Overview
overview
10Static
static
10foo/0044d6...f7.exe
windows7_x64
1foo/0044d6...f7.exe
windows10_x64
1foo/034e4c...a9.exe
windows7_x64
4foo/034e4c...a9.exe
windows10_x64
4foo/035fa2...72.exe
windows7_x64
10foo/035fa2...72.exe
windows10_x64
10foo/04884a...1b.exe
windows7_x64
8foo/04884a...1b.exe
windows10_x64
8foo/06ed82...59.exe
windows7_x64
7foo/06ed82...59.exe
windows10_x64
7foo/07470b...68.exe
windows7_x64
8foo/07470b...68.exe
windows10_x64
8foo/078adb...c0.exe
windows7_x64
10foo/078adb...c0.exe
windows10_x64
10foo/09e5c8...b4.exe
windows7_x64
1foo/09e5c8...b4.exe
windows10_x64
1foo/0becfe...f4.exe
windows7_x64
10foo/0becfe...f4.exe
windows10_x64
10foo/1a78d3...a3.exe
windows7_x64
5foo/1a78d3...a3.exe
windows10_x64
5foo/1ffe82...a6.exe
windows7_x64
10foo/1ffe82...a6.exe
windows10_x64
10foo/255028...e1.dll
windows7_x64
1foo/255028...e1.dll
windows10_x64
1foo/27601d...cc.exe
windows7_x64
8foo/27601d...cc.exe
windows10_x64
8foo/27f911...49.exe
windows7_x64
10foo/27f911...49.exe
windows10_x64
10foo/28408c...c5.exe
windows7_x64
10foo/28408c...c5.exe
windows10_x64
10foo/296822...e4.dll
windows7_x64
3foo/296822...e4.dll
windows10_x64
3foo/2de7b8...a4.exe
windows7_x64
10foo/2de7b8...a4.exe
windows10_x64
10foo/2e00df...8b.exe
windows7_x64
9foo/2e00df...8b.exe
windows10_x64
9foo/2e90a1...22.exe
windows7_x64
6foo/2e90a1...22.exe
windows10_x64
6foo/2f215e...b0.dll
windows7_x64
10foo/2f215e...b0.dll
windows10_x64
10foo/30bc06...3e.exe
windows7_x64
10foo/30bc06...3e.exe
windows10_x64
10foo/312e67...f3.exe
windows7_x64
4foo/312e67...f3.exe
windows10_x64
4foo/383497...1b.exe
windows7_x64
10foo/383497...1b.exe
windows10_x64
10foo/39555e...ec.exe
windows7_x64
10foo/39555e...ec.exe
windows10_x64
10foo/39e531...04.exe
windows7_x64
10foo/39e531...04.exe
windows10_x64
10foo/3aba72...cd.exe
windows7_x64
1foo/3aba72...cd.exe
windows10_x64
1foo/406c9b...fe.exe
windows7_x64
10foo/406c9b...fe.exe
windows10_x64
10foo/457cfd...ca.exe
windows7_x64
7foo/457cfd...ca.exe
windows10_x64
7foo/4761e4...60.exe
windows7_x64
8foo/4761e4...60.exe
windows10_x64
8foo/487f1b...04.exe
windows7_x64
8foo/487f1b...04.exe
windows10_x64
7foo/4a74c9...cf.exe
windows7_x64
10foo/4a74c9...cf.exe
windows10_x64
10foo/4b2d78...4b.exe
windows7_x64
8foo/4b2d78...4b.exe
windows10_x64
8foo/4c49c2...ba.exe
windows7_x64
1foo/4c49c2...ba.exe
windows10_x64
1foo/4cfe8f...77.exe
windows7_x64
9foo/4cfe8f...77.exe
windows10_x64
9foo/4ea454...13.exe
windows7_x64
8foo/4ea454...13.exe
windows10_x64
8foo/52d6c5...7e.exe
windows7_x64
7foo/52d6c5...7e.exe
windows10_x64
7foo/55fc11...e0.exe
windows7_x64
foo/55fc11...e0.exe
windows10_x64
10foo/59f0fb...06.exe
windows7_x64
1foo/59f0fb...06.exe
windows10_x64
1foo/5b1c0d...cb.exe
windows7_x64
1foo/5b1c0d...cb.exe
windows10_x64
1foo/5bc72a...ea.exe
windows7_x64
8foo/5bc72a...ea.exe
windows10_x64
8foo/5d3305...2a.exe
windows7_x64
7foo/5d3305...2a.exe
windows10_x64
7foo/5d9775...39.exe
windows7_x64
8foo/5d9775...39.exe
windows10_x64
8foo/60121e...3e.exe
windows7_x64
9foo/60121e...3e.exe
windows10_x64
9foo/62565a...fd.exe
windows7_x64
10foo/62565a...fd.exe
windows10_x64
10foo/62a3fd...64.exe
windows7_x64
8foo/62a3fd...64.exe
windows10_x64
10foo/63e9ce...d0.exe
windows7_x64
8foo/63e9ce...d0.exe
windows10_x64
8foo/6497ba...c5.exe
windows7_x64
10foo/6497ba...c5.exe
windows10_x64
10foo/698cc8...31.exe
windows7_x64
7foo/698cc8...31.exe
windows10_x64
7foo/6f2c5c...d5.exe
windows7_x64
7foo/6f2c5c...d5.exe
windows10_x64
7foo/798f5e...ba.exe
windows7_x64
10foo/798f5e...ba.exe
windows10_x64
10foo/7aec86...51.exe
windows7_x64
1foo/7aec86...51.exe
windows10_x64
1foo/84bf6e...64.exe
windows7_x64
8foo/84bf6e...64.exe
windows10_x64
8foo/907b7d...b3.exe
windows7_x64
8foo/907b7d...b3.exe
windows10_x64
8foo/928f1d...ee.exe
windows7_x64
1foo/928f1d...ee.exe
windows10_x64
1foo/9401b0...6c.exe
windows7_x64
1foo/9401b0...6c.exe
windows10_x64
1foo/97dd87...84.exe
windows7_x64
10foo/97dd87...84.exe
windows10_x64
10foo/9b8c48...a4.exe
windows7_x64
8foo/9b8c48...a4.exe
windows10_x64
8foo/9cde71...cd.exe
windows7_x64
6foo/9cde71...cd.exe
windows10_x64
6foo/9d3438...4b.exe
windows7_x64
8foo/9d3438...4b.exe
windows10_x64
1foo/9f8818...2d.exe
windows7_x64
8foo/9f8818...2d.exe
windows10_x64
3foo/a17bdc...cf.exe
windows7_x64
9foo/a17bdc...cf.exe
windows10_x64
9foo/a29811...46.exe
windows7_x64
10foo/a29811...46.exe
windows10_x64
10foo/aa3b51...52.exe
windows7_x64
10foo/aa3b51...52.exe
windows10_x64
10foo/acf0b7...c4.exe
windows7_x64
8foo/acf0b7...c4.exe
windows10_x64
8foo/aeca5c...f7.exe
windows7_x64
1foo/aeca5c...f7.exe
windows10_x64
1foo/b10714...f3.exe
windows7_x64
8foo/b10714...f3.exe
windows10_x64
8foo/b23652...9f.exe
windows7_x64
6foo/b23652...9f.exe
windows10_x64
6foo/b514b5...fc.exe
windows7_x64
1foo/b514b5...fc.exe
windows10_x64
1foo/b64196...23.exe
windows7_x64
7foo/b64196...23.exe
windows10_x64
7foo/b693df...60.exe
windows7_x64
7foo/b693df...60.exe
windows10_x64
7foo/b6e7c9...bc.exe
windows7_x64
10foo/b6e7c9...bc.exe
windows10_x64
10foo/b7d5f0...4a.exe
windows7_x64
10foo/b7d5f0...4a.exe
windows10_x64
10foo/ba2d46...29.exe
windows7_x64
1foo/ba2d46...29.exe
windows10_x64
1foo/bad78e...e5.exe
windows7_x64
9foo/bad78e...e5.exe
windows10_x64
9foo/bc6536...b9.exe
windows7_x64
10foo/bc6536...b9.exe
windows10_x64
10foo/be85e0...2c.exe
windows7_x64
1foo/be85e0...2c.exe
windows10_x64
1foo/c914b1...ee.exe
windows7_x64
3foo/c914b1...ee.exe
windows10_x64
3foo/c944ea...cc.exe
windows7_x64
8foo/c944ea...cc.exe
windows10_x64
8foo/cad363...8b.exe
windows7_x64
6foo/cad363...8b.exe
windows10_x64
6foo/cd89b6...df.exe
windows7_x64
8foo/cd89b6...df.exe
windows10_x64
8foo/d81e76...c4.exe
windows7_x64
10foo/d81e76...c4.exe
windows10_x64
10foo/d86d2c...08.exe
windows7_x64
10foo/d86d2c...08.exe
windows10_x64
10foo/d8e37d...98.exe
windows7_x64
9foo/d8e37d...98.exe
windows10_x64
9foo/dea515...e1.exe
windows7_x64
10foo/dea515...e1.exe
windows10_x64
6foo/dfcc55...b8.exe
windows7_x64
7foo/dfcc55...b8.exe
windows10_x64
7foo/e03bd4...fe.exe
windows7_x64
8foo/e03bd4...fe.exe
windows10_x64
8foo/e16ec7...2d.exe
windows7_x64
8foo/e16ec7...2d.exe
windows10_x64
8foo/e61c0e...0e.exe
windows7_x64
7foo/e61c0e...0e.exe
windows10_x64
7foo/e78fad...51.exe
windows7_x64
8foo/e78fad...51.exe
windows10_x64
8foo/e7ad45...88.exe
windows7_x64
3foo/e7ad45...88.exe
windows10_x64
3foo/e95678...8f.exe
windows7_x64
1foo/e95678...8f.exe
windows10_x64
1foo/edf723...ee.dll
windows7_x64
1foo/edf723...ee.dll
windows10_x64
1foo/f2366f...f5.exe
windows7_x64
1foo/f2366f...f5.exe
windows10_x64
1foo/f645a9...1f.exe
windows7_x64
1foo/f645a9...1f.exe
windows10_x64
1foo/f65e75...56.exe
windows7_x64
1foo/f65e75...56.exe
windows10_x64
1foo/f66028...2b.exe
windows7_x64
8foo/f66028...2b.exe
windows10_x64
8foo/f6c1c7...89.exe
windows7_x64
10foo/f6c1c7...89.exe
windows10_x64
10foo/fbab90...7c.exe
windows7_x64
7foo/fbab90...7c.exe
windows10_x64
7foo/fcdc00...b3.exe
windows7_x64
8foo/fcdc00...b3.exe
windows10_x64
8foo/fffb61...ba.exe
windows7_x64
1foo/fffb61...ba.exe
windows10_x64
1Analysis
-
max time kernel
156s -
max time network
172s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
11-08-2020 12:30
Static task
static1
Behavioral task
behavioral1
Sample
foo/0044d66e4abf7c4af6b5d207065320f7.exe
Resource
win7
Behavioral task
behavioral2
Sample
foo/0044d66e4abf7c4af6b5d207065320f7.exe
Resource
win10v200722
Behavioral task
behavioral3
Sample
foo/034e4c62965f8d5dd5d5a2ce34a53ba9.exe
Resource
win7
Behavioral task
behavioral4
Sample
foo/034e4c62965f8d5dd5d5a2ce34a53ba9.exe
Resource
win10
Behavioral task
behavioral5
Sample
foo/035fa2f2fae0a8fad733686a7d9ea772.exe
Resource
win7v200722
Behavioral task
behavioral6
Sample
foo/035fa2f2fae0a8fad733686a7d9ea772.exe
Resource
win10
Behavioral task
behavioral7
Sample
foo/04884a82d01d733f245d921e1f74fb1b.exe
Resource
win7v200722
Behavioral task
behavioral8
Sample
foo/04884a82d01d733f245d921e1f74fb1b.exe
Resource
win10
Behavioral task
behavioral9
Sample
foo/06ed82e88e1f68cc08602d7cd8ec5f59.exe
Resource
win7v200722
Behavioral task
behavioral10
Sample
foo/06ed82e88e1f68cc08602d7cd8ec5f59.exe
Resource
win10
Behavioral task
behavioral11
Sample
foo/07470b6ede84f02ec31ab0a601cdc068.exe
Resource
win7
Behavioral task
behavioral12
Sample
foo/07470b6ede84f02ec31ab0a601cdc068.exe
Resource
win10v200722
Behavioral task
behavioral13
Sample
foo/078adb95b1a0a6449d8c4ece796deac0.exe
Resource
win7
Behavioral task
behavioral14
Sample
foo/078adb95b1a0a6449d8c4ece796deac0.exe
Resource
win10v200722
Behavioral task
behavioral15
Sample
foo/09e5c88a0592763e0c4f30fb88d663b4.exe
Resource
win7v200722
Behavioral task
behavioral16
Sample
foo/09e5c88a0592763e0c4f30fb88d663b4.exe
Resource
win10v200722
Behavioral task
behavioral17
Sample
foo/0becfedf4d0b9ad5251aca33274a4cf4.exe
Resource
win7
Behavioral task
behavioral18
Sample
foo/0becfedf4d0b9ad5251aca33274a4cf4.exe
Resource
win10
Behavioral task
behavioral19
Sample
foo/1a78d313f2891bd468f78694814a28a3.exe
Resource
win7v200722
Behavioral task
behavioral20
Sample
foo/1a78d313f2891bd468f78694814a28a3.exe
Resource
win10
Behavioral task
behavioral21
Sample
foo/1ffe827beb75335731cb6f052a8ec3a6.exe
Resource
win7v200722
Behavioral task
behavioral22
Sample
foo/1ffe827beb75335731cb6f052a8ec3a6.exe
Resource
win10v200722
Behavioral task
behavioral23
Sample
foo/255028f2f37838e92f84f27c68aaf4e1.dll
Resource
win7v200722
Behavioral task
behavioral24
Sample
foo/255028f2f37838e92f84f27c68aaf4e1.dll
Resource
win10
Behavioral task
behavioral25
Sample
foo/27601d095e5b3761d9289584415a73cc.exe
Resource
win7
Behavioral task
behavioral26
Sample
foo/27601d095e5b3761d9289584415a73cc.exe
Resource
win10v200722
Behavioral task
behavioral27
Sample
foo/27f9116902c35a9b784c703762bbd249.exe
Resource
win7
Behavioral task
behavioral28
Sample
foo/27f9116902c35a9b784c703762bbd249.exe
Resource
win10v200722
Behavioral task
behavioral29
Sample
foo/28408caa2961caecd35c9f8f7c1aecc5.exe
Resource
win7
Behavioral task
behavioral30
Sample
foo/28408caa2961caecd35c9f8f7c1aecc5.exe
Resource
win10v200722
Behavioral task
behavioral31
Sample
foo/29682275a385f42634ee312db7f666e4.dll
Resource
win7
Behavioral task
behavioral32
Sample
foo/29682275a385f42634ee312db7f666e4.dll
Resource
win10
Behavioral task
behavioral33
Sample
foo/2de7b886ed3bf5455694d76ac69a96a4.exe
Resource
win7v200722
Behavioral task
behavioral34
Sample
foo/2de7b886ed3bf5455694d76ac69a96a4.exe
Resource
win10v200722
Behavioral task
behavioral35
Sample
foo/2e00df497f82c0bf215548969fefc18b.exe
Resource
win7v200722
Behavioral task
behavioral36
Sample
foo/2e00df497f82c0bf215548969fefc18b.exe
Resource
win10v200722
Behavioral task
behavioral37
Sample
foo/2e90a15707ad3eb4cd06bd8a05463922.exe
Resource
win7
Behavioral task
behavioral38
Sample
foo/2e90a15707ad3eb4cd06bd8a05463922.exe
Resource
win10
Behavioral task
behavioral39
Sample
foo/2f215e008c6a7d8886c578e442b8f1b0.dll
Resource
win7
Behavioral task
behavioral40
Sample
foo/2f215e008c6a7d8886c578e442b8f1b0.dll
Resource
win10
Behavioral task
behavioral41
Sample
foo/30bc06d0add076dd6500fcdfbc12643e.exe
Resource
win7
Behavioral task
behavioral42
Sample
foo/30bc06d0add076dd6500fcdfbc12643e.exe
Resource
win10
Behavioral task
behavioral43
Sample
foo/312e67dc35992949937d1bad6ba529f3.exe
Resource
win7
Behavioral task
behavioral44
Sample
foo/312e67dc35992949937d1bad6ba529f3.exe
Resource
win10v200722
Behavioral task
behavioral45
Sample
foo/383497fda5ca670a06dc688443c2011b.exe
Resource
win7
Behavioral task
behavioral46
Sample
foo/383497fda5ca670a06dc688443c2011b.exe
Resource
win10v200722
Behavioral task
behavioral47
Sample
foo/39555eb0403a69906729713ad20888ec.exe
Resource
win7
Behavioral task
behavioral48
Sample
foo/39555eb0403a69906729713ad20888ec.exe
Resource
win10v200722
Behavioral task
behavioral49
Sample
foo/39e5310f67f0b1bf98604a2e0edb9204.exe
Resource
win7v200722
Behavioral task
behavioral50
Sample
foo/39e5310f67f0b1bf98604a2e0edb9204.exe
Resource
win10v200722
Behavioral task
behavioral51
Sample
foo/3aba72d1f87f4372162972b6a45ed8cd.exe
Resource
win7v200722
Behavioral task
behavioral52
Sample
foo/3aba72d1f87f4372162972b6a45ed8cd.exe
Resource
win10v200722
Behavioral task
behavioral53
Sample
foo/406c9b9529109f835fe7292e6cf3fefe.exe
Resource
win7v200722
Behavioral task
behavioral54
Sample
foo/406c9b9529109f835fe7292e6cf3fefe.exe
Resource
win10v200722
Behavioral task
behavioral55
Sample
foo/457cfd3e7a53e7500f8206b3ea300aca.exe
Resource
win7v200722
Behavioral task
behavioral56
Sample
foo/457cfd3e7a53e7500f8206b3ea300aca.exe
Resource
win10
Behavioral task
behavioral57
Sample
foo/4761e4b165f62d326b9032d96329e460.exe
Resource
win7v200722
Behavioral task
behavioral58
Sample
foo/4761e4b165f62d326b9032d96329e460.exe
Resource
win10
Behavioral task
behavioral59
Sample
foo/487f1b1f30212eaa9104c084a667f104.exe
Resource
win7v200722
Behavioral task
behavioral60
Sample
foo/487f1b1f30212eaa9104c084a667f104.exe
Resource
win10
Behavioral task
behavioral61
Sample
foo/4a74c9f378007412ec2c8b2eea6da4cf.exe
Resource
win7
Behavioral task
behavioral62
Sample
foo/4a74c9f378007412ec2c8b2eea6da4cf.exe
Resource
win10v200722
Behavioral task
behavioral63
Sample
foo/4b2d7854b47943b118e24c6ec79b974b.exe
Resource
win7
Behavioral task
behavioral64
Sample
foo/4b2d7854b47943b118e24c6ec79b974b.exe
Resource
win10
Behavioral task
behavioral65
Sample
foo/4c49c2496ae538bcec9e1510f3eb8eba.exe
Resource
win7v200722
Behavioral task
behavioral66
Sample
foo/4c49c2496ae538bcec9e1510f3eb8eba.exe
Resource
win10v200722
Behavioral task
behavioral67
Sample
foo/4cfe8f3aa1592035b9a2cdb2c4f54c77.exe
Resource
win7v200722
Behavioral task
behavioral68
Sample
foo/4cfe8f3aa1592035b9a2cdb2c4f54c77.exe
Resource
win10
Behavioral task
behavioral69
Sample
foo/4ea45460c3e7c3d8486d3f7bec90c613.exe
Resource
win7
Behavioral task
behavioral70
Sample
foo/4ea45460c3e7c3d8486d3f7bec90c613.exe
Resource
win10v200722
Behavioral task
behavioral71
Sample
foo/52d6c59fcfe73048a240c7fdd1f04d7e.exe
Resource
win7
Behavioral task
behavioral72
Sample
foo/52d6c59fcfe73048a240c7fdd1f04d7e.exe
Resource
win10v200722
Behavioral task
behavioral73
Sample
foo/55fc11ec67a00177d047d5abc84231e0.exe
Resource
win7v200722
Behavioral task
behavioral74
Sample
foo/55fc11ec67a00177d047d5abc84231e0.exe
Resource
win10
Behavioral task
behavioral75
Sample
foo/59f0fbc29bace019804b8a181ce75a06.exe
Resource
win7v200722
Behavioral task
behavioral76
Sample
foo/59f0fbc29bace019804b8a181ce75a06.exe
Resource
win10
Behavioral task
behavioral77
Sample
foo/5b1c0df2be80006ec3af6a5eeea17ecb.exe
Resource
win7v200722
Behavioral task
behavioral78
Sample
foo/5b1c0df2be80006ec3af6a5eeea17ecb.exe
Resource
win10
Behavioral task
behavioral79
Sample
foo/5bc72a1ae433663758319d97917b77ea.exe
Resource
win7v200722
Behavioral task
behavioral80
Sample
foo/5bc72a1ae433663758319d97917b77ea.exe
Resource
win10v200722
Behavioral task
behavioral81
Sample
foo/5d33050f0514054c49f2bc2ff9abee2a.exe
Resource
win7
Behavioral task
behavioral82
Sample
foo/5d33050f0514054c49f2bc2ff9abee2a.exe
Resource
win10
Behavioral task
behavioral83
Sample
foo/5d9775622b5e7123d5796d4de5dc2839.exe
Resource
win7
Behavioral task
behavioral84
Sample
foo/5d9775622b5e7123d5796d4de5dc2839.exe
Resource
win10
Behavioral task
behavioral85
Sample
foo/60121ea2ab380455f7e143cd9438443e.exe
Resource
win7
Behavioral task
behavioral86
Sample
foo/60121ea2ab380455f7e143cd9438443e.exe
Resource
win10
Behavioral task
behavioral87
Sample
foo/62565a39c4a264e48e0678edad5d60fd.exe
Resource
win7
Behavioral task
behavioral88
Sample
foo/62565a39c4a264e48e0678edad5d60fd.exe
Resource
win10v200722
Behavioral task
behavioral89
Sample
foo/62a3fd9b4932e59a7192813c22617764.exe
Resource
win7v200722
Behavioral task
behavioral90
Sample
foo/62a3fd9b4932e59a7192813c22617764.exe
Resource
win10
Behavioral task
behavioral91
Sample
foo/63e9ce22dbf66934fd75c77bc84954d0.exe
Resource
win7
Behavioral task
behavioral92
Sample
foo/63e9ce22dbf66934fd75c77bc84954d0.exe
Resource
win10
Behavioral task
behavioral93
Sample
foo/6497ba06c339ec8ca438ddf0dd2f8fc5.exe
Resource
win7v200722
Behavioral task
behavioral94
Sample
foo/6497ba06c339ec8ca438ddf0dd2f8fc5.exe
Resource
win10v200722
Behavioral task
behavioral95
Sample
foo/698cc868cdae13a5cc744020ec00e331.exe
Resource
win7v200722
Behavioral task
behavioral96
Sample
foo/698cc868cdae13a5cc744020ec00e331.exe
Resource
win10v200722
Behavioral task
behavioral97
Sample
foo/6f2c5c31fefa00afa2af1adcbdd93ad5.exe
Resource
win7v200722
Behavioral task
behavioral98
Sample
foo/6f2c5c31fefa00afa2af1adcbdd93ad5.exe
Resource
win10v200722
Behavioral task
behavioral99
Sample
foo/798f5e61531f527821a490a15ef957ba.exe
Resource
win7v200722
Behavioral task
behavioral100
Sample
foo/798f5e61531f527821a490a15ef957ba.exe
Resource
win10v200722
Behavioral task
behavioral101
Sample
foo/7aec86c6c4cc35139b7874a0117e4451.exe
Resource
win7v200722
Behavioral task
behavioral102
Sample
foo/7aec86c6c4cc35139b7874a0117e4451.exe
Resource
win10v200722
Behavioral task
behavioral103
Sample
foo/84bf6e1a8fcd94cf6cba6ac7e2a95b64.exe
Resource
win7v200722
Behavioral task
behavioral104
Sample
foo/84bf6e1a8fcd94cf6cba6ac7e2a95b64.exe
Resource
win10v200722
Behavioral task
behavioral105
Sample
foo/907b7d9a23ed7821abb700fcbe1c9bb3.exe
Resource
win7v200722
Behavioral task
behavioral106
Sample
foo/907b7d9a23ed7821abb700fcbe1c9bb3.exe
Resource
win10v200722
Behavioral task
behavioral107
Sample
foo/928f1db0c63d122f0183686a3bdfccee.exe
Resource
win7v200722
Behavioral task
behavioral108
Sample
foo/928f1db0c63d122f0183686a3bdfccee.exe
Resource
win10
Behavioral task
behavioral109
Sample
foo/9401b0788dc22eeb1dace02d23a9596c.exe
Resource
win7
Behavioral task
behavioral110
Sample
foo/9401b0788dc22eeb1dace02d23a9596c.exe
Resource
win10v200722
Behavioral task
behavioral111
Sample
foo/97dd8726304f889ef12ef1beb510be84.exe
Resource
win7
Behavioral task
behavioral112
Sample
foo/97dd8726304f889ef12ef1beb510be84.exe
Resource
win10v200722
Behavioral task
behavioral113
Sample
foo/9b8c48e6186718b7b290ceed9369a1a4.exe
Resource
win7v200722
Behavioral task
behavioral114
Sample
foo/9b8c48e6186718b7b290ceed9369a1a4.exe
Resource
win10
Behavioral task
behavioral115
Sample
foo/9cde71abfd2a6aeb83cdd233cbc04fcd.exe
Resource
win7v200722
Behavioral task
behavioral116
Sample
foo/9cde71abfd2a6aeb83cdd233cbc04fcd.exe
Resource
win10
Behavioral task
behavioral117
Sample
foo/9d3438ba1dbdbcc2a65451893e38004b.exe
Resource
win7
Behavioral task
behavioral118
Sample
foo/9d3438ba1dbdbcc2a65451893e38004b.exe
Resource
win10
Behavioral task
behavioral119
Sample
foo/9f88187d774cc9eaf89dc65479c4302d.exe
Resource
win7
Behavioral task
behavioral120
Sample
foo/9f88187d774cc9eaf89dc65479c4302d.exe
Resource
win10
Behavioral task
behavioral121
Sample
foo/a17bdcde184026e23ae6dc8723f73fcf.exe
Resource
win7v200722
Behavioral task
behavioral122
Sample
foo/a17bdcde184026e23ae6dc8723f73fcf.exe
Resource
win10v200722
Behavioral task
behavioral123
Sample
foo/a2981192a30538e97b55f363abbce946.exe
Resource
win7
Behavioral task
behavioral124
Sample
foo/a2981192a30538e97b55f363abbce946.exe
Resource
win10
Behavioral task
behavioral125
Sample
foo/aa3b51bd50bcc98f763cffcf7f907152.exe
Resource
win7
Behavioral task
behavioral126
Sample
foo/aa3b51bd50bcc98f763cffcf7f907152.exe
Resource
win10
Behavioral task
behavioral127
Sample
foo/acf0b7f4fe980501192187bb9b8e20c4.exe
Resource
win7v200722
Behavioral task
behavioral128
Sample
foo/acf0b7f4fe980501192187bb9b8e20c4.exe
Resource
win10
Behavioral task
behavioral129
Sample
foo/aeca5c301d02253e8ffcc240c08f61f7.exe
Resource
win7v200722
Behavioral task
behavioral130
Sample
foo/aeca5c301d02253e8ffcc240c08f61f7.exe
Resource
win10
Behavioral task
behavioral131
Sample
foo/b1071426aa88f31339f1b369cf13cef3.exe
Resource
win7v200722
Behavioral task
behavioral132
Sample
foo/b1071426aa88f31339f1b369cf13cef3.exe
Resource
win10v200722
Behavioral task
behavioral133
Sample
foo/b2365260985173cc758575cd8059459f.exe
Resource
win7v200722
Behavioral task
behavioral134
Sample
foo/b2365260985173cc758575cd8059459f.exe
Resource
win10
Behavioral task
behavioral135
Sample
foo/b514b59324818c52140b431aeac96bfc.exe
Resource
win7v200722
Behavioral task
behavioral136
Sample
foo/b514b59324818c52140b431aeac96bfc.exe
Resource
win10
Behavioral task
behavioral137
Sample
foo/b641961018d09dfbd7fa9c15f09a7723.exe
Resource
win7
Behavioral task
behavioral138
Sample
foo/b641961018d09dfbd7fa9c15f09a7723.exe
Resource
win10
Behavioral task
behavioral139
Sample
foo/b693dfe99d2915616044eea2cfe18360.exe
Resource
win7
Behavioral task
behavioral140
Sample
foo/b693dfe99d2915616044eea2cfe18360.exe
Resource
win10
Behavioral task
behavioral141
Sample
foo/b6e7c9793cf40153bf8865195e06ecbc.exe
Resource
win7v200722
Behavioral task
behavioral142
Sample
foo/b6e7c9793cf40153bf8865195e06ecbc.exe
Resource
win10v200722
Behavioral task
behavioral143
Sample
foo/b7d5f0b9bf2e6e13c5b3ca1c2a0a8b4a.exe
Resource
win7
Behavioral task
behavioral144
Sample
foo/b7d5f0b9bf2e6e13c5b3ca1c2a0a8b4a.exe
Resource
win10v200722
Behavioral task
behavioral145
Sample
foo/ba2d460199eb2d9e9d6d0559bb455529.exe
Resource
win7
Behavioral task
behavioral146
Sample
foo/ba2d460199eb2d9e9d6d0559bb455529.exe
Resource
win10v200722
Behavioral task
behavioral147
Sample
foo/bad78e11371381ce9e1d703aac2821e5.exe
Resource
win7
Behavioral task
behavioral148
Sample
foo/bad78e11371381ce9e1d703aac2821e5.exe
Resource
win10v200722
Behavioral task
behavioral149
Sample
foo/bc6536b86b04cf5b3bf7cd353d615ab9.exe
Resource
win7v200722
Behavioral task
behavioral150
Sample
foo/bc6536b86b04cf5b3bf7cd353d615ab9.exe
Resource
win10v200722
Behavioral task
behavioral151
Sample
foo/be85e0b2608a55942aa101c66ce6c32c.exe
Resource
win7v200722
Behavioral task
behavioral152
Sample
foo/be85e0b2608a55942aa101c66ce6c32c.exe
Resource
win10v200722
Behavioral task
behavioral153
Sample
foo/c914b169d1388c5e78421045d05946ee.exe
Resource
win7v200722
Behavioral task
behavioral154
Sample
foo/c914b169d1388c5e78421045d05946ee.exe
Resource
win10v200722
Behavioral task
behavioral155
Sample
foo/c944eadb6e032fd9e7a0988464a6f1cc.exe
Resource
win7v200722
Behavioral task
behavioral156
Sample
foo/c944eadb6e032fd9e7a0988464a6f1cc.exe
Resource
win10v200722
Behavioral task
behavioral157
Sample
foo/cad3634df5d5058551bed38237ab8e8b.exe
Resource
win7
Behavioral task
behavioral158
Sample
foo/cad3634df5d5058551bed38237ab8e8b.exe
Resource
win10v200722
Behavioral task
behavioral159
Sample
foo/cd89b6c808c296cde0bc77ee630dc7df.exe
Resource
win7v200722
Behavioral task
behavioral160
Sample
foo/cd89b6c808c296cde0bc77ee630dc7df.exe
Resource
win10v200722
Behavioral task
behavioral161
Sample
foo/d81e76123ccb64b73eeac2f31a7434c4.exe
Resource
win7v200722
Behavioral task
behavioral162
Sample
foo/d81e76123ccb64b73eeac2f31a7434c4.exe
Resource
win10
Behavioral task
behavioral163
Sample
foo/d86d2cb12111422ad0b401afa523e308.exe
Resource
win7v200722
Behavioral task
behavioral164
Sample
foo/d86d2cb12111422ad0b401afa523e308.exe
Resource
win10v200722
Behavioral task
behavioral165
Sample
foo/d8e37dd7ca017370a0b54147a27a7498.exe
Resource
win7v200722
Behavioral task
behavioral166
Sample
foo/d8e37dd7ca017370a0b54147a27a7498.exe
Resource
win10
Behavioral task
behavioral167
Sample
foo/dea515c25081073ec2cee293b2991ee1.exe
Resource
win7v200722
Behavioral task
behavioral168
Sample
foo/dea515c25081073ec2cee293b2991ee1.exe
Resource
win10v200722
Behavioral task
behavioral169
Sample
foo/dfcc555a02bccc9c438b08555b5c2ab8.exe
Resource
win7
Behavioral task
behavioral170
Sample
foo/dfcc555a02bccc9c438b08555b5c2ab8.exe
Resource
win10v200722
Behavioral task
behavioral171
Sample
foo/e03bd458de4a107688236bdc4ddc3afe.exe
Resource
win7
Behavioral task
behavioral172
Sample
foo/e03bd458de4a107688236bdc4ddc3afe.exe
Resource
win10v200722
Behavioral task
behavioral173
Sample
foo/e16ec7bc29b68f66e90fdbfefe1d3a2d.exe
Resource
win7
Behavioral task
behavioral174
Sample
foo/e16ec7bc29b68f66e90fdbfefe1d3a2d.exe
Resource
win10
Behavioral task
behavioral175
Sample
foo/e61c0e180c2616fa81e6c4d581a9520e.exe
Resource
win7v200722
Behavioral task
behavioral176
Sample
foo/e61c0e180c2616fa81e6c4d581a9520e.exe
Resource
win10v200722
Behavioral task
behavioral177
Sample
foo/e78fad8a5d0ea89127ed36ed20bc9351.exe
Resource
win7
Behavioral task
behavioral178
Sample
foo/e78fad8a5d0ea89127ed36ed20bc9351.exe
Resource
win10
Behavioral task
behavioral179
Sample
foo/e7ad45164be5c3c7f9936e9b5fb28788.exe
Resource
win7
Behavioral task
behavioral180
Sample
foo/e7ad45164be5c3c7f9936e9b5fb28788.exe
Resource
win10
Behavioral task
behavioral181
Sample
foo/e95678212c7218c6e7944fca1631c88f.exe
Resource
win7
Behavioral task
behavioral182
Sample
foo/e95678212c7218c6e7944fca1631c88f.exe
Resource
win10v200722
Behavioral task
behavioral183
Sample
foo/edf723c8e404cd67041e7dfbbb1a6eee.dll
Resource
win7
Behavioral task
behavioral184
Sample
foo/edf723c8e404cd67041e7dfbbb1a6eee.dll
Resource
win10
Behavioral task
behavioral185
Sample
foo/f2366f48d3534bc8af573f2696dce4f5.exe
Resource
win7v200722
Behavioral task
behavioral186
Sample
foo/f2366f48d3534bc8af573f2696dce4f5.exe
Resource
win10
Behavioral task
behavioral187
Sample
foo/f645a94491240317caccd6f8508fba1f.exe
Resource
win7v200722
Behavioral task
behavioral188
Sample
foo/f645a94491240317caccd6f8508fba1f.exe
Resource
win10
Behavioral task
behavioral189
Sample
foo/f65e75d9675a50f9b4807e79dcc48d56.exe
Resource
win7v200722
Behavioral task
behavioral190
Sample
foo/f65e75d9675a50f9b4807e79dcc48d56.exe
Resource
win10
Behavioral task
behavioral191
Sample
foo/f660284cb3574213a512e3f03ca9012b.exe
Resource
win7
Behavioral task
behavioral192
Sample
foo/f660284cb3574213a512e3f03ca9012b.exe
Resource
win10
Behavioral task
behavioral193
Sample
foo/f6c1c72f3e45d2f3499b6bd6661b3289.exe
Resource
win7
Behavioral task
behavioral194
Sample
foo/f6c1c72f3e45d2f3499b6bd6661b3289.exe
Resource
win10
Behavioral task
behavioral195
Sample
foo/fbab903080d6a4e65a1a2f6bc4d97b7c.exe
Resource
win7
Behavioral task
behavioral196
Sample
foo/fbab903080d6a4e65a1a2f6bc4d97b7c.exe
Resource
win10
Behavioral task
behavioral197
Sample
foo/fcdc003a1529fe3660b160fd012173b3.exe
Resource
win7v200722
Behavioral task
behavioral198
Sample
foo/fcdc003a1529fe3660b160fd012173b3.exe
Resource
win10
Behavioral task
behavioral199
Sample
foo/fffb61eaaac6e8a40bfaa7a4acb6b9ba.exe
Resource
win7
Behavioral task
behavioral200
Sample
foo/fffb61eaaac6e8a40bfaa7a4acb6b9ba.exe
Resource
win10v200722
General
-
Target
foo/383497fda5ca670a06dc688443c2011b.exe
Malware Config
Signatures
-
Matrix Ransomware 5 IoCs
Targeted ransomware with information collection and encryption functionality.
Processes:
description flow ioc HTTP URL 8 http://murikos.in/add.php?apikey=BKTqstat&compuser=LZUKLIOU|Admin&sid=rQfjizDAjnclTCVX&phase=START HTTP URL 9 http://murikos.in/add.php?apikey=BKTqstat&compuser=LZUKLIOU|Admin&sid=7dVNJwscVqm5mfIA&phase=START HTTP URL 93 http://murikos.in/add.php?apikey=BKTqstat&compuser=LZUKLIOU|Admin&sid=7dVNJwscVqm5mfIA&phase=L_3FEADF807A14DA81_8996_2GB HTTP URL 143 http://murikos.in/add.php?apikey=BKTqstat&compuser=LZUKLIOU|Admin&sid=7dVNJwscVqm5mfIA&phase=L_DONE_10 HTTP URL 144 http://murikos.in/add.php?apikey=BKTqstat&compuser=LZUKLIOU|Admin&sid=7dVNJwscVqm5mfIA&phase=L_DONE_100 -
Executes dropped EXE 1 IoCs
Processes:
n383497fda5ca670a06dc688443c2011b.exepid process 2680 n383497fda5ca670a06dc688443c2011b.exe -
Modifies file permissions 1 TTPs 64 IoCs
Processes:
takeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exepid process 6720 takeown.exe 6828 takeown.exe 6240 takeown.exe 6856 takeown.exe 6928 takeown.exe 4200 takeown.exe 6128 takeown.exe 6504 takeown.exe 6580 takeown.exe 760 takeown.exe 5804 takeown.exe 6396 takeown.exe 7084 takeown.exe 6852 takeown.exe 3200 takeown.exe 420 takeown.exe 6052 takeown.exe 1100 takeown.exe 5552 takeown.exe 992 takeown.exe 4748 takeown.exe 6080 takeown.exe 2260 takeown.exe 5944 takeown.exe 6360 takeown.exe 4868 takeown.exe 4504 takeown.exe 5444 takeown.exe 4208 takeown.exe 5020 takeown.exe 6008 takeown.exe 1952 takeown.exe 4752 takeown.exe 6560 takeown.exe 5056 takeown.exe 5072 takeown.exe 6004 takeown.exe 5900 takeown.exe 6196 takeown.exe 2140 takeown.exe 4324 takeown.exe 4896 takeown.exe 6940 takeown.exe 6332 takeown.exe 5972 takeown.exe 5772 takeown.exe 7040 takeown.exe 6216 takeown.exe 4460 takeown.exe 4468 takeown.exe 4292 takeown.exe 6436 takeown.exe 4548 takeown.exe 2712 takeown.exe 5544 takeown.exe 6624 takeown.exe 6836 takeown.exe 6048 takeown.exe 5508 takeown.exe 376 takeown.exe 4148 takeown.exe 5100 takeown.exe 5816 takeown.exe 6400 takeown.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\README = "\"C:\\Program Files (x86)\\Windows NT\\Accessories\\wordpad.exe\" \"C:\\Users\\Admin\\AppData\\Roaming\\#What_Wrong_With_Files#.rtf\"" reg.exe -
Drops desktop.ini file(s) 3 IoCs
Processes:
383497fda5ca670a06dc688443c2011b.exedescription ioc process File opened for modification C:\Program Files\Common Files\microsoft shared\Stationery\Desktop.ini 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\desktop.ini 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-1400429095-533421673-2598934218-1000\desktop.ini 383497fda5ca670a06dc688443c2011b.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
383497fda5ca670a06dc688443c2011b.exedescription ioc process File opened (read-only) \??\W: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\T: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\L: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\J: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\F: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\E: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\S: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\R: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\P: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\N: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\H: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\Z: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\Y: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\V: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\Q: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\O: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\M: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\G: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\X: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\U: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\K: 383497fda5ca670a06dc688443c2011b.exe File opened (read-only) \??\I: 383497fda5ca670a06dc688443c2011b.exe -
Drops file in Program Files directory 64 IoCs
Processes:
383497fda5ca670a06dc688443c2011b.exeattrib.exeattrib.exeattrib.exeattrib.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Retail-pl.xrm-ms 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\kor-kor.xml attrib.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremDemoR_BypassTrial365-ul-oob.xrm-ms 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.updatechecker.nl_zh_4.4.0.v20140623020002.jar 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-bootstrap.xml 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-modules-appui_ja.jar 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\7-Zip\Lang\lv.txt 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\WacLangPack2019Eula.txt 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipshrv.xml attrib.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\about.html 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\com.jrockit.mc.rjmx.service.exsd 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.jetty.http_8.1.14.v20131031.jar 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-swing-plaf_ja.jar 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_OEM_Perp2-pl.xrm-ms 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_Trial2-ul-oob.xrm-ms 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PublisherVL_KMS_Client-ppd.xrm-ms 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt 383497fda5ca670a06dc688443c2011b.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\#What_Wrong_With_Files#.rtf 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_altgr.xml 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4-dark_mac.css 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019R_Grace-ul-oob.xrm-ms 383497fda5ca670a06dc688443c2011b.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\#What_Wrong_With_Files#.rtf 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\config\Modules\org-netbeans-modules-profiler-heapwalker.xml 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\javaws.jar 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTrial1-ul-oob.xrm-ms 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\7-Zip\Lang\ta.txt 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\VERSION.txt 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\ModuleAutoDeps\org-openide-text.xml 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\psfontj2d.properties 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProR_Retail2-ul-phn.xrm-ms 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\StandardVL_KMS_Client-ul.xrm-ms 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp3-ppd.xrm-ms 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStdO365R_SubTrial-ppd.xrm-ms 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStdR_Retail-ul-phn.xrm-ms 383497fda5ca670a06dc688443c2011b.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\#What_Wrong_With_Files#.rtf 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\email\dummy\adobe-old-logo.jpg 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\ModuleAutoDeps\org-openide-util.xml 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\deploy\messages_zh_CN.properties 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\win\CP1252.TXT 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\MANIFEST.MF 383497fda5ca670a06dc688443c2011b.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\#What_Wrong_With_Files#.rtf 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_SubTrial4-ppd.xrm-ms 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OneNoteVL_KMS_Client-ul.xrm-ms 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProO365R_SubTest-ul-oob.xrm-ms 383497fda5ca670a06dc688443c2011b.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\images\themeless\#What_Wrong_With_Files#.rtf 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\javafx-src.zip 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.ja_5.5.0.165303\feature.properties 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-api-annotations-common.xml 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-openide-loaders_zh_CN.jar 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Blue Warm.xml 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019R_PrepidBypass-ul-oob.xrm-ms 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\#What_Wrong_With_Files#.rtf 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentR_Trial-pl.xrm-ms 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\msader15.dll.mui attrib.exe File opened for modification C:\Program Files\Common Files\System\ado\msadox28.tlb 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.apache.httpcomponents.httpclient_4.2.6.v201311072007.jar 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.console.nl_ja_4.4.0.v20140623020002.jar 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Outlook2019R_OEM_Perp-ul-oob.xrm-ms 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Outlook2019VL_MAK_AE-ppd.xrm-ms 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Stationery\ShadesOfBlue.jpg attrib.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\META-INF\ECLIPSE_.SF 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.docs.ja_5.5.0.165303.jar 383497fda5ca670a06dc688443c2011b.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\net.properties 383497fda5ca670a06dc688443c2011b.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
takeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exetakeown.exedescription pid process Token: SeTakeOwnershipPrivilege 1156 takeown.exe Token: SeTakeOwnershipPrivilege 1952 takeown.exe Token: SeTakeOwnershipPrivilege 2140 takeown.exe Token: SeTakeOwnershipPrivilege 1072 takeown.exe Token: SeTakeOwnershipPrivilege 2388 takeown.exe Token: SeTakeOwnershipPrivilege 4108 takeown.exe Token: SeTakeOwnershipPrivilege 4216 takeown.exe Token: SeTakeOwnershipPrivilege 4324 takeown.exe Token: SeTakeOwnershipPrivilege 4432 takeown.exe Token: SeTakeOwnershipPrivilege 4544 takeown.exe Token: SeTakeOwnershipPrivilege 4652 takeown.exe Token: SeTakeOwnershipPrivilege 4760 takeown.exe Token: SeTakeOwnershipPrivilege 4868 takeown.exe Token: SeTakeOwnershipPrivilege 4976 takeown.exe Token: SeTakeOwnershipPrivilege 5084 takeown.exe Token: SeTakeOwnershipPrivilege 4144 takeown.exe Token: SeTakeOwnershipPrivilege 4288 takeown.exe Token: SeTakeOwnershipPrivilege 4424 takeown.exe Token: SeTakeOwnershipPrivilege 4548 takeown.exe Token: SeTakeOwnershipPrivilege 4604 takeown.exe Token: SeTakeOwnershipPrivilege 4708 takeown.exe Token: SeTakeOwnershipPrivilege 4896 takeown.exe Token: SeTakeOwnershipPrivilege 5056 takeown.exe Token: SeTakeOwnershipPrivilege 992 takeown.exe Token: SeTakeOwnershipPrivilege 4312 takeown.exe Token: SeTakeOwnershipPrivilege 4240 takeown.exe Token: SeTakeOwnershipPrivilege 4460 takeown.exe Token: SeTakeOwnershipPrivilege 4728 takeown.exe Token: SeTakeOwnershipPrivilege 4812 takeown.exe Token: SeTakeOwnershipPrivilege 5072 takeown.exe Token: SeTakeOwnershipPrivilege 5032 takeown.exe Token: SeTakeOwnershipPrivilege 4208 takeown.exe Token: SeTakeOwnershipPrivilege 4172 takeown.exe Token: SeTakeOwnershipPrivilege 4456 takeown.exe Token: SeTakeOwnershipPrivilege 4820 takeown.exe Token: SeTakeOwnershipPrivilege 5060 takeown.exe Token: SeTakeOwnershipPrivilege 4960 takeown.exe Token: SeTakeOwnershipPrivilege 4148 takeown.exe Token: SeTakeOwnershipPrivilege 4468 takeown.exe Token: SeTakeOwnershipPrivilege 4608 takeown.exe Token: SeTakeOwnershipPrivilege 5048 takeown.exe Token: SeTakeOwnershipPrivilege 2392 takeown.exe Token: SeTakeOwnershipPrivilege 4160 takeown.exe Token: SeTakeOwnershipPrivilege 4408 takeown.exe Token: SeTakeOwnershipPrivilege 4664 takeown.exe Token: SeTakeOwnershipPrivilege 1492 takeown.exe Token: SeTakeOwnershipPrivilege 4140 takeown.exe Token: SeTakeOwnershipPrivilege 4400 takeown.exe Token: SeTakeOwnershipPrivilege 4684 takeown.exe Token: SeTakeOwnershipPrivilege 5004 takeown.exe Token: SeTakeOwnershipPrivilege 5100 takeown.exe Token: SeTakeOwnershipPrivilege 4644 takeown.exe Token: SeTakeOwnershipPrivilege 4656 takeown.exe Token: SeTakeOwnershipPrivilege 760 takeown.exe Token: SeTakeOwnershipPrivilege 4200 takeown.exe Token: SeTakeOwnershipPrivilege 4440 takeown.exe Token: SeTakeOwnershipPrivilege 4152 takeown.exe Token: SeTakeOwnershipPrivilege 4988 takeown.exe Token: SeTakeOwnershipPrivilege 4724 takeown.exe Token: SeTakeOwnershipPrivilege 2960 takeown.exe Token: SeTakeOwnershipPrivilege 5020 takeown.exe Token: SeTakeOwnershipPrivilege 4300 takeown.exe Token: SeTakeOwnershipPrivilege 4120 takeown.exe Token: SeTakeOwnershipPrivilege 4688 takeown.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
383497fda5ca670a06dc688443c2011b.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 852 wrote to memory of 2680 852 383497fda5ca670a06dc688443c2011b.exe n383497fda5ca670a06dc688443c2011b.exe PID 852 wrote to memory of 2680 852 383497fda5ca670a06dc688443c2011b.exe n383497fda5ca670a06dc688443c2011b.exe PID 852 wrote to memory of 2680 852 383497fda5ca670a06dc688443c2011b.exe n383497fda5ca670a06dc688443c2011b.exe PID 852 wrote to memory of 2364 852 383497fda5ca670a06dc688443c2011b.exe cmd.exe PID 852 wrote to memory of 2364 852 383497fda5ca670a06dc688443c2011b.exe cmd.exe PID 852 wrote to memory of 2364 852 383497fda5ca670a06dc688443c2011b.exe cmd.exe PID 2364 wrote to memory of 608 2364 cmd.exe reg.exe PID 2364 wrote to memory of 608 2364 cmd.exe reg.exe PID 2364 wrote to memory of 608 2364 cmd.exe reg.exe PID 852 wrote to memory of 3644 852 383497fda5ca670a06dc688443c2011b.exe cmd.exe PID 852 wrote to memory of 3644 852 383497fda5ca670a06dc688443c2011b.exe cmd.exe PID 852 wrote to memory of 3644 852 383497fda5ca670a06dc688443c2011b.exe cmd.exe PID 3644 wrote to memory of 2008 3644 cmd.exe attrib.exe PID 3644 wrote to memory of 2008 3644 cmd.exe attrib.exe PID 3644 wrote to memory of 2008 3644 cmd.exe attrib.exe PID 3644 wrote to memory of 1496 3644 cmd.exe cacls.exe PID 3644 wrote to memory of 1496 3644 cmd.exe cacls.exe PID 3644 wrote to memory of 1496 3644 cmd.exe cacls.exe PID 3644 wrote to memory of 2908 3644 cmd.exe takeown.exe PID 3644 wrote to memory of 2908 3644 cmd.exe takeown.exe PID 3644 wrote to memory of 2908 3644 cmd.exe takeown.exe PID 852 wrote to memory of 360 852 383497fda5ca670a06dc688443c2011b.exe cmd.exe PID 852 wrote to memory of 360 852 383497fda5ca670a06dc688443c2011b.exe cmd.exe PID 852 wrote to memory of 360 852 383497fda5ca670a06dc688443c2011b.exe cmd.exe PID 360 wrote to memory of 2120 360 cmd.exe attrib.exe PID 360 wrote to memory of 2120 360 cmd.exe attrib.exe PID 360 wrote to memory of 2120 360 cmd.exe attrib.exe PID 360 wrote to memory of 3824 360 cmd.exe cacls.exe PID 360 wrote to memory of 3824 360 cmd.exe cacls.exe PID 360 wrote to memory of 3824 360 cmd.exe cacls.exe PID 360 wrote to memory of 1156 360 cmd.exe takeown.exe PID 360 wrote to memory of 1156 360 cmd.exe takeown.exe PID 360 wrote to memory of 1156 360 cmd.exe takeown.exe PID 852 wrote to memory of 1916 852 383497fda5ca670a06dc688443c2011b.exe cmd.exe PID 852 wrote to memory of 1916 852 383497fda5ca670a06dc688443c2011b.exe cmd.exe PID 852 wrote to memory of 1916 852 383497fda5ca670a06dc688443c2011b.exe cmd.exe PID 1916 wrote to memory of 684 1916 cmd.exe attrib.exe PID 1916 wrote to memory of 684 1916 cmd.exe attrib.exe PID 1916 wrote to memory of 684 1916 cmd.exe attrib.exe PID 1916 wrote to memory of 2688 1916 cmd.exe cacls.exe PID 1916 wrote to memory of 2688 1916 cmd.exe cacls.exe PID 1916 wrote to memory of 2688 1916 cmd.exe cacls.exe PID 1916 wrote to memory of 3592 1916 cmd.exe takeown.exe PID 1916 wrote to memory of 3592 1916 cmd.exe takeown.exe PID 1916 wrote to memory of 3592 1916 cmd.exe takeown.exe PID 852 wrote to memory of 1988 852 383497fda5ca670a06dc688443c2011b.exe cmd.exe PID 852 wrote to memory of 1988 852 383497fda5ca670a06dc688443c2011b.exe cmd.exe PID 852 wrote to memory of 1988 852 383497fda5ca670a06dc688443c2011b.exe cmd.exe PID 1988 wrote to memory of 3648 1988 cmd.exe attrib.exe PID 1988 wrote to memory of 3648 1988 cmd.exe attrib.exe PID 1988 wrote to memory of 3648 1988 cmd.exe attrib.exe PID 1988 wrote to memory of 1956 1988 cmd.exe cacls.exe PID 1988 wrote to memory of 1956 1988 cmd.exe cacls.exe PID 1988 wrote to memory of 1956 1988 cmd.exe cacls.exe PID 1988 wrote to memory of 2716 1988 cmd.exe takeown.exe PID 1988 wrote to memory of 2716 1988 cmd.exe takeown.exe PID 1988 wrote to memory of 2716 1988 cmd.exe takeown.exe PID 852 wrote to memory of 2352 852 383497fda5ca670a06dc688443c2011b.exe cmd.exe PID 852 wrote to memory of 2352 852 383497fda5ca670a06dc688443c2011b.exe cmd.exe PID 852 wrote to memory of 2352 852 383497fda5ca670a06dc688443c2011b.exe cmd.exe PID 2352 wrote to memory of 1136 2352 cmd.exe attrib.exe PID 2352 wrote to memory of 1136 2352 cmd.exe attrib.exe PID 2352 wrote to memory of 1136 2352 cmd.exe attrib.exe PID 2352 wrote to memory of 988 2352 cmd.exe cacls.exe -
Views/modifies file attributes 1 TTPs 64 IoCs
Processes:
attrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exepid process 6204 attrib.exe 4580 attrib.exe 4576 attrib.exe 5248 attrib.exe 5956 attrib.exe 5788 attrib.exe 5912 attrib.exe 6356 attrib.exe 6696 attrib.exe 7224 attrib.exe 684 attrib.exe 4720 attrib.exe 4936 attrib.exe 4184 attrib.exe 5624 attrib.exe 5856 attrib.exe 4660 attrib.exe 2220 attrib.exe 4692 attrib.exe 5592 attrib.exe 5836 attrib.exe 4340 attrib.exe 2708 attrib.exe 6896 attrib.exe 6292 attrib.exe 6748 attrib.exe 2420 attrib.exe 4912 attrib.exe 4416 attrib.exe 5352 attrib.exe 6824 attrib.exe 4248 attrib.exe 4880 attrib.exe 4124 attrib.exe 4268 attrib.exe 4852 attrib.exe 6140 attrib.exe 7004 attrib.exe 4828 attrib.exe 4540 attrib.exe 4968 attrib.exe 5852 attrib.exe 5960 attrib.exe 7064 attrib.exe 5044 attrib.exe 4844 attrib.exe 4116 attrib.exe 5868 attrib.exe 6096 attrib.exe 5296 attrib.exe 6320 attrib.exe 6572 attrib.exe 2760 attrib.exe 4860 attrib.exe 4256 attrib.exe 4744 attrib.exe 5716 attrib.exe 6016 attrib.exe 5568 attrib.exe 5684 attrib.exe 4224 attrib.exe 4908 attrib.exe 5160 attrib.exe 6364 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\foo\383497fda5ca670a06dc688443c2011b.exe"C:\Users\Admin\AppData\Local\Temp\foo\383497fda5ca670a06dc688443c2011b.exe"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\AppData\Local\Temp\foo\n383497fda5ca670a06dc688443c2011b.exe"C:\Users\Admin\AppData\Local\Temp\foo\n383497fda5ca670a06dc688443c2011b.exe" -n2⤵
- Executes dropped EXE
PID:2680
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v README /t REG_SZ /d "\"%ProgramFiles%\Windows NT\Accessories\wordpad.exe\" \"C:\Users\Admin\AppData\Roaming\#What_Wrong_With_Files#.rtf"" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v README /t REG_SZ /d "\"C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe\" \"C:\Users\Admin\AppData\Roaming\#What_Wrong_With_Files#.rtf"" /f3⤵
- Adds Run key to start application
PID:608
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\ProgramData\Microsoft\Network\Downloader\qmgr.db""2⤵
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\ProgramData\Microsoft\Network\Downloader\qmgr.db"3⤵PID:2008
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\ProgramData\Microsoft\Network\Downloader\qmgr.db" /E /G Admin:F /C3⤵PID:1496
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\ProgramData\Microsoft\Network\Downloader\qmgr.db"3⤵PID:2908
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\ProgramData\Microsoft\SmsRouter\MessageStore\SmsInterceptStore.db""2⤵
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\ProgramData\Microsoft\SmsRouter\MessageStore\SmsInterceptStore.db"3⤵PID:2120
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\ProgramData\Microsoft\SmsRouter\MessageStore\SmsInterceptStore.db" /E /G Admin:F /C3⤵PID:3824
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\ProgramