538bcec9e1510f3eb8eba.exe
Resource
win7v200722
Behavioral task
behavioral66
Sample
foo/4c49c2496ae538bcec9e1510f3eb8eba.exe
Resource
win10v200722
Behavioral task
behavioral67
Sample
foo/4cfe8f3aa1592035b9a2cdb2c4f54c77.exe
Resource
win7v200722
Behavioral task
behavioral68
Sample
foo/4cfe8f3aa1592035b9a2cdb2c4f54c77.exe
Resource
win10
Behavioral task
behavioral69
Sample
foo/4ea45460c3e7c3d8486d3f7bec90c613.exe
Resource
win7
Behavioral task
behavioral70
Sample
foo/4ea45460c3e7c3d8486d3f7bec90c613.exe
Resource
win10v200722
Behavioral task
behavioral71
Sample
foo/52d6c59fcfe73048a240c7fdd1f04d7e.exe
Resource
win7
Behavioral task
behavioral72
Sample
foo/52d6c59fcfe73048a240c7fdd1f04d7e.exe
Resource
win10v200722
Behavioral task
behavioral73
Sample
foo/55fc11ec67a00177d047d5abc84231e0.exe
Resource
win7v200722
Behavioral task
behavioral74
Sample
foo/55fc11ec67a00177d047d5abc84231e0.exe
Resource
win10
Behavioral task
behavioral75
Sample
foo/59f0fbc29bace019804b8a181ce75a06.exe
Resource
win7v200722
Behavioral task
behavioral76
Sample
foo/59f0fbc29bace019804b8a181ce75a06.exe
Resource
win10
Behavioral task
behavioral77
Sample
foo/5b1c0df2be80006ec3af6a5eeea17ecb.exe
Resource
win7v200722
Behavioral task
behavioral78
Sample
foo/5b1c0df2be80006ec3af6a5eeea17ecb.exe
Resource
win10
Behavioral task
behavioral79
Sample
foo/5bc72a1ae433663758319d97917b77ea.exe
Resource
win7v200722
Behavioral task
behavioral80
Sample
foo/5bc72a1ae433663758319d97917b77ea.exe
Resource
win10v200722
Behavioral task
behavioral81
Sample
foo/5d33050f0514054c49f2bc2ff9abee2a.exe
Resource
win7
Behavioral task
behavioral82
Sample
foo/5d33050f0514054c49f2bc2ff9abee2a.exe
Resource
win10
Behavioral task
behavioral83
Sample
foo/5d9775622b5e7123d5796d4de5dc2839.exe
Resource
win7
Behavioral task
behavioral84
Sample
foo/5d9775622b5e7123d5796d4de5dc2839.exe
Resource
win10
Behavioral task
behavioral85
Sample
foo/60121ea2ab380455f7e143cd9438443e.exe
Resource
win7
Behavioral task
behavioral86
Sample
foo/60121ea2ab380455f7e143cd9438443e.exe
Resource
win10
Behavioral task
behavioral87
Sample
foo/62565a39c4a264e48e0678edad5d60fd.exe
Resource
win7
Behavioral task
behavioral88
Sample
foo/62565a39c4a264e48e0678edad5d60fd.exe
Resource
win10v200722
Behavioral task
behavioral89
Sample
foo/62a3fd9b4932e59a7192813c22617764.exe
Resource
win7v200722
Behavioral task
behavioral90
Sample
foo/62a3fd9b4932e59a7192813c22617764.exe
Resource
win10
Behavioral task
behavioral91
Sample
foo/63e9ce22dbf66934fd75c77bc84954d0.exe
Resource
win7
Behavioral task
behavioral92
Sample
foo/63e9ce22dbf66934fd75c77bc84954d0.exe
Resource
win10
Behavioral task
behavioral93
Sample
foo/6497ba06c339ec8ca438ddf0dd2f8fc5.exe
Resource
win7v200722
Behavioral task
behavioral94
Sample
foo/6497ba06c339ec8ca438ddf0dd2f8fc5.exe
Resource
win10v200722
Behavioral task
behavioral95
Sample
foo/698cc868cdae13a5cc744020ec00e331.exe
Resource
win7v200722
Behavioral task
behavioral96
Sample
foo/698cc868cdae13a5cc744020ec00e331.exe
Resource
win10v200722
Behavioral task
behavioral97
Sample
foo/6f2c5c31fefa00afa2af1adcbdd93ad5.exe
Resource
win7v200722
Behavioral task
behavioral98
Sample
foo/6f2c5c31fefa00afa2af1adcbdd93ad5.exe
Resource
win10v200722
Behavioral task
behavioral99
Sample
foo/798f5e61531f527821a490a15ef957ba.exe
Resource
win7v200722
Behavioral task
behavioral100
Sample
foo/798f5e61531f527821a490a15ef957ba.exe
Resource
win10v200722
Behavioral task
behavioral101
Sample
foo/7aec86c6c4cc35139b7874a0117e4451.exe
Resource
win7v200722
Behavioral task
behavioral102
Sample
foo/7aec86c6c4cc35139b7874a0117e4451.exe
Resource
win10v200722
Behavioral task
behavioral103
Sample
foo/84bf6e1a8fcd94cf6cba6ac7e2a95b64.exe
Resource
win7v200722
Behavioral task
behavioral104
Sample
foo/84bf6e1a8fcd94cf6cba6ac7e2a95b64.exe
Resource
win10v200722
Behavioral task
behavioral105
Sample
foo/907b7d9a23ed7821abb700fcbe1c9bb3.exe
Resource
win7v200722
Behavioral task
behavioral106
Sample
foo/907b7d9a23ed7821abb700fcbe1c9bb3.exe
Resource
win10v200722
Behavioral task
behavioral107
Sample
foo/928f1db0c63d122f0183686a3bdfccee.exe
Resource
win7v200722
Behavioral task
behavioral108
Sample
foo/928f1db0c63d122f0183686a3bdfccee.exe
Resource
win10
Behavioral task
behavioral109
Sample
foo/9401b0788dc22eeb1dace02d23a9596c.exe
Resource
win7
Behavioral task
behavioral110
Sample
foo/9401b0788dc22eeb1dace02d23a9596c.exe
Resource
win10v200722
Behavioral task
behavioral111
Sample
foo/97dd8726304f889ef12ef1beb510be84.exe
Resource
win7
Behavioral task
behavioral112
Sample
foo/97dd8726304f889ef12ef1beb510be84.exe
Resource
win10v200722
Behavioral task
behavioral113
Sample
foo/9b8c48e6186718b7b290ceed9369a1a4.exe
Resource
win7v200722
Behavioral task
behavioral114
Sample
foo/9b8c48e6186718b7b290ceed9369a1a4.exe
Resource
win10
Behavioral task
behavioral115
Sample
foo/9cde71abfd2a6aeb83cdd233cbc04fcd.exe
Resource
win7v200722
Behavioral task
behavioral116
Sample
foo/9cde71abfd2a6aeb83cdd233cbc04fcd.exe
Resource
win10
Behavioral task
behavioral117
Sample
foo/9d3438ba1dbdbcc2a65451893e38004b.exe
Resource
win7
Behavioral task
behavioral118
Sample
foo/9d3438ba1dbdbcc2a65451893e38004b.exe
Resource
win10
Behavioral task
behavioral119
Sample
foo/9f88187d774cc9eaf89dc65479c4302d.exe
Resource
win7
Behavioral task
behavioral120
Sample
foo/9f88187d774cc9eaf89dc65479c4302d.exe
Resource
win10
Behavioral task
behavioral121
Sample
foo/a17bdcde184026e23ae6dc8723f73fcf.exe
Resource
win7v200722
Behavioral task
behavioral122
Sample
foo/a17bdcde184026e23ae6dc8723f73fcf.exe
Resource
win10v200722
Behavioral task
behavioral123
Sample
foo/a2981192a30538e97b55f363abbce946.exe
Resource
win7
Behavioral task
behavioral124
Sample
foo/a2981192a30538e97b55f363abbce946.exe
Resource
win10
Behavioral task
behavioral125
Sample
foo/aa3b51bd50bcc98f763cffcf7f907152.exe
Resource
win7
Behavioral task
behavioral126
Sample
foo/aa3b51bd50bcc98f763cffcf7f907152.exe
Resource
win10
Behavioral task
behavioral127
Sample
foo/acf0b7f4fe980501192187bb9b8e20c4.exe
Resource
win7v200722
Behavioral task
behavioral128
Sample
foo/acf0b7f4fe980501192187bb9b8e20c4.exe
Resource
win10
Behavioral task
behavioral129
Sample
foo/aeca5c301d02253e8ffcc240c08f61f7.exe
Resource
win7v200722
Behavioral task
behavioral130
Sample
foo/aeca5c301d02253e8ffcc240c08f61f7.exe
Resource
win10
Behavioral task
behavioral131
Sample
foo/b1071426aa88f31339f1b369cf13cef3.exe
Resource
win7v200722
Behavioral task
behavioral132
Sample
foo/b1071426aa88f31339f1b369cf13cef3.exe
Resource
win10v200722
Behavioral task
behavioral133
Sample
foo/b2365260985173cc758575cd8059459f.exe
Resource
win7v200722
Behavioral task
behavioral134
Sample
foo/b2365260985173cc758575cd8059459f.exe
Resource
win10
Behavioral task
behavioral135
Sample
foo/b514b59324818c52140b431aeac96bfc.exe
Resource
win7v200722
Behavioral task
behavioral136
Sample
foo/b514b59324818c52140b431aeac96bfc.exe
Resource
win10
Behavioral task
behavioral137
Sample
foo/b641961018d09dfbd7fa9c15f09a7723.exe
Resource
win7
Behavioral task
behavioral138
Sample
foo/b641961018d09dfbd7fa9c15f09a7723.exe
Resource
win10
Behavioral task
behavioral139
Sample
foo/b693dfe99d2915616044eea2cfe18360.exe
Resource
win7
Behavioral task
behavioral140
Sample
foo/b693dfe99d2915616044eea2cfe18360.exe
Resource
win10
Behavioral task
behavioral141
Sample
foo/b6e7c9793cf40153bf8865195e06ecbc.exe
Resource
win7v200722
Behavioral task
behavioral142
Sample
foo/b6e7c9793cf40153bf8865195e06ecbc.exe
Resource
win10v200722
Behavioral task
behavioral143
Sample
foo/b7d5f0b9bf2e6e13c5b3ca1c2a0a8b4a.exe
Resource
win7
Behavioral task
behavioral144
Sample
foo/b7d5f0b9bf2e6e13c5b3ca1c2a0a8b4a.exe
Resource
win10v200722
Behavioral task
behavioral145
Sample
foo/ba2d460199eb2d9e9d6d0559bb455529.exe
Resource
win7
Behavioral task
behavioral146
Sample
foo/ba2d460199eb2d9e9d6d0559bb455529.exe
Resource
win10v200722
Behavioral task
behavioral147
Sample
foo/bad78e11371381ce9e1d703aac2821e5.exe
Resource
win7
Behavioral task
behavioral148
Sample
foo/bad78e11371381ce9e1d703aac2821e5.exe
Resource
win10v200722
Behavioral task
behavioral149
Sample
foo/bc6536b86b04cf5b3bf7cd353d615ab9.exe
Resource
win7v200722
Behavioral task
behavioral150
Sample
foo/bc6536b86b04cf5b3bf7cd353d615ab9.exe
Resource
win10v200722
Behavioral task
behavioral151
Sample
foo/be85e0b2608a55942aa101c66ce6c32c.exe
Resource
win7v200722
Behavioral task
behavioral152
Sample
foo/be85e0b2608a55942aa101c66ce6c32c.exe
Resource
win10v200722
Behavioral task
behavioral153
Sample
foo/c914b169d1388c5e78421045d05946ee.exe
Resource
win7v200722
Behavioral task
behavioral154
Sample
foo/c914b169d1388c5e78421045d05946ee.exe
Resource
win10v200722
Behavioral task
behavioral155
Sample
foo/c944eadb6e032fd9e7a0988464a6f1cc.exe
Resource
win7v200722
Behavioral task
behavioral156
Sample
foo/c944eadb6e032fd9e7a0988464a6f1cc.exe
Resource
win10v200722
Behavioral task
behavioral157
Sample
foo/cad3634df5d5058551bed38237ab8e8b.exe
Resource
win7
Behavioral task
behavioral158
Sample
foo/cad3634df5d5058551bed38237ab8e8b.exe
Resource
win10v200722
Behavioral task
behavioral159
Sample
foo/cd89b6c808c296cde0bc77ee630dc7df.exe
Resource
win7v200722
Behavioral task
behavioral160
Sample
foo/cd89b6c808c296cde0bc77ee630dc7df.exe
Resource
win10v200722
Behavioral task
behavioral161
Sample
foo/d81e76123ccb64b73eeac2f31a7434c4.exe
Resource
win7v200722
Behavioral task
behavioral162
Sample
foo/d81e76123ccb64b73eeac2f31a7434c4.exe
Resource
win10
Behavioral task
behavioral163
Sample
foo/d86d2cb12111422ad0b401afa523e308.exe
Resource
win7v200722
Behavioral task
behavioral164
Sample
foo/d86d2cb12111422ad0b401afa523e308.exe
Resource
win10v200722
Behavioral task
behavioral165
Sample
foo/d8e37dd7ca017370a0b54147a27a7498.exe
Resource
win7v200722
Behavioral task
behavioral166
Sample
foo/d8e37dd7ca017370a0b54147a27a7498.exe
Resource
win10
Behavioral task
behavioral167
Sample
foo/dea515c25081073ec2cee293b2991ee1.exe
Resource
win7v200722
Behavioral task
behavioral168
Sample
foo/dea515c25081073ec2cee293b2991ee1.exe
Resource
win10v200722
Behavioral task
behavioral169
Sample
foo/dfcc555a02bccc9c438b08555b5c2ab8.exe
Resource
win7
Behavioral task
behavioral170
Sample
foo/dfcc555a02bccc9c438b08555b5c2ab8.exe
Resource
win10v200722
Behavioral task
behavioral171
Sample
foo/e03bd458de4a107688236bdc4ddc3afe.exe
Resource
win7
Behavioral task
behavioral172
Sample
foo/e03bd458de4a107688236bdc4ddc3afe.exe
Resource
win10v200722
Behavioral task
behavioral173
Sample
foo/e16ec7bc29b68f66e90fdbfefe1d3a2d.exe
Resource
win7
Behavioral task
behavioral174
Sample
foo/e16ec7bc29b68f66e90fdbfefe1d3a2d.exe
Resource
win10
Behavioral task
behavioral175
Sample
foo/e61c0e180c2616fa81e6c4d581a9520e.exe
Resource
win7v200722
Behavioral task
behavioral176
Sample
foo/e61c0e180c2616fa81e6c4d581a9520e.exe
Resource
win10v200722
Behavioral task
behavioral177
Sample
foo/e78fad8a5d0ea89127ed36ed20bc9351.exe
Resource
win7
Behavioral task
behavioral178
Sample
foo/e78fad8a5d0ea89127ed36ed20bc9351.exe
Resource
win10
Behavioral task
behavioral179
Sample
foo/e7ad45164be5c3c7f9936e9b5fb28788.exe
Resource
win7
Behavioral task
behavioral180
Sample
foo/e7ad45164be5c3c7f9936e9b5fb28788.exe
Resource
win10
Behavioral task
behavioral181
Sample
foo/e95678212c7218c6e7944fca1631c88f.exe
Resource
win7
Behavioral task
behavioral182
Sample
foo/e95678212c7218c6e7944fca1631c88f.exe
Resource
win10v200722
Behavioral task
behavioral183
Sample
foo/edf723c8e404cd67041e7dfbbb1a6eee.dll
Resource
win7
Behavioral task
behavioral184
Sample
foo/edf723c8e404cd67041e7dfbbb1a6eee.dll
Resource
win10
Behavioral task
behavioral185
Sample
foo/f2366f48d3534bc8af573f2696dce4f5.exe
Resource
win7v200722
Behavioral task
behavioral186
Sample
foo/f2366f48d3534bc8af573f2696dce4f5.exe
Resource
win10
Behavioral task
behavioral187
Sample
foo/f645a94491240317caccd6f8508fba1f.exe
Resource
win7v200722
Behavioral task
behavioral188
Sample
foo/f645a94491240317caccd6f8508fba1f.exe
Resource
win10
Behavioral task
behavioral189
Sample
foo/f65e75d9675a50f9b4807e79dcc48d56.exe
Resource
win7v200722
Behavioral task
behavioral190
Sample
foo/f65e75d9675a50f9b4807e79dcc48d56.exe
Resource
win10
Behavioral task
behavioral191
Sample
foo/f660284cb3574213a512e3f03ca9012b.exe
Resource
win7
Behavioral task
behavioral192
Sample
foo/f660284cb3574213a512e3f03ca9012b.exe
Resource
win10
Behavioral task
behavioral193
Sample
foo/f6c1c72f3e45d2f3499b6bd6661b3289.exe
Resource
win7
Behavioral task
behavioral194
Sample
foo/f6c1c72f3e45d2f3499b6bd6661b3289.exe
Resource
win10
Behavioral task
behavioral195
Sample
foo/fbab903080d6a4e65a1a2f6bc4d97b7c.exe
Resource
win7
Behavioral task
behavioral196
Sample
foo/fbab903080d6a4e65a1a2f6bc4d97b7c.exe
Resource
win10
Behavioral task
behavioral197
Sample
foo/fcdc003a1529fe3660b160fd012173b3.exe
Resource
win7v200722
Behavioral task
behavioral198
Sample
foo/fcdc003a1529fe3660b160fd012173b3.exe
Resource
win10
Behavioral task
behavioral199
Sample
foo/fffb61eaaac6e8a40bfaa7a4acb6b9ba.exe
Resource
win7
Behavioral task
behavioral200
Sample
foo/fffb61eaaac6e8a40bfaa7a4acb6b9ba.exe
Resource
win10v200722
General
-
Target
foo/383497fda5ca670a06dc688443c2011b.exe
Malware Config
Signatures
-
Matrix Ransomware 5 IoCs
Targeted ransomware with information collection and encryption functionality.
Processes:
description flow ioc HTTP URL 2 http://murikos.in/add.php?apikey=BKTqstat&compuser=AVGLFESB|Admin&sid=9Jpdm4jlfeZbbhrn&phase=START HTTP URL 3 http://murikos.in/add.php?apikey=BKTqstat&compuser=AVGLFESB|Admin&sid=IZb9Dgph9anMZt9W&phase=START HTTP URL 4 http://murikos.in/add.php?apikey=BKTqstat&compuser=AVGLFESB|Admin&sid=9Jpdm4jlfeZbbhrn&phase=L_05D38E07E3C44508_7593_1GB HTTP URL 5 http://murikos.in/add.php?apikey=BKTqstat&compuser=AVGLFESB|Admin&sid=9Jpdm4jlfeZbbhrn&phase=L_DONE_10 HTTP URL 6 http://murikos.in/add.php?apikey=BKTqstat&compuser=AVGLFESB|Admin&sid=9Jpdm4jlfeZbbhrn&phase=L_DONE_100 -
Executes dropped EXE 1 IoCs
Processes:
n383497fda5ca670a06dc688443c2011b.exepid process 1404 n383497fda5ca670a06dc688443c2011b.exe -
Loads dropped DLL 2 IoCs
Processes:
383497fda5ca670a06dc688443c2011b.exepid process 316 383497fda5ca670a06dc688443c2011b.exe 316 383497fda5ca670a06dc688443c2011b.exe -
Modifies file permissions 1 TTPs 64 IoCs
Processes:
takeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exepid process 1444 1476 1648 1100 takeown.exe 1112 takeown.exe 668 takeown.exe 1948 takeown.exe 676 1900 takeown.exe 1320 1924 1988 1700 takeown.exe 760 takeown.exe 1888 1136 1792 1472 1192 816 1176 1412 2000 takeown.exe 1684 takeown.exe 240 takeown.exe 1700 1920 332 1792 1668 takeown.exe 1176 836 takeown.exe 668 1984 744 1632 takeown.exe 836 takeown.exe 1136 556 268 1504 takeown.exe 1220 takeown.exe 1920 takeown.exe 1544 1948 1816 takeown.exe 2036 1044 1552 1068 takeown.exe 1388 takeown.exe 888 takeown.exe 1556 1852 1056 1988 1452 1400 takeown.exe 1608 takeown.exe 1788 takeown.exe 1552 takeown.exe 1628 1484 592 -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\README = "\"C:\\Program Files (x86)\\Windows NT\\Accessories\\wordpad.exe\" \"C:\\Users\\Admin\\AppData\\Roaming\\#What_Wrong_With_Files#.rtf\"" reg.exe -
Drops desktop.ini file(s) 3 IoCs
Processes:
383497fda5ca670a06dc688443c2011b.exedescription ioc process File opened for modification C:\$Recycle.Bin\S-1-5-21-1131729243-447456001-3632642222-1000\desktop.ini 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\desktop.ini 383497fda5ca670a06dc688443c2011b.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
383497fda5ca670a06dc688443c2011b.exedescription ioc process File opened (read-only) \??\Z: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\Y: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\U: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\K: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\H: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\V: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\R: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\M: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\G: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\F: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\T: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\Q: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\O: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\N: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\L: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\J: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\X: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\W: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\S: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\P: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\I: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\E: 383497fda5ca670a06dc688443c2011b.exe -
Drops file in Program Files directory 64 IoCs
Processes:
383497fda5ca670a06dc688443c2011b.exeattrib.exeattrib.exeattrib.exeattrib.exedescription ioc process File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\THIRDPARTYLICENSEREADME-JAVAFX.txt 383497fda5ca670a06dc688443c2011b.exe File created C:\Program Files\VideoLAN\VLC\#What_Wrong_With_Files#.rtf 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\7-Zip\7-zip.chm 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\THEMES14\PIXEL\PIXEL.ELM 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\Welcome.html 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Postage_VideoInset.png File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\NavigationLeft_SelectionSubpicture.png 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad.xml 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\tipresx.dll.mui attrib.exe File opened for modification C:\Program Files\Common Files\System\msadc\en-US\msadcer.dll.mui attrib.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\nav_uparrow.png attrib.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Perf_Scenes_Mask1.png 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_btn-previous-static.png File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\feature.xml 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\fonts\LucidaSansRegular.ttf 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\J0382968.JPG 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Microsoft Office\Stationery\1033\SEAMARBL.JPG 383497fda5ca670a06dc688443c2011b.exe File created C:\Program Files\Common Files\Microsoft Shared\TRANSLAT\ENFR\#What_Wrong_With_Files#.rtf 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToScenesBackground.wmv 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_btn-next-over-select.png File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\messages.properties 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web.xml 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\VSTOInstaller.config 383497fda5ca670a06dc688443c2011b.exe File created C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\#What_Wrong_With_Files#.rtf 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\performance.png 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\vistabg.png File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\NavigationRight_ButtonGraphic.png 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\White_Chocolate.jpg attrib.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\Dataset.zip 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\en-US\sqlxmlx.rll.mui 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\desktop.ini 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\notes-static.png 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\SpecialNavigationRight_ButtonGraphic.png File opened for modification C:\Program Files\Microsoft Office\Office14\Groove\Certificates\Verisign\Components\VS_ComponentSigningIntermediate.cer 383497fda5ca670a06dc688443c2011b.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\#What_Wrong_With_Files#.rtf 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\J0099147.JPG 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\PH03425I.JPG 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VBA\VBA7\1033\VBOB6.CHM 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\feature.xml 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\J0382947.JPG 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_trans_RGB_PAL.wmv 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\NavigationRight_ButtonGraphic.png 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\psfontj2d.properties 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\about.html 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derby.jar 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\win32\bridge\AccessBridgeCallbacks.h 383497fda5ca670a06dc688443c2011b.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\#What_Wrong_With_Files#.rtf 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Microsoft Office\CLIPART\PUB60COR\PH02069J.JPG 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsdeu.xml 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\tipresx.dll.mui 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\PowerPoint.en-us\SETUP.XML 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\ParentMenuButtonIcon.png File opened for modification C:\Program Files\Microsoft Office\Office14\Groove\ToolBMPs\NotifierDownArrow.jpg 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Microsoft Office\Office14\Groove\ToolBMPs\VeriSignLogo.jpg 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\blackbars60.png File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\server\classes.jsa 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\THEMES14\ICE\PREVIEW.GIF 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TRANSLAT\FREN\MSB1FREN.ITS 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_Buttongraphic.png 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\feature.properties 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\feature.properties 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\7-Zip\Lang\pt.txt 383497fda5ca670a06dc688443c2011b.exe File created C:\Program Files\Java\jdk1.7.0_80\#What_Wrong_With_Files#.rtf 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Stars.jpg 383497fda5ca670a06dc688443c2011b.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
takeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exedescription pid process Token: SeTakeOwnershipPrivilege 1968 takeown.exe Token: SeTakeOwnershipPrivilege 472 takeown.exe Token: SeTakeOwnershipPrivilege 1100 takeown.exe Token: SeTakeOwnershipPrivilege 1592 takeown.exe Token: SeTakeOwnershipPrivilege 1068 takeown.exe Token: SeTakeOwnershipPrivilege 1848 takeown.exe Token: SeTakeOwnershipPrivilege 1780 takeown.exe Token: SeTakeOwnershipPrivilege 1644 takeown.exe Token: SeTakeOwnershipPrivilege 1980 takeown.exe Token: SeTakeOwnershipPrivilege 1228 takeown.exe Token: SeTakeOwnershipPrivilege 1572 takeown.exe Token: SeTakeOwnershipPrivilege 1400 takeown.exe Token: SeTakeOwnershipPrivilege 1056 takeown.exe Token: SeTakeOwnershipPrivilege 1820 takeown.exe Token: SeTakeOwnershipPrivilege 1792 takeown.exe Token: SeTakeOwnershipPrivilege 1404 takeown.exe Token: SeTakeOwnershipPrivilege 1444 takeown.exe Token: SeTakeOwnershipPrivilege 1648 takeown.exe Token: SeTakeOwnershipPrivilege 2036 takeown.exe Token: SeTakeOwnershipPrivilege 752 takeown.exe Token: SeTakeOwnershipPrivilege 1064 takeown.exe Token: SeTakeOwnershipPrivilege 1512 takeown.exe Token: SeTakeOwnershipPrivilege 1816 takeown.exe Token: SeTakeOwnershipPrivilege 1788 takeown.exe Token: SeTakeOwnershipPrivilege 1692 takeown.exe Token: SeTakeOwnershipPrivilege 1908 takeown.exe Token: SeTakeOwnershipPrivilege 904 takeown.exe Token: SeTakeOwnershipPrivilege 1036 takeown.exe Token: SeTakeOwnershipPrivilege 1940 takeown.exe Token: SeTakeOwnershipPrivilege 1496 takeown.exe Token: SeTakeOwnershipPrivilege 240 takeown.exe Token: SeTakeOwnershipPrivilege 1088 takeown.exe Token: SeTakeOwnershipPrivilege 1796 takeown.exe Token: SeTakeOwnershipPrivilege 1896 takeown.exe Token: SeTakeOwnershipPrivilege 1544 takeown.exe Token: SeTakeOwnershipPrivilege 1968 takeown.exe Token: SeTakeOwnershipPrivilege 1104 takeown.exe Token: SeTakeOwnershipPrivilege 1912 takeown.exe Token: SeTakeOwnershipPrivilege 1388 takeown.exe Token: SeTakeOwnershipPrivilege 1068 takeown.exe Token: SeTakeOwnershipPrivilege 1492 takeown.exe Token: SeTakeOwnershipPrivilege 1840 takeown.exe Token: SeTakeOwnershipPrivilege 1876 takeown.exe Token: SeTakeOwnershipPrivilege 812 takeown.exe Token: SeTakeOwnershipPrivilege 1956 takeown.exe Token: SeTakeOwnershipPrivilege 1916 takeown.exe Token: SeTakeOwnershipPrivilege 1100 takeown.exe Token: SeTakeOwnershipPrivilege 1488 takeown.exe Token: SeTakeOwnershipPrivilege 816 takeown.exe Token: SeTakeOwnershipPrivilege 1812 takeown.exe Token: SeTakeOwnershipPrivilege 1868 takeown.exe Token: SeTakeOwnershipPrivilege 1680 takeown.exe Token: SeTakeOwnershipPrivilege 1504 takeown.exe Token: SeTakeOwnershipPrivilege 760 takeown.exe Token: SeTakeOwnershipPrivilege 1112 takeown.exe Token: SeTakeOwnershipPrivilege 1948 takeown.exe Token: SeTakeOwnershipPrivilege 1412 takeown.exe Token: SeTakeOwnershipPrivilege 1700 takeown.exe Token: SeTakeOwnershipPrivilege 1836 takeown.exe Token: SeTakeOwnershipPrivilege 1632 takeown.exe Token: SeTakeOwnershipPrivilege 1972 takeown.exe Token: SeTakeOwnershipPrivilege 844 takeown.exe Token: SeTakeOwnershipPrivilege 888 takeown.exe Token: SeTakeOwnershipPrivilege 1400 takeown.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
383497fda5ca670a06dc688443c2011b.execmd.execmd.execmd.execmd.exedescription pid process target process PID 316 wrote to memory of 1404 316 383497fda5ca670a06dc688443c2011b.exe n383497fda5ca670a06dc688443c2011b.exe PID 316 wrote to memory of 1404 316 383497fda5ca670a06dc688443c2011b.exe n383497fda5ca670a06dc688443c2011b.exe PID 316 wrote to memory of 1404 316 383497fda5ca670a06dc688443c2011b.exe n383497fda5ca670a06dc688443c2011b.exe PID 316 wrote to memory of 1404 316 383497fda5ca670a06dc688443c2011b.exe n383497fda5ca670a06dc688443c2011b.exe PID 316 wrote to memory of 1608 316 383497fda5ca670a06dc688443c2011b.exe cmd.exe PID 316 wrote to memory of 1608 316 383497fda5ca670a06dc688443c2011b.exe cmd.exe PID 316 wrote to memory of 1608 316 383497fda5ca670a06dc688443c2011b.exe cmd.exe PID 316 wrote to memory of 1608 316 383497fda5ca670a06dc688443c2011b.exe cmd.exe PID 1608 wrote to memory of 1632 1608 cmd.exe reg.exe PID 1608 wrote to memory of 1632 1608 cmd.exe reg.exe PID 1608 wrote to memory of 1632 1608 cmd.exe reg.exe PID 1608 wrote to memory of 1632 1608 cmd.exe reg.exe PID 316 wrote to memory of 1900 316 383497fda5ca670a06dc688443c2011b.exe cmd.exe PID 316 wrote to memory of 1900 316 383497fda5ca670a06dc688443c2011b.exe cmd.exe PID 316 wrote to memory of 1900 316 383497fda5ca670a06dc688443c2011b.exe cmd.exe PID 316 wrote to memory of 1900 316 383497fda5ca670a06dc688443c2011b.exe cmd.exe PID 1900 wrote to memory of 2000 1900 cmd.exe attrib.exe PID 1900 wrote to memory of 2000 1900 cmd.exe attrib.exe PID 1900 wrote to memory of 2000 1900 cmd.exe attrib.exe PID 1900 wrote to memory of 2000 1900 cmd.exe attrib.exe PID 1900 wrote to memory of 1992 1900 cmd.exe cacls.exe PID 1900 wrote to memory of 1992 1900 cmd.exe cacls.exe PID 1900 wrote to memory of 1992 1900 cmd.exe cacls.exe PID 1900 wrote to memory of 1992 1900 cmd.exe cacls.exe PID 1900 wrote to memory of 1968 1900 cmd.exe takeown.exe PID 1900 wrote to memory of 1968 1900 cmd.exe takeown.exe PID 1900 wrote to memory of 1968 1900 cmd.exe takeown.exe PID 1900 wrote to memory of 1968 1900 cmd.exe takeown.exe PID 316 wrote to memory of 2040 316 383497fda5ca670a06dc688443c2011b.exe cmd.exe PID 316 wrote to memory of 2040 316 383497fda5ca670a06dc688443c2011b.exe cmd.exe PID 316 wrote to memory of 2040 316 383497fda5ca670a06dc688443c2011b.exe cmd.exe PID 316 wrote to memory of 2040 316 383497fda5ca670a06dc688443c2011b.exe cmd.exe PID 2040 wrote to memory of 884 2040 cmd.exe attrib.exe PID 2040 wrote to memory of 884 2040 cmd.exe attrib.exe PID 2040 wrote to memory of 884 2040 cmd.exe attrib.exe PID 2040 wrote to memory of 884 2040 cmd.exe attrib.exe PID 2040 wrote to memory of 524 2040 cmd.exe cacls.exe PID 2040 wrote to memory of 524 2040 cmd.exe cacls.exe PID 2040 wrote to memory of 524 2040 cmd.exe cacls.exe PID 2040 wrote to memory of 524 2040 cmd.exe cacls.exe PID 2040 wrote to memory of 472 2040 cmd.exe takeown.exe PID 2040 wrote to memory of 472 2040 cmd.exe takeown.exe PID 2040 wrote to memory of 472 2040 cmd.exe takeown.exe PID 2040 wrote to memory of 472 2040 cmd.exe takeown.exe PID 316 wrote to memory of 556 316 383497fda5ca670a06dc688443c2011b.exe cmd.exe PID 316 wrote to memory of 556 316 383497fda5ca670a06dc688443c2011b.exe cmd.exe PID 316 wrote to memory of 556 316 383497fda5ca670a06dc688443c2011b.exe cmd.exe PID 316 wrote to memory of 556 316 383497fda5ca670a06dc688443c2011b.exe cmd.exe PID 556 wrote to memory of 1584 556 cmd.exe attrib.exe PID 556 wrote to memory of 1584 556 cmd.exe attrib.exe PID 556 wrote to memory of 1584 556 cmd.exe attrib.exe PID 556 wrote to memory of 1584 556 cmd.exe attrib.exe PID 556 wrote to memory of 1576 556 cmd.exe cacls.exe PID 556 wrote to memory of 1576 556 cmd.exe cacls.exe PID 556 wrote to memory of 1576 556 cmd.exe cacls.exe PID 556 wrote to memory of 1576 556 cmd.exe cacls.exe PID 556 wrote to memory of 1100 556 cmd.exe takeown.exe PID 556 wrote to memory of 1100 556 cmd.exe takeown.exe PID 556 wrote to memory of 1100 556 cmd.exe takeown.exe PID 556 wrote to memory of 1100 556 cmd.exe takeown.exe PID 316 wrote to memory of 1048 316 383497fda5ca670a06dc688443c2011b.exe cmd.exe PID 316 wrote to memory of 1048 316 383497fda5ca670a06dc688443c2011b.exe cmd.exe PID 316 wrote to memory of 1048 316 383497fda5ca670a06dc688443c2011b.exe cmd.exe PID 316 wrote to memory of 1048 316 383497fda5ca670a06dc688443c2011b.exe cmd.exe -
Views/modifies file attributes 1 TTPs 64 IoCs
Processes:
attrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exepid process 240 1908 attrib.exe 112 attrib.exe 760 attrib.exe 1468 1848 attrib.exe 536 attrib.exe 1848 612 1624 attrib.exe 752 attrib.exe 1276 attrib.exe 1512 attrib.exe 1048 attrib.exe 2008 2040 1452 1460 attrib.exe 1904 attrib.exe 1040 attrib.exe 816 attrib.exe 928 1324 1768 2016 1828 1768 attrib.exe 1048 attrib.exe 568 attrib.exe 1668 attrib.exe 1464 attrib.exe 1444 1976 1824 attrib.exe 1488 attrib.exe 1644 attrib.exe 1896 attrib.exe 1336 attrib.exe 1488 1680 attrib.exe 1872 attrib.exe 912 attrib.exe 1848 attrib.exe 1748 attrib.exe 748 attrib.exe 816 556 968 1332 attrib.exe 1860 attrib.exe 1944 attrib.exe 1484 960 1692 attrib.exe 676 attrib.exe 836 attrib.exe 1176 672 1572 1056 1996 748 1788 1636
Processes
-
C:\Users\Admin\AppData\Local\Temp\foo\383497fda5ca670a06dc688443c2011b.exe"C:\Users\Admin\AppData\Local\Temp\foo\383497fda5ca670a06dc688443c2011b.exe"1⤵
- Loads dropped DLL
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\foo\n383497fda5ca670a06dc688443c2011b.exe"C:\Users\Admin\AppData\Local\Temp\foo\n383497fda5ca670a06dc688443c2011b.exe" -n2⤵
- Executes dropped EXE
PID:1404
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v README /t REG_SZ /d "\"%ProgramFiles%\Windows NT\Accessories\wordpad.exe\" \"C:\Users\Admin\AppData\Roaming\#What_Wrong_With_Files#.rtf"" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v README /t REG_SZ /d "\"C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe\" \"C:\Users\Admin\AppData\Roaming\#What_Wrong_With_Files#.rtf"" /f3⤵
- Adds Run key to start application
PID:1632
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\Bears.jpg""2⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\Bears.jpg"3⤵PID:2000
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\Bears.jpg" /E /G Admin:F /C3⤵PID:1992
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\Bears.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1968
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\Blue_Gradient.jpg""2⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\Blue_Gradient.jpg"3⤵PID:884
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\Blue_Gradient.jpg" /E /G Admin:F /C3⤵PID:524
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\Blue_Gradient.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:472
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\Garden.jpg""2⤵
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\Garden.jpg"3⤵PID:1584
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\Garden.jpg" /E /G Admin:F /C3⤵PID:1576
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\Garden.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1100
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\GreenBubbles.jpg""2⤵PID:1048
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\GreenBubbles.jpg"3⤵PID:1388
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\GreenBubbles.jpg" /E /G Admin:F /C3⤵PID:1536
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\GreenBubbles.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1592
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\HandPrints.jpg""2⤵PID:1516
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\HandPrints.jpg"3⤵PID:1060
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\HandPrints.jpg" /E /G Admin:F /C3⤵PID:1512
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\HandPrints.jpg"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1068
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\Monet.jpg""2⤵PID:1700
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\Monet.jpg"3⤵PID:1804
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\Monet.jpg" /E /G Admin:F /C3⤵PID:1816
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\Monet.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1848
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\Notebook.jpg""2⤵PID:1856
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\Notebook.jpg"3⤵PID:1220
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\Notebook.jpg" /E /G Admin:F /C3⤵PID:1788
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\Notebook.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1780
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\OrangeCircles.jpg""2⤵PID:1892
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\OrangeCircles.jpg"3⤵PID:112
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\OrangeCircles.jpg" /E /G Admin:F /C3⤵PID:1692
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\OrangeCircles.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1644
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\Peacock.jpg""2⤵PID:1660
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\Peacock.jpg"3⤵PID:1944
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\Peacock.jpg" /E /G Admin:F /C3⤵PID:1908
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\Peacock.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1980
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\Pine_Lumber.jpg""2⤵PID:1996
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\Pine_Lumber.jpg"3⤵PID:1916
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\Pine_Lumber.jpg" /E /G Admin:F /C3⤵PID:1976
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\Pine_Lumber.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1228
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\Pretty_Peacock.jpg""2⤵PID:656
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\Pretty_Peacock.jpg"3⤵PID:2028
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\Pretty_Peacock.jpg" /E /G Admin:F /C3⤵PID:612
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\Pretty_Peacock.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1572
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\Psychedelic.jpg""2⤵PID:1324
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\Psychedelic.jpg"3⤵PID:836
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\Psychedelic.jpg" /E /G Admin:F /C3⤵PID:1232
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\Psychedelic.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1400
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\Roses.jpg""2⤵PID:1488
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\Roses.jpg"3⤵
- Views/modifies file attributes
PID:1460
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\Roses.jpg" /E /G Admin:F /C3⤵PID:1464
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\Roses.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1056
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\Sand_Paper.jpg""2⤵PID:1040
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\Sand_Paper.jpg"3⤵PID:816
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\Sand_Paper.jpg" /E /G Admin:F /C3⤵PID:388
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\Sand_Paper.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1820
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\ShadesOfBlue.jpg""2⤵PID:1828
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\ShadesOfBlue.jpg"3⤵PID:1812
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\ShadesOfBlue.jpg" /E /G Admin:F /C3⤵PID:1808
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\ShadesOfBlue.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1792
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\Small_News.jpg""2⤵PID:1776
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\Small_News.jpg"3⤵
- Views/modifies file attributes
PID:1332
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\Small_News.jpg" /E /G Admin:F /C3⤵PID:1336
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\Small_News.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1404
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\SoftBlue.jpg""2⤵PID:1564
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\SoftBlue.jpg"3⤵PID:1636
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\SoftBlue.jpg" /E /G Admin:F /C3⤵PID:1896
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\SoftBlue.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1444
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\Stars.jpg""2⤵PID:1988
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\Stars.jpg"3⤵PID:2000
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\Stars.jpg" /E /G Admin:F /C3⤵PID:1544
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\Stars.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1648
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\Tanspecks.jpg""2⤵PID:1900
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\Tanspecks.jpg"3⤵PID:332
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\Tanspecks.jpg" /E /G Admin:F /C3⤵PID:1968
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\Tanspecks.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\White_Chocolate.jpg""2⤵PID:2040
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\White_Chocolate.jpg"3⤵
- Drops file in Program Files directory
PID:1112
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\White_Chocolate.jpg" /E /G Admin:F /C3⤵PID:1104
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\White_Chocolate.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:752
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Bears.jpg""2⤵PID:836
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Bears.jpg"3⤵PID:1452
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Bears.jpg" /E /G Admin:F /C3⤵PID:1496
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Bears.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Garden.jpg""2⤵PID:1460
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Garden.jpg"3⤵PID:748
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Garden.jpg" /E /G Admin:F /C3⤵PID:1536
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Garden.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\GreenBubbles.jpg""2⤵PID:816
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\GreenBubbles.jpg"3⤵
- Views/modifies file attributes
PID:1824
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\GreenBubbles.jpg" /E /G Admin:F /C3⤵PID:1472
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\GreenBubbles.jpg"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1816
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\HandPrints.jpg""2⤵PID:1812
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\HandPrints.jpg"3⤵PID:1216
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\HandPrints.jpg" /E /G Admin:F /C3⤵PID:1836
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\HandPrints.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1788
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\OrangeCircles.jpg""2⤵PID:1332
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\OrangeCircles.jpg"3⤵PID:1480
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\OrangeCircles.jpg" /E /G Admin:F /C3⤵PID:1876
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\OrangeCircles.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1692
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Peacock.jpg""2⤵PID:1636
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Peacock.jpg"3⤵
- Views/modifies file attributes
PID:1904
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Peacock.jpg" /E /G Admin:F /C3⤵PID:812
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Peacock.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1908
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Roses.jpg""2⤵PID:2000
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Roses.jpg"3⤵PID:2004
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Roses.jpg" /E /G Admin:F /C3⤵PID:1956
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Roses.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:904
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\ShadesOfBlue.jpg""2⤵PID:332
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\ShadesOfBlue.jpg"3⤵PID:844
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\ShadesOfBlue.jpg" /E /G Admin:F /C3⤵PID:1916
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\ShadesOfBlue.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1036
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\SoftBlue.jpg""2⤵PID:1112
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\SoftBlue.jpg"3⤵PID:620
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\SoftBlue.jpg" /E /G Admin:F /C3⤵PID:2028
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\SoftBlue.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1940
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Stars.jpg""2⤵PID:1948
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Stars.jpg"3⤵PID:1232
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Stars.jpg" /E /G Admin:F /C3⤵PID:1452
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Stars.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\Alphabet.xml""2⤵PID:1064
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\Alphabet.xml"3⤵PID:1464
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\Alphabet.xml" /E /G Admin:F /C3⤵PID:788
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\Alphabet.xml"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:240
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\tipresx.dll.mui""2⤵PID:1820
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\tipresx.dll.mui"3⤵PID:1708
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:1832
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\tipresx.dll.mui"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1088
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\tipresx.dll.mui""2⤵PID:1792
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\tipresx.dll.mui"3⤵PID:1852
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:1872
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\tipresx.dll.mui"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1796
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\Content.xml""2⤵PID:1780
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\Content.xml"3⤵
- Views/modifies file attributes
PID:1692
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\Content.xml" /E /G Admin:F /C3⤵PID:1332
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\Content.xml"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1896
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\tipresx.dll.mui""2⤵PID:1508
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\tipresx.dll.mui"3⤵
- Views/modifies file attributes
PID:1908
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:1636
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\tipresx.dll.mui"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1544
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\tipresx.dll.mui""2⤵PID:1984
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\tipresx.dll.mui"3⤵PID:904
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:2000
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\tipresx.dll.mui"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1968
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\tipresx.dll.mui""2⤵PID:1976
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\tipresx.dll.mui"3⤵PID:1036
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:332
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\tipresx.dll.mui"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1104
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\tipresx.dll.mui""2⤵PID:612
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\tipresx.dll.mui"3⤵PID:1940
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:1112
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\tipresx.dll.mui"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1912
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-correct.avi""2⤵PID:1324
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-correct.avi"3⤵PID:1496
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-correct.avi" /E /G Admin:F /C3⤵PID:1948
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-correct.avi"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1388
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-delete.avi""2⤵PID:1536
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-delete.avi"3⤵
- Views/modifies file attributes
PID:676
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-delete.avi" /E /G Admin:F /C3⤵PID:1412
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-delete.avi"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1068
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-join.avi""2⤵PID:1860
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-join.avi"3⤵PID:1848
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-join.avi" /E /G Admin:F /C3⤵PID:1700
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-join.avi"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-split.avi""2⤵PID:1768
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-split.avi"3⤵PID:300
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-split.avi" /E /G Admin:F /C3⤵PID:1836
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-split.avi"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1840
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\correct.avi""2⤵PID:1432
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\correct.avi"3⤵PID:1904
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\correct.avi" /E /G Admin:F /C3⤵PID:1632
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\correct.avi"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1876
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\delete.avi""2⤵PID:2016
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\delete.avi"3⤵
- Views/modifies file attributes
PID:1624
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\delete.avi" /E /G Admin:F /C3⤵PID:1972
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\delete.avi"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:812
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\FlickLearningWizard.exe.mui""2⤵PID:1964
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\FlickLearningWizard.exe.mui"3⤵PID:844
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\FlickLearningWizard.exe.mui" /E /G Admin:F /C3⤵PID:1276
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\FlickLearningWizard.exe.mui"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\InkObj.dll.mui""2⤵PID:1124
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\InkObj.dll.mui"3⤵PID:888
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\InkObj.dll.mui" /E /G Admin:F /C3⤵PID:1584
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\InkObj.dll.mui"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1916
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\InkWatson.exe.mui""2⤵PID:1940
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\InkWatson.exe.mui"3⤵PID:1400
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\InkWatson.exe.mui" /E /G Admin:F /C3⤵PID:568
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\InkWatson.exe.mui"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1100
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\InputPersonalization.exe.mui""2⤵PID:1496
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\InputPersonalization.exe.mui"3⤵PID:1056
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\InputPersonalization.exe.mui" /E /G Admin:F /C3⤵PID:1556
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\InputPersonalization.exe.mui"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1488
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\IPSEventLogMsg.dll.mui""2⤵PID:676
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\IPSEventLogMsg.dll.mui"3⤵
- Views/modifies file attributes
PID:1040
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\IPSEventLogMsg.dll.mui" /E /G Admin:F /C3⤵PID:368
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\IPSEventLogMsg.dll.mui"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:816
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\IpsMigrationPlugin.dll.mui""2⤵PID:1848
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\IpsMigrationPlugin.dll.mui"3⤵PID:1788
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\IpsMigrationPlugin.dll.mui" /E /G Admin:F /C3⤵PID:1708
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\IpsMigrationPlugin.dll.mui"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1812
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\join.avi""2⤵PID:300
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\join.avi"3⤵PID:1776
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\join.avi" /E /G Admin:F /C3⤵PID:1852
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\join.avi"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1868
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\micaut.dll.mui""2⤵PID:1904
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\micaut.dll.mui"3⤵PID:1608
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\micaut.dll.mui" /E /G Admin:F /C3⤵PID:1692
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\micaut.dll.mui"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\mip.exe.mui""2⤵PID:1624
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\mip.exe.mui"3⤵PID:1988
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\mip.exe.mui" /E /G Admin:F /C3⤵PID:1908
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\mip.exe.mui"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1504
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\mshwLatin.dll.mui""2⤵PID:1984
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\mshwLatin.dll.mui"3⤵PID:1956
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\mshwLatin.dll.mui" /E /G Admin:F /C3⤵PID:1964
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\mshwLatin.dll.mui"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:760
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\rtscom.dll.mui""2⤵PID:1976
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\rtscom.dll.mui"3⤵PID:1916
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\rtscom.dll.mui" /E /G Admin:F /C3⤵PID:1124
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\rtscom.dll.mui"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1112
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\ShapeCollector.exe.mui""2⤵PID:1952
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\ShapeCollector.exe.mui"3⤵PID:1100
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\ShapeCollector.exe.mui" /E /G Admin:F /C3⤵PID:1940
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\ShapeCollector.exe.mui"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\split.avi""2⤵PID:1520
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\split.avi"3⤵
- Views/modifies file attributes
PID:1488
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\split.avi" /E /G Admin:F /C3⤵PID:1496
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\split.avi"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1412
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\tabskb.dll.mui""2⤵PID:388
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\tabskb.dll.mui"3⤵
- Views/modifies file attributes
PID:816
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\tabskb.dll.mui" /E /G Admin:F /C3⤵PID:676
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\tabskb.dll.mui"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\TipBand.dll.mui""2⤵PID:1832
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\TipBand.dll.mui"3⤵PID:1812
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\TipBand.dll.mui" /E /G Admin:F /C3⤵PID:1848
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\TipBand.dll.mui"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1836
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\TipRes.dll.mui""2⤵PID:1652
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\TipRes.dll.mui"3⤵PID:1868
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\TipRes.dll.mui" /E /G Admin:F /C3⤵PID:300
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\TipRes.dll.mui"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\tipresx.dll.mui""2⤵PID:1444
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\tipresx.dll.mui"3⤵
- Views/modifies file attributes
PID:1680
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:1904
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\tipresx.dll.mui"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\TipTsf.dll.mui""2⤵PID:1648
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\TipTsf.dll.mui"3⤵PID:1504
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\TipTsf.dll.mui" /E /G Admin:F /C3⤵PID:1624
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\en-US\TipTsf.dll.mui"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:844
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\tipresx.dll.mui""2⤵PID:1044
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\tipresx.dll.mui"3⤵PID:2000
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:1992
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\tipresx.dll.mui"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:888
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\tipresx.dll.mui""2⤵PID:884
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\tipresx.dll.mui"3⤵PID:752
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:1108
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\tipresx.dll.mui"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1400
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\tipresx.dll.mui""2⤵PID:872
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\tipresx.dll.mui"3⤵PID:1576
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:1552
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\tipresx.dll.mui"3⤵PID:1056
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\FlickAnimation.avi""2⤵PID:2028
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\FlickAnimation.avi"3⤵PID:1464
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\FlickAnimation.avi" /E /G Admin:F /C3⤵PID:836
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\FlickAnimation.avi"3⤵PID:744
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\tipresx.dll.mui""2⤵PID:1324
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\tipresx.dll.mui"3⤵PID:1668
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:1816
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\tipresx.dll.mui"3⤵PID:1788
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\auxbase.xml""2⤵PID:1460
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\auxbase.xml"3⤵PID:1844
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\auxbase.xml" /E /G Admin:F /C3⤵PID:1856
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\auxbase.xml"3⤵PID:1872
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad.xml""2⤵PID:1772
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad.xml"3⤵
- Views/modifies file attributes
PID:1748
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad.xml" /E /G Admin:F /C3⤵PID:1752
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad.xml"3⤵
- Modifies file permissions
PID:1608
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\ea.xml""2⤵PID:1220
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\ea.xml"3⤵PID:1548
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\ea.xml" /E /G Admin:F /C3⤵PID:1564
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\ea.xml"3⤵PID:1988
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\keypadbase.xml""2⤵PID:1640
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\keypadbase.xml"3⤵PID:1228
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\keypadbase.xml" /E /G Admin:F /C3⤵PID:1060
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\keypadbase.xml"3⤵PID:1516
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\kor-kor.xml""2⤵PID:1612
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\kor-kor.xml"3⤵PID:1956
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\kor-kor.xml" /E /G Admin:F /C3⤵PID:620
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\kor-kor.xml"3⤵PID:1104
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad.xml""2⤵PID:1684
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad.xml"3⤵PID:1916
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad.xml" /E /G Admin:F /C3⤵PID:332
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad.xml"3⤵PID:1320
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base.xml""2⤵PID:1984
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base.xml"3⤵PID:1100
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base.xml" /E /G Admin:F /C3⤵PID:1388
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base.xml"3⤵PID:1048
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\baseAltGr_rtl.xml""2⤵PID:1976
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\baseAltGr_rtl.xml"3⤵PID:1488
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\baseAltGr_rtl.xml" /E /G Admin:F /C3⤵PID:1068
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\baseAltGr_rtl.xml"3⤵PID:240
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_altgr.xml""2⤵PID:1952
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_altgr.xml"3⤵PID:816
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_altgr.xml" /E /G Admin:F /C3⤵PID:1492
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_altgr.xml"3⤵PID:1864
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_ca.xml""2⤵PID:1520
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_ca.xml"3⤵PID:1812
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_ca.xml" /E /G Admin:F /C3⤵PID:1828
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_ca.xml"3⤵PID:1804
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_heb.xml""2⤵PID:388
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_heb.xml"3⤵PID:1868
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_heb.xml" /E /G Admin:F /C3⤵PID:1876
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_heb.xml"3⤵PID:112
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_jpn.xml""2⤵PID:1832
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_jpn.xml"3⤵PID:1680
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_jpn.xml" /E /G Admin:F /C3⤵PID:1980
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_jpn.xml"3⤵PID:2004
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_kor.xml""2⤵PID:1652
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_kor.xml"3⤵PID:1504
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_kor.xml" /E /G Admin:F /C3⤵PID:1468
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_kor.xml"3⤵PID:668
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_rtl.xml""2⤵PID:1444
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_rtl.xml"3⤵PID:2000
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_rtl.xml" /E /G Admin:F /C3⤵PID:760
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_rtl.xml"3⤵PID:904
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\ja-jp.xml""2⤵PID:1648
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\ja-jp.xml"3⤵
- Views/modifies file attributes
PID:752
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\ja-jp.xml" /E /G Admin:F /C3⤵PID:1112
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\ja-jp.xml"3⤵PID:1036
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\ko-kr.xml""2⤵PID:1044
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\ko-kr.xml"3⤵PID:1940
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\ko-kr.xml" /E /G Admin:F /C3⤵PID:1552
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\ko-kr.xml"3⤵PID:1056
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\zh-changjei.xml""2⤵PID:1920
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\zh-changjei.xml"3⤵PID:1496
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\zh-changjei.xml" /E /G Admin:F /C3⤵PID:836
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\zh-changjei.xml"3⤵PID:744
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\zh-dayi.xml""2⤵PID:1452
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\zh-dayi.xml"3⤵PID:676
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\zh-dayi.xml" /E /G Admin:F /C3⤵PID:1816
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\zh-dayi.xml"3⤵
- Modifies file permissions
PID:1788
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\zh-phonetic.xml""2⤵PID:1064
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\zh-phonetic.xml"3⤵PID:1848
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\zh-phonetic.xml" /E /G Admin:F /C3⤵PID:2024
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\zh-phonetic.xml"3⤵PID:1828
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main.xml""2⤵PID:1804
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main.xml"3⤵PID:1336
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main.xml" /E /G Admin:F /C3⤵PID:1868
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main.xml"3⤵PID:1876
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\numbase.xml""2⤵PID:112
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\numbase.xml"3⤵
- Views/modifies file attributes
PID:1644
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\numbase.xml" /E /G Admin:F /C3⤵PID:1680
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\numbase.xml"3⤵PID:1980
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers.xml""2⤵PID:2004
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers.xml"3⤵PID:1944
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers.xml" /E /G Admin:F /C3⤵PID:1504
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers.xml"3⤵PID:1468
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\oskmenubase.xml""2⤵PID:668
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\oskmenubase.xml"3⤵PID:2012
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\oskmenubase.xml" /E /G Admin:F /C3⤵PID:2000
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\oskmenubase.xml"3⤵
- Modifies file permissions
PID:760
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu.xml""2⤵PID:904
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu.xml"3⤵PID:1572
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu.xml" /E /G Admin:F /C3⤵PID:752
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu.xml"3⤵PID:1112
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\osknumpadbase.xml""2⤵PID:1036
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\osknumpadbase.xml"3⤵PID:1924
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\osknumpadbase.xml" /E /G Admin:F /C3⤵PID:1940
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\osknumpadbase.xml"3⤵
- Modifies file permissions
PID:1552
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad.xml""2⤵PID:1056
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad.xml"3⤵
- Views/modifies file attributes
PID:1276
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad.xml" /E /G Admin:F /C3⤵PID:1496
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad.xml"3⤵PID:836
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\oskpredbase.xml""2⤵PID:744
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\oskpredbase.xml"3⤵PID:1584
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\oskpredbase.xml" /E /G Admin:F /C3⤵PID:676
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\oskpredbase.xml"3⤵PID:1816
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred.xml""2⤵PID:1788
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred.xml"3⤵PID:568
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred.xml" /E /G Admin:F /C3⤵PID:1848
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred.xml"3⤵PID:2024
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\ea-sym.xml""2⤵PID:1828
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\ea-sym.xml"3⤵
- Views/modifies file attributes
PID:1860
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\ea-sym.xml" /E /G Admin:F /C3⤵PID:1336
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\ea-sym.xml"3⤵PID:1868
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\ja-jp-sym.xml""2⤵PID:1876
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\ja-jp-sym.xml"3⤵
- Views/modifies file attributes
PID:1768
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\ja-jp-sym.xml" /E /G Admin:F /C3⤵PID:1644
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\ja-jp-sym.xml"3⤵PID:1680
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\symbase.xml""2⤵PID:1980
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\symbase.xml"3⤵PID:1784
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\symbase.xml" /E /G Admin:F /C3⤵PID:1944
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\symbase.xml"3⤵
- Modifies file permissions
PID:1504
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols.xml""2⤵PID:1468
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols.xml"3⤵PID:2016
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols.xml" /E /G Admin:F /C3⤵PID:2012
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols.xml"3⤵
- Modifies file permissions
PID:2000
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\webbase.xml""2⤵PID:760
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\webbase.xml"3⤵PID:1360
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\webbase.xml" /E /G Admin:F /C3⤵PID:1572
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\webbase.xml"3⤵PID:752
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web.xml""2⤵PID:1112
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web.xml"3⤵PID:1900
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web.xml" /E /G Admin:F /C3⤵PID:1924
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web.xml"3⤵PID:1940
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\tipresx.dll.mui""2⤵PID:2020
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\tipresx.dll.mui"3⤵PID:1908
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:600
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\tipresx.dll.mui"3⤵PID:1068
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\tipresx.dll.mui""2⤵PID:240
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\tipresx.dll.mui"3⤵
- Drops file in Program Files directory
PID:748
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:592
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\tipresx.dll.mui"3⤵PID:1492
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\tipresx.dll.mui""2⤵PID:1864
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\tipresx.dll.mui"3⤵PID:612
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:788
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\tipresx.dll.mui"3⤵PID:1836
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\hwrcommonlm.dat""2⤵PID:1796
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\hwrcommonlm.dat"3⤵PID:1892
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\hwrcommonlm.dat" /E /G Admin:F /C3⤵PID:1556
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\hwrcommonlm.dat"3⤵PID:812
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\hwrenalm.dat""2⤵PID:1636
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\hwrenalm.dat"3⤵PID:1520
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\hwrenalm.dat" /E /G Admin:F /C3⤵PID:368
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\hwrenalm.dat"3⤵PID:844
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\hwrenclm.dat""2⤵PID:1516
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\hwrenclm.dat"3⤵PID:388
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\hwrenclm.dat" /E /G Admin:F /C3⤵PID:1544
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\hwrenclm.dat"3⤵PID:2036
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\hwrlatinlm.dat""2⤵PID:1996
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\hwrlatinlm.dat"3⤵PID:1220
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\hwrlatinlm.dat" /E /G Admin:F /C3⤵PID:1852
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\hwrlatinlm.dat"3⤵PID:1912
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\hwruklm.dat""2⤵PID:556
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\hwruklm.dat"3⤵PID:1640
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\hwruklm.dat" /E /G Admin:F /C3⤵PID:1692
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\hwruklm.dat"3⤵PID:1948
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\hwruksh.dat""2⤵PID:1192
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\hwruksh.dat"3⤵PID:1444
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\hwruksh.dat" /E /G Admin:F /C3⤵PID:472
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\hwruksh.dat"3⤵PID:1488
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\hwrusalm.dat""2⤵PID:1592
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\hwrusalm.dat"3⤵PID:1124
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\hwrusalm.dat" /E /G Admin:F /C3⤵PID:1984
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\hwrusalm.dat"3⤵PID:816
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\hwrusash.dat""2⤵PID:1472
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\hwrusash.dat"3⤵PID:2040
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\hwrusash.dat" /E /G Admin:F /C3⤵PID:1976
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\hwrusash.dat"3⤵PID:1812
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\ipscat.xml""2⤵PID:1840
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\ipscat.xml"3⤵PID:1960
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\ipscat.xml" /E /G Admin:F /C3⤵PID:1952
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\ipscat.xml"3⤵PID:1548
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\ipschs.xml""2⤵PID:1972
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\ipschs.xml"3⤵PID:1788
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\ipschs.xml" /E /G Admin:F /C3⤵PID:1460
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\ipschs.xml"3⤵PID:1228
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\ipscht.xml""2⤵PID:1660
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\ipscht.xml"3⤵PID:1876
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\ipscht.xml" /E /G Admin:F /C3⤵PID:1772
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\ipscht.xml"3⤵PID:1956
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\ipscsy.xml""2⤵PID:888
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\ipscsy.xml"3⤵
- Views/modifies file attributes
PID:1896
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\ipscsy.xml" /E /G Admin:F /C3⤵PID:1832
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\ipscsy.xml"3⤵PID:1916
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\ipsdan.xml""2⤵PID:1400
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\ipsdan.xml"3⤵PID:1708
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\ipsdan.xml" /E /G Admin:F /C3⤵PID:1652
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\ipsdan.xml"3⤵PID:1576
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\ipsdeu.xml""2⤵PID:1388
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\ipsdeu.xml"3⤵PID:760
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\ipsdeu.xml" /E /G Admin:F /C3⤵PID:1612
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\ipsdeu.xml"3⤵PID:1648
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\ipsen.xml""2⤵PID:1464
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\ipsen.xml"3⤵PID:2008
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\ipsen.xml" /E /G Admin:F /C3⤵PID:1036
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\ipsen.xml"3⤵PID:1044
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\ipsesp.xml""2⤵PID:1668
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\ipsesp.xml"3⤵PID:2020
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\ipsesp.xml" /E /G Admin:F /C3⤵PID:1056
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\ipsesp.xml"3⤵PID:1920
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\ipsfin.xml""2⤵PID:1844
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\ipsfin.xml"3⤵PID:1628
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\ipsfin.xml" /E /G Admin:F /C3⤵PID:744
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\ipsfin.xml"3⤵
- Modifies file permissions
PID:1632
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\ipsfra.xml""2⤵PID:1904
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\ipsfra.xml"3⤵PID:1864
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\ipsfra.xml" /E /G Admin:F /C3⤵PID:108
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\ipsfra.xml"3⤵PID:1804
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\ipshrv.xml""2⤵PID:1624
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\ipshrv.xml"3⤵
- Views/modifies file attributes
PID:1872
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\ipshrv.xml" /E /G Admin:F /C3⤵PID:1820
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\ipshrv.xml"3⤵PID:112
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\ipsita.xml""2⤵PID:1992
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\ipsita.xml"3⤵PID:1988
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\ipsita.xml" /E /G Admin:F /C3⤵PID:1980
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\ipsita.xml"3⤵PID:2004
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\ipsjpn.xml""2⤵PID:1108
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\ipsjpn.xml"3⤵
- Views/modifies file attributes
PID:1512
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\ipsjpn.xml" /E /G Admin:F /C3⤵PID:1468
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\ipsjpn.xml"3⤵PID:668
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\ipskor.xml""2⤵PID:1100
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\ipskor.xml"3⤵PID:1996
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\ipskor.xml" /E /G Admin:F /C3⤵PID:1968
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\ipskor.xml"3⤵PID:760
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\ipsnld.xml""2⤵PID:1612
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\ipsnld.xml"3⤵PID:1388
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\ipsnld.xml" /E /G Admin:F /C3⤵PID:1276
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\ipsnld.xml"3⤵PID:2008
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\ipsnor.xml""2⤵PID:1036
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\ipsnor.xml"3⤵PID:1464
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\ipsnor.xml" /E /G Admin:F /C3⤵PID:1584
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\ipsnor.xml"3⤵PID:2020
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\ipsplk.xml""2⤵PID:1056
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\ipsplk.xml"3⤵PID:1496
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\ipsplk.xml" /E /G Admin:F /C3⤵PID:240
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\ipsplk.xml"3⤵PID:1960
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\ipsptb.xml""2⤵PID:1892
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\ipsptb.xml"3⤵PID:1788
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\ipsptb.xml" /E /G Admin:F /C3⤵PID:1804
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\ipsptb.xml"3⤵PID:1848
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\ipsptg.xml""2⤵PID:112
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\ipsptg.xml"3⤵PID:844
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\ipsptg.xml" /E /G Admin:F /C3⤵PID:1896
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\ipsptg.xml"3⤵PID:1832
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\ipsrom.xml""2⤵PID:2016
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\ipsrom.xml"3⤵PID:2036
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\ipsrom.xml" /E /G Admin:F /C3⤵PID:268
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\ipsrom.xml"3⤵PID:668
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\ipsrus.xml""2⤵PID:2012
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\ipsrus.xml"3⤵
- Views/modifies file attributes
PID:1048
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\ipsrus.xml" /E /G Admin:F /C3⤵PID:1968
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\ipsrus.xml"3⤵PID:1400
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\ipssrb.xml""2⤵PID:1576
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\ipssrb.xml"3⤵PID:1940
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\ipssrb.xml" /E /G Admin:F /C3⤵PID:1124
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\ipssrb.xml"3⤵PID:1924
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\ipssrl.xml""2⤵PID:1908
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\ipssrl.xml"3⤵PID:1068
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\ipssrl.xml" /E /G Admin:F /C3⤵PID:2040
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\ipssrl.xml"3⤵PID:1192
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\ipssve.xml""2⤵PID:1036
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\ipssve.xml"3⤵PID:1816
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\ipssve.xml" /E /G Admin:F /C3⤵PID:744
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\ipssve.xml"3⤵
- Modifies file permissions
PID:1668
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\tipresx.dll.mui""2⤵PID:612
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\tipresx.dll.mui"3⤵PID:1904
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:812
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\tipresx.dll.mui"3⤵PID:1848
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\tipresx.dll.mui""2⤵PID:1564
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\tipresx.dll.mui"3⤵PID:1980
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:1896
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\tipresx.dll.mui"3⤵PID:2004
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\tipresx.dll.mui""2⤵PID:1544
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\tipresx.dll.mui"3⤵PID:2036
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:1468
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\tipresx.dll.mui"3⤵PID:888
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\tipresx.dll.mui""2⤵PID:2016
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\tipresx.dll.mui"3⤵
- Views/modifies file attributes
PID:1048
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:760
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\tipresx.dll.mui"3⤵PID:1900
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\tipresx.dll.mui""2⤵PID:2012
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\tipresx.dll.mui"3⤵PID:1940
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:1040
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\tipresx.dll.mui"3⤵
- Modifies file permissions
PID:1684
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\tipresx.dll.mui""2⤵PID:1576
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\tipresx.dll.mui"3⤵PID:1068
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:1808
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\tipresx.dll.mui"3⤵PID:884
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\tipresx.dll.mui""2⤵PID:1908
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\tipresx.dll.mui"3⤵PID:240
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:1776
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\tipresx.dll.mui"3⤵PID:872
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\tipresx.dll.mui""2⤵PID:568
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\tipresx.dll.mui"3⤵PID:1904
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:1872
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\tipresx.dll.mui"3⤵PID:1768
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\tipresx.dll.mui""2⤵PID:612
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\tipresx.dll.mui"3⤵PID:1220
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:1896
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\tipresx.dll.mui"3⤵PID:2004
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\pt-PT\tipresx.dll.mui""2⤵PID:1988
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\pt-PT\tipresx.dll.mui"3⤵PID:1852
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\pt-PT\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:1468
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\pt-PT\tipresx.dll.mui"3⤵PID:888
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\ro-RO\tipresx.dll.mui""2⤵PID:536
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\ro-RO\tipresx.dll.mui"3⤵PID:1100
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\ro-RO\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:760
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\ro-RO\tipresx.dll.mui"3⤵
- Modifies file permissions
PID:1900
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\ru-RU\tipresx.dll.mui""2⤵PID:1696
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\ru-RU\tipresx.dll.mui"3⤵PID:1612
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\ru-RU\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:1040
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\ru-RU\tipresx.dll.mui"3⤵PID:1684
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\tipresx.dll.mui""2⤵PID:1276
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\tipresx.dll.mui"3⤵
- Views/modifies file attributes
PID:748
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:1808
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\tipresx.dll.mui"3⤵PID:884
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\tipresx.dll.mui""2⤵PID:524
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\tipresx.dll.mui"3⤵PID:1056
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:1776
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\tipresx.dll.mui"3⤵PID:872
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\sr-Latn-CS\tipresx.dll.mui""2⤵PID:1856
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\sr-Latn-CS\tipresx.dll.mui"3⤵PID:1632
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\sr-Latn-CS\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:1872
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\sr-Latn-CS\tipresx.dll.mui"3⤵PID:1768
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\tipresx.dll.mui""2⤵PID:1804
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\tipresx.dll.mui"3⤵PID:112
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:1896
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\tipresx.dll.mui"3⤵PID:2004
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\th-TH\tipresx.dll.mui""2⤵PID:1620
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\th-TH\tipresx.dll.mui"3⤵PID:668
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\th-TH\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:1468
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\th-TH\tipresx.dll.mui"3⤵PID:888
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\tipresx.dll.mui""2⤵PID:1964
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\tipresx.dll.mui"3⤵PID:1400
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:760
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\tipresx.dll.mui"3⤵PID:1900
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\tipresx.dll.mui""2⤵PID:1048
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\tipresx.dll.mui"3⤵PID:1924
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:1040
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\tipresx.dll.mui"3⤵PID:1940
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\zh-CN\tipresx.dll.mui""2⤵PID:556
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\zh-CN\tipresx.dll.mui"3⤵PID:1192
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\zh-CN\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:1388
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\zh-CN\tipresx.dll.mui"3⤵
- Modifies file permissions
PID:836
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\ink\zh-TW\tipresx.dll.mui""2⤵PID:1196
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\ink\zh-TW\tipresx.dll.mui"3⤵PID:1668
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\ink\zh-TW\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:1464
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\ink\zh-TW\tipresx.dll.mui"3⤵PID:240
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\msinfo32.exe.mui""2⤵PID:816
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\msinfo32.exe.mui"3⤵
- Views/modifies file attributes
PID:1848
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\msinfo32.exe.mui" /E /G Admin:F /C3⤵PID:1976
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\msinfo32.exe.mui"3⤵PID:1920
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\OFFICE.ODF""2⤵PID:108
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\OFFICE.ODF"3⤵PID:844
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\OFFICE.ODF" /E /G Admin:F /C3⤵PID:1788
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\OFFICE.ODF"3⤵
- Modifies file permissions
PID:1220
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\Bears.htm""2⤵PID:1504
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\Bears.htm"3⤵PID:1512
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\Bears.htm" /E /G Admin:F /C3⤵PID:1644
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\Bears.htm"3⤵PID:1108
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\Cave_Drawings.gif""2⤵PID:1652
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\Cave_Drawings.gif"3⤵PID:752
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\Cave_Drawings.gif" /E /G Admin:F /C3⤵PID:1360
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\Cave_Drawings.gif"3⤵PID:1100
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\Connectivity.gif""2⤵PID:1444
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\Connectivity.gif"3⤵PID:1112
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\Connectivity.gif" /E /G Admin:F /C3⤵PID:1040
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\Connectivity.gif"3⤵PID:1940
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\Dotted_Lines.emf""2⤵PID:1612
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\Dotted_Lines.emf"3⤵PID:1584
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\Dotted_Lines.emf" /E /G Admin:F /C3⤵PID:1388
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\Dotted_Lines.emf"3⤵
- Modifies file permissions
PID:836
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\Garden.htm""2⤵PID:748
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\Garden.htm"3⤵PID:1816
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\Garden.htm" /E /G Admin:F /C3⤵PID:1464
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\Garden.htm"3⤵
- Modifies file permissions
PID:240
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\Genko_1.emf""2⤵PID:1496
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\Genko_1.emf"3⤵
- Views/modifies file attributes
PID:568
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\Genko_1.emf" /E /G Admin:F /C3⤵PID:1976
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\Genko_1.emf"3⤵PID:1920
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\Genko_2.emf""2⤵PID:1632
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\Genko_2.emf"3⤵
- Views/modifies file attributes
PID:912
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\Genko_2.emf" /E /G Admin:F /C3⤵PID:1788
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\Genko_2.emf"3⤵PID:112
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\Graph.emf""2⤵PID:368
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\Graph.emf"3⤵PID:1624
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\Graph.emf" /E /G Admin:F /C3⤵PID:888
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\Graph.emf"3⤵PID:1620
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\Green Bubbles.htm""2⤵PID:1544
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\Green Bubbles.htm"3⤵PID:1452
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\Green Bubbles.htm" /E /G Admin:F /C3⤵PID:1792
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\Green Bubbles.htm"3⤵PID:1336
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\grid_(cm).wmf""2⤵PID:2028
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\grid_(cm).wmf"3⤵PID:1360
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\grid_(cm).wmf" /E /G Admin:F /C3⤵PID:1572
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\grid_(cm).wmf"3⤵PID:1996
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\grid_(inch).wmf""2⤵PID:1412
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\grid_(inch).wmf"3⤵PID:1040
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\grid_(inch).wmf" /E /G Admin:F /C3⤵PID:1320
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\grid_(inch).wmf"3⤵PID:1444
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\Hand Prints.htm""2⤵PID:1808
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\Hand Prints.htm"3⤵PID:1388
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\Hand Prints.htm" /E /G Admin:F /C3⤵PID:556
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\Hand Prints.htm"3⤵PID:1612
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\Memo.emf""2⤵PID:1776
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\Memo.emf"3⤵
- Views/modifies file attributes
PID:1464
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\Memo.emf" /E /G Admin:F /C3⤵PID:1056
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\Memo.emf"3⤵PID:748
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\Month_Calendar.emf""2⤵PID:568
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\Month_Calendar.emf"3⤵PID:816
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\Month_Calendar.emf" /E /G Admin:F /C3⤵PID:744
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\Month_Calendar.emf"3⤵PID:1660
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\Music.emf""2⤵PID:912
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\Music.emf"3⤵PID:1564
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\Music.emf" /E /G Admin:F /C3⤵PID:844
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\Music.emf"3⤵PID:1636
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\Orange Circles.htm""2⤵PID:1512
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\Orange Circles.htm"3⤵PID:1108
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\Orange Circles.htm" /E /G Admin:F /C3⤵PID:1992
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\Orange Circles.htm"3⤵PID:1884
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\Peacock.htm""2⤵PID:300
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\Peacock.htm"3⤵PID:1748
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\Peacock.htm" /E /G Admin:F /C3⤵PID:1608
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\Peacock.htm"3⤵
- Modifies file permissions
PID:668
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\Roses.htm""2⤵PID:1964
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\Roses.htm"3⤵PID:1956
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\Roses.htm" /E /G Admin:F /C3⤵PID:1900
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\Roses.htm"3⤵PID:752
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\Seyes.emf""2⤵PID:1232
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\Seyes.emf"3⤵PID:2020
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\Seyes.emf" /E /G Admin:F /C3⤵PID:1692
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\Seyes.emf"3⤵PID:1112
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\Shades of Blue.htm""2⤵PID:1948
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\Shades of Blue.htm"3⤵PID:1960
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\Shades of Blue.htm" /E /G Admin:F /C3⤵PID:1648
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\Shades of Blue.htm"3⤵PID:1584
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\Shorthand.emf""2⤵PID:1488
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\Shorthand.emf"3⤵PID:1548
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\Shorthand.emf" /E /G Admin:F /C3⤵PID:524
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\Shorthand.emf"3⤵PID:1816
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\Soft Blue.htm""2⤵PID:1920
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\Soft Blue.htm"3⤵PID:2004
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\Soft Blue.htm" /E /G Admin:F /C3⤵PID:1472
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\Soft Blue.htm"3⤵PID:1904
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\Stars.htm""2⤵PID:1216
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\Stars.htm"3⤵PID:1988
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\Stars.htm" /E /G Admin:F /C3⤵PID:108
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\Stars.htm"3⤵PID:1804
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\Stucco.gif""2⤵PID:1852
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\Stucco.gif"3⤵PID:1324
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\Stucco.gif" /E /G Admin:F /C3⤵PID:888
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\Stucco.gif"3⤵PID:1448
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\Tiki.gif""2⤵PID:1916
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\Tiki.gif"3⤵PID:2000
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\Tiki.gif" /E /G Admin:F /C3⤵PID:1484
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\Tiki.gif"3⤵PID:1372
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\To_Do_List.emf""2⤵PID:1124
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\To_Do_List.emf"3⤵PID:1684
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\To_Do_List.emf" /E /G Admin:F /C3⤵PID:1572
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\To_Do_List.emf"3⤵PID:2016
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Microsoft Shared\Stationery\Wrinkled_Paper.gif""2⤵PID:1924
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Microsoft Shared\Stationery\Wrinkled_Paper.gif"3⤵PID:1984
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Microsoft Shared\Stationery\Wrinkled_Paper.gif" /E /G Admin:F /C3⤵PID:432
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Microsoft Shared\Stationery\Wrinkled_Paper.gif"3⤵PID:1104
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\Services\verisign.bmp""2⤵PID:1960
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Services\verisign.bmp"3⤵PID:1196
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Services\verisign.bmp" /E /G Admin:F /C3⤵PID:556
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Services\verisign.bmp"3⤵PID:2008
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\en-US\MSTTSLoc.dll.mui""2⤵PID:1628
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\en-US\MSTTSLoc.dll.mui"3⤵
- Views/modifies file attributes
PID:1848
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\en-US\MSTTSLoc.dll.mui" /E /G Admin:F /C3⤵PID:1056
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\en-US\MSTTSLoc.dll.mui"3⤵PID:2040
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\System\ado\adojavas.inc""2⤵PID:1896
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\ado\adojavas.inc"3⤵
- Views/modifies file attributes
PID:112
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\ado\adojavas.inc" /E /G Admin:F /C3⤵PID:744
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\ado\adojavas.inc"3⤵PID:1892
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\System\ado\adovbs.inc""2⤵PID:1888
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\ado\adovbs.inc"3⤵PID:1620
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\ado\adovbs.inc" /E /G Admin:F /C3⤵PID:268
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\ado\adovbs.inc"3⤵PID:676
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\System\ado\en-US\msader15.dll.mui""2⤵PID:1504
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\ado\en-US\msader15.dll.mui"3⤵
- Views/modifies file attributes
PID:1336
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\ado\en-US\msader15.dll.mui" /E /G Admin:F /C3⤵PID:332
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\ado\en-US\msader15.dll.mui"3⤵PID:1468
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\System\ado\msado20.tlb""2⤵PID:1516
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\ado\msado20.tlb"3⤵PID:1996
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\ado\msado20.tlb" /E /G Admin:F /C3⤵PID:904
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\ado\msado20.tlb"3⤵PID:1968
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\System\ado\msado21.tlb""2⤵PID:1048
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\ado\msado21.tlb"3⤵PID:1444
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\ado\msado21.tlb" /E /G Admin:F /C3⤵PID:1552
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\ado\msado21.tlb"3⤵PID:760
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\System\ado\msado25.tlb""2⤵PID:884
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\ado\msado25.tlb"3⤵PID:1700
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\ado\msado25.tlb" /E /G Admin:F /C3⤵PID:1068
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\ado\msado25.tlb"3⤵PID:1696
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\System\ado\msado26.tlb""2⤵PID:1584
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\ado\msado26.tlb"3⤵PID:240
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\ado\msado26.tlb" /E /G Admin:F /C3⤵PID:2008
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\ado\msado26.tlb"3⤵PID:1648
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\System\ado\msado27.tlb""2⤵PID:1816
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\ado\msado27.tlb"3⤵PID:1496
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\ado\msado27.tlb" /E /G Admin:F /C3⤵PID:2040
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\ado\msado27.tlb"3⤵PID:524
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\System\ado\msado28.tlb""2⤵PID:1904
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\ado\msado28.tlb"3⤵PID:812
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\ado\msado28.tlb" /E /G Admin:F /C3⤵PID:1892
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\ado\msado28.tlb"3⤵PID:1472
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\System\ado\msadomd28.tlb""2⤵PID:1804
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\ado\msadomd28.tlb"3⤵PID:1176
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\ado\msadomd28.tlb" /E /G Admin:F /C3⤵PID:676
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\ado\msadomd28.tlb"3⤵PID:108
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\System\ado\msadox28.tlb""2⤵PID:1448
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\ado\msadox28.tlb"3⤵
- Views/modifies file attributes
PID:1944
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\ado\msadox28.tlb" /E /G Admin:F /C3⤵PID:1468
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\ado\msadox28.tlb"3⤵PID:1332
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\System\en-US\wab32res.dll.mui""2⤵PID:1372
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\en-US\wab32res.dll.mui"3⤵
- Views/modifies file attributes
PID:536
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\en-US\wab32res.dll.mui" /E /G Admin:F /C3⤵PID:1968
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\en-US\wab32res.dll.mui"3⤵PID:1484
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\System\msadc\adcjavas.inc""2⤵PID:2016
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\msadc\adcjavas.inc"3⤵PID:1912
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\msadc\adcjavas.inc" /E /G Admin:F /C3⤵PID:760
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\msadc\adcjavas.inc"3⤵PID:1940
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\System\msadc\adcvbs.inc""2⤵PID:1104
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\msadc\adcvbs.inc"3⤵PID:1808
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\msadc\adcvbs.inc" /E /G Admin:F /C3⤵PID:1696
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\msadc\adcvbs.inc"3⤵PID:432
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\System\msadc\en-US\msadcer.dll.mui""2⤵PID:748
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\msadc\en-US\msadcer.dll.mui"3⤵
- Drops file in Program Files directory
PID:1776
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\msadc\en-US\msadcer.dll.mui" /E /G Admin:F /C3⤵PID:1648
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\msadc\en-US\msadcer.dll.mui"3⤵PID:556
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\System\msadc\en-US\msadcfr.dll.mui""2⤵PID:1556
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\msadc\en-US\msadcfr.dll.mui"3⤵PID:568
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\msadc\en-US\msadcfr.dll.mui" /E /G Admin:F /C3⤵PID:524
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\msadc\en-US\msadcfr.dll.mui"3⤵PID:1464
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\System\msadc\en-US\msadcor.dll.mui""2⤵PID:1636
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\msadc\en-US\msadcor.dll.mui"3⤵PID:912
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\msadc\en-US\msadcor.dll.mui" /E /G Admin:F /C3⤵PID:1472
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\msadc\en-US\msadcor.dll.mui"3⤵PID:816
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\System\msadc\en-US\msaddsr.dll.mui""2⤵PID:368
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\msadc\en-US\msaddsr.dll.mui"3⤵PID:1512
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\msadc\en-US\msaddsr.dll.mui" /E /G Admin:F /C3⤵PID:108
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\msadc\en-US\msaddsr.dll.mui"3⤵PID:1564
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\System\msadc\en-US\msdaprsr.dll.mui""2⤵PID:668
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\msadc\en-US\msdaprsr.dll.mui"3⤵PID:300
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\msadc\en-US\msdaprsr.dll.mui" /E /G Admin:F /C3⤵PID:1332
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\msadc\en-US\msdaprsr.dll.mui"3⤵PID:1108
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\System\msadc\en-US\msdaremr.dll.mui""2⤵PID:1880
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\msadc\en-US\msdaremr.dll.mui"3⤵PID:1968
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\msadc\en-US\msdaremr.dll.mui" /E /G Admin:F /C3⤵PID:1792
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\msadc\en-US\msdaremr.dll.mui"3⤵PID:1372
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\System\Ole DB\en-US\msdasqlr.dll.mui""2⤵PID:1900
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\Ole DB\en-US\msdasqlr.dll.mui"3⤵
- Views/modifies file attributes
PID:760
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\Ole DB\en-US\msdasqlr.dll.mui" /E /G Admin:F /C3⤵PID:1652
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\Ole DB\en-US\msdasqlr.dll.mui"3⤵PID:2016
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\System\Ole DB\en-US\oledb32r.dll.mui""2⤵PID:1692
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\Ole DB\en-US\oledb32r.dll.mui"3⤵PID:836
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\Ole DB\en-US\oledb32r.dll.mui" /E /G Admin:F /C3⤵PID:1196
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\Ole DB\en-US\oledb32r.dll.mui"3⤵PID:1068
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\System\Ole DB\en-US\sqloledb.rll.mui""2⤵PID:1924
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\Ole DB\en-US\sqloledb.rll.mui"3⤵PID:1776
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\Ole DB\en-US\sqloledb.rll.mui" /E /G Admin:F /C3⤵PID:1388
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\Ole DB\en-US\sqloledb.rll.mui"3⤵
- Modifies file permissions
PID:1948
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\System\Ole DB\en-US\sqlxmlx.rll.mui""2⤵PID:748
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\Ole DB\en-US\sqlxmlx.rll.mui"3⤵PID:568
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\Ole DB\en-US\sqlxmlx.rll.mui" /E /G Admin:F /C3⤵PID:1056
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\Ole DB\en-US\sqlxmlx.rll.mui"3⤵PID:1488
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\System\Ole DB\oledbjvs.inc""2⤵PID:1556
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\Ole DB\oledbjvs.inc"3⤵PID:912
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\Ole DB\oledbjvs.inc" /E /G Admin:F /C3⤵PID:744
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\Ole DB\oledbjvs.inc"3⤵
- Modifies file permissions
PID:1920
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\System\Ole DB\oledbvbs.inc""2⤵PID:1636
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\Ole DB\oledbvbs.inc"3⤵PID:1512
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\Ole DB\oledbvbs.inc" /E /G Admin:F /C3⤵PID:268
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\Ole DB\oledbvbs.inc"3⤵PID:1992
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\System\Ole DB\sqloledb.rll""2⤵PID:368
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\Ole DB\sqloledb.rll"3⤵PID:300
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\Ole DB\sqloledb.rll" /E /G Admin:F /C3⤵PID:332
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\Ole DB\sqloledb.rll"3⤵PID:1608
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\Common Files\System\Ole DB\sqlxmlx.rll""2⤵PID:668
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\Ole DB\sqlxmlx.rll"3⤵PID:1968
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\Ole DB\sqlxmlx.rll" /E /G Admin:F /C3⤵PID:1484
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\Ole DB\sqlxmlx.rll"3⤵PID:904
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\DVD Maker\audiodepthconverter.ax""2⤵PID:1880
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\DVD Maker\audiodepthconverter.ax"3⤵PID:760
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\DVD Maker\audiodepthconverter.ax" /E /G Admin:F /C3⤵PID:1940
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\DVD Maker\audiodepthconverter.ax"3⤵PID:1700
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\DVD Maker\bod_r.TTF""2⤵PID:1900
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\DVD Maker\bod_r.TTF"3⤵PID:836
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\DVD Maker\bod_r.TTF" /E /G Admin:F /C3⤵PID:600
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\DVD Maker\bod_r.TTF"3⤵PID:1192
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\DVD Maker\directshowtap.ax""2⤵PID:1692
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\DVD Maker\directshowtap.ax"3⤵PID:1776
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\DVD Maker\directshowtap.ax" /E /G Admin:F /C3⤵PID:1648
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\DVD Maker\directshowtap.ax"3⤵PID:1668
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\DVD Maker\en-US\DVDMaker.exe.mui""2⤵PID:1924
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\DVD Maker\en-US\DVDMaker.exe.mui"3⤵PID:568
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\DVD Maker\en-US\DVDMaker.exe.mui" /E /G Admin:F /C3⤵PID:524
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\DVD Maker\en-US\DVDMaker.exe.mui"3⤵PID:1464
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\DVD Maker\en-US\OmdProject.dll.mui""2⤵PID:748
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\DVD Maker\en-US\OmdProject.dll.mui"3⤵PID:912
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\DVD Maker\en-US\OmdProject.dll.mui" /E /G Admin:F /C3⤵PID:1472
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\DVD Maker\en-US\OmdProject.dll.mui"3⤵PID:816
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\DVD Maker\en-US\WMM2CLIP.dll.mui""2⤵PID:1556
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\DVD Maker\en-US\WMM2CLIP.dll.mui"3⤵PID:1512
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\DVD Maker\en-US\WMM2CLIP.dll.mui" /E /G Admin:F /C3⤵PID:108
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\DVD Maker\en-US\WMM2CLIP.dll.mui"3⤵PID:1564
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\DVD Maker\Eurosti.TTF""2⤵PID:1636
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\DVD Maker\Eurosti.TTF"3⤵PID:300
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\DVD Maker\Eurosti.TTF" /E /G Admin:F /C3⤵PID:1332
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\DVD Maker\Eurosti.TTF"3⤵PID:1108
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\DVD Maker\fieldswitch.ax""2⤵PID:368
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\DVD Maker\fieldswitch.ax"3⤵PID:1968
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\DVD Maker\fieldswitch.ax" /E /G Admin:F /C3⤵PID:1792
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\DVD Maker\fieldswitch.ax"3⤵PID:1372
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\DVD Maker\offset.ax""2⤵PID:668
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\DVD Maker\offset.ax"3⤵PID:760
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\DVD Maker\offset.ax" /E /G Admin:F /C3⤵PID:1652
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\DVD Maker\offset.ax"3⤵PID:1412
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\DVD Maker\rtstreamsink.ax""2⤵PID:1880
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\DVD Maker\rtstreamsink.ax"3⤵PID:836
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\DVD Maker\rtstreamsink.ax" /E /G Admin:F /C3⤵PID:1196
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\DVD Maker\rtstreamsink.ax"3⤵PID:1068
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\DVD Maker\rtstreamsource.ax""2⤵PID:1900
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\DVD Maker\rtstreamsource.ax"3⤵PID:1776
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\DVD Maker\rtstreamsource.ax" /E /G Admin:F /C3⤵PID:1388
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\DVD Maker\rtstreamsource.ax"3⤵PID:1948
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\DVD Maker\SecretST.TTF""2⤵PID:1692
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\DVD Maker\SecretST.TTF"3⤵PID:568
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\DVD Maker\SecretST.TTF" /E /G Admin:F /C3⤵PID:1056
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\DVD Maker\SecretST.TTF"3⤵PID:1488
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\DVD Maker\Shared\Common.fxh""2⤵PID:1924
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\DVD Maker\Shared\Common.fxh"3⤵PID:912
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\DVD Maker\Shared\Common.fxh" /E /G Admin:F /C3⤵PID:744
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\DVD Maker\Shared\Common.fxh"3⤵PID:1920
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\DVD Maker\Shared\DissolveAnother.png""2⤵PID:748
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\DVD Maker\Shared\DissolveAnother.png"3⤵PID:1512
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\DVD Maker\Shared\DissolveAnother.png" /E /G Admin:F /C3⤵PID:268
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\DVD Maker\Shared\DissolveAnother.png"3⤵PID:1992
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\DVD Maker\Shared\DissolveNoise.png""2⤵PID:1556
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\DVD Maker\Shared\DissolveNoise.png"3⤵PID:300
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\DVD Maker\Shared\DissolveNoise.png" /E /G Admin:F /C3⤵PID:332
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\DVD Maker\Shared\DissolveNoise.png"3⤵PID:676
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_Buttongraphic.png""2⤵PID:1636
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_Buttongraphic.png"3⤵PID:1968
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_Buttongraphic.png" /E /G Admin:F /C3⤵PID:1484
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_Buttongraphic.png"3⤵PID:904
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_SelectionSubpicture.png""2⤵PID:368
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_SelectionSubpicture.png"3⤵PID:760
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_SelectionSubpicture.png" /E /G Admin:F /C3⤵PID:1940
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_SelectionSubpicture.png"3⤵PID:1700
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_VideoInset.png""2⤵PID:668
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_VideoInset.png"3⤵
- Views/modifies file attributes
PID:836
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_VideoInset.png" /E /G Admin:F /C3⤵PID:600
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_VideoInset.png"3⤵PID:1192
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\DVD Maker\Shared\DvdStyles\4to3Squareframe_Buttongraphic.png""2⤵PID:432
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\DVD Maker\Shared\DvdStyles\4to3Squareframe_Buttongraphic.png"3⤵PID:1908
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\DVD Maker\Shared\DvdStyles\4to3Squareframe_Buttongraphic.png" /E /G Admin:F /C3⤵PID:1388
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\DVD Maker\Shared\DvdStyles\4to3Squareframe_Buttongraphic.png"3⤵PID:1948
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\DVD Maker\Shared\DvdStyles\4to3Squareframe_SelectionSubpicture.png""2⤵PID:1848
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\DVD Maker\Shared\DvdStyles\4to3Squareframe_SelectionSubpicture.png"3⤵PID:1772
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\DVD Maker\Shared\DvdStyles\4to3Squareframe_SelectionSubpicture.png" /E /G Admin:F /C3⤵PID:1056
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\DVD Maker\Shared\DvdStyles\4to3Squareframe_SelectionSubpicture.png"3⤵PID:1488
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\DVD Maker\Shared\DvdStyles\4to3Squareframe_VideoInset.png""2⤵PID:112
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\DVD Maker\Shared\DvdStyles\4to3Squareframe_VideoInset.png"3⤵PID:1036
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\DVD Maker\Shared\DvdStyles\4to3Squareframe_VideoInset.png" /E /G Admin:F /C3⤵PID:744
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\DVD Maker\Shared\DvdStyles\4to3Squareframe_VideoInset.png"3⤵PID:1920
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\babyblue.png""2⤵PID:1620
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\babyblue.png"3⤵PID:1972
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\babyblue.png" /E /G Admin:F /C3⤵PID:268
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\babyblue.png"3⤵PID:1992
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainBackground.wmv""2⤵PID:1216
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainBackground.wmv"3⤵PID:1624
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainBackground.wmv" /E /G Admin:F /C3⤵PID:332
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainBackground.wmv"3⤵PID:676
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainBackground_PAL.wmv""2⤵PID:1996
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainBackground_PAL.wmv"3⤵PID:1964
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainBackground_PAL.wmv" /E /G Admin:F /C3⤵PID:1484
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainBackground_PAL.wmv"3⤵PID:904
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToNotesBackground.wmv""2⤵PID:1444
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToNotesBackground.wmv"3⤵PID:1232
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToNotesBackground.wmv" /E /G Admin:F /C3⤵PID:1940
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToNotesBackground.wmv"3⤵PID:1700
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToNotesBackground_PAL.wmv""2⤵PID:1956
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToNotesBackground_PAL.wmv"3⤵PID:1696
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToNotesBackground_PAL.wmv" /E /G Admin:F /C3⤵PID:600
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToNotesBackground_PAL.wmv"3⤵PID:1192
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToScenesBackground.wmv""2⤵PID:2020
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToScenesBackground.wmv"3⤵
- Views/modifies file attributes
PID:1668
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToScenesBackground.wmv" /E /G Admin:F /C3⤵PID:1388
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToScenesBackground.wmv"3⤵PID:1948
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToScenesBackground_PAL.wmv""2⤵PID:2008
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToScenesBackground_PAL.wmv"3⤵PID:1276
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToScenesBackground_PAL.wmv" /E /G Admin:F /C3⤵PID:1056
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToScenesBackground_PAL.wmv"3⤵PID:1488
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyNotesBackground.wmv""2⤵PID:2040
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyNotesBackground.wmv"3⤵PID:816
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyNotesBackground.wmv" /E /G Admin:F /C3⤵PID:744
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyNotesBackground.wmv"3⤵PID:1920
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyNotesBackground_PAL.wmv""2⤵PID:1788
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyNotesBackground_PAL.wmv"3⤵PID:1812
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyNotesBackground_PAL.wmv" /E /G Admin:F /C3⤵PID:268
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyNotesBackground_PAL.wmv"3⤵PID:1992
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyScenesBackground.wmv""2⤵PID:2036
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyScenesBackground.wmv"3⤵PID:1108
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyScenesBackground.wmv" /E /G Admin:F /C3⤵PID:332
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyScenesBackground.wmv"3⤵PID:676
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyScenesBackground_PAL.wmv""2⤵PID:888
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyScenesBackground_PAL.wmv"3⤵PID:1452
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyScenesBackground_PAL.wmv" /E /G Admin:F /C3⤵PID:1484
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyScenesBackground_PAL.wmv"3⤵PID:904
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\LightBlueRectangle.PNG""2⤵PID:1100
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\LightBlueRectangle.PNG"3⤵PID:1412
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\LightBlueRectangle.PNG" /E /G Admin:F /C3⤵PID:1940
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\LightBlueRectangle.PNG"3⤵PID:1700
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\MainMenuButtonIcon.png""2⤵PID:1048
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\MainMenuButtonIcon.png"3⤵PID:1880
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\MainMenuButtonIcon.png" /E /G Admin:F /C3⤵PID:600
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\MainMenuButtonIcon.png"3⤵PID:1192
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\navSubpicture.png""2⤵PID:1984
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\navSubpicture.png"3⤵PID:1900
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\navSubpicture.png" /E /G Admin:F /C3⤵PID:1388
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\navSubpicture.png"3⤵PID:1948
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\nav_leftarrow.png""2⤵PID:1908
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\nav_leftarrow.png"3⤵PID:1692
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\nav_leftarrow.png" /E /G Admin:F /C3⤵PID:1056
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\nav_leftarrow.png"3⤵PID:1488
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\nav_rightarrow.png""2⤵PID:1952
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\nav_rightarrow.png"3⤵PID:1924
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\nav_rightarrow.png" /E /G Admin:F /C3⤵PID:744
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\nav_rightarrow.png"3⤵PID:1920
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\nav_uparrow.png""2⤵PID:1036
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\nav_uparrow.png"3⤵
- Drops file in Program Files directory
PID:748
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\nav_uparrow.png" /E /G Admin:F /C3⤵PID:268
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\nav_uparrow.png"3⤵PID:1992
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\28ZgLU0Y.cmd" "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\16_9-frame-background.png""2⤵PID:1892
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\16_9-frame-background.png"3⤵PID:1852
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\16_9-frame-background.png" /E /G Admin:F /C3⤵PID:332
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\16_9-frame-background.png"3⤵PID:676
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
6650ce31671b194e0f941868f2f3542f
SHA1792a8fd0204ec0417f720a95a7cfd6286792d6dd
SHA256bea908f559e636b7a4a693045bb957f1f9892204fb084d7aa411986b3386899b
SHA5126eeb7a14d69b1ea6523bc7484777748f2e9f1b29be4802414a1a8806552bb1316021c977e7a3c79f8838f7a4692682ead66090d1692b2d102a91ee57a4d77b78
-
MD5
383497fda5ca670a06dc688443c2011b
SHA1c622ebf694003368c3246e166a3a7bfc6b787652
SHA256d84d8ebcdfb0abcd821c24197517a5e329a1a6ae8e534509db78899b147cd60f
SHA5125f1f854690f9743a09fcdd0b6be43fd09af3eb5bc0f1ee4c20659458e34f46c33eec8eb651e569315902d99a12a217e5dea750411effca79485fa343c24d0129
-
MD5
383497fda5ca670a06dc688443c2011b
SHA1c622ebf694003368c3246e166a3a7bfc6b787652
SHA256d84d8ebcdfb0abcd821c24197517a5e329a1a6ae8e534509db78899b147cd60f
SHA5125f1f854690f9743a09fcdd0b6be43fd09af3eb5bc0f1ee4c20659458e34f46c33eec8eb651e569315902d99a12a217e5dea750411effca79485fa343c24d0129
-
MD5
383497fda5ca670a06dc688443c2011b
SHA1c622ebf694003368c3246e166a3a7bfc6b787652
SHA256d84d8ebcdfb0abcd821c24197517a5e329a1a6ae8e534509db78899b147cd60f
SHA5125f1f854690f9743a09fcdd0b6be43fd09af3eb5bc0f1ee4c20659458e34f46c33eec8eb651e569315902d99a12a217e5dea750411effca79485fa343c24d0129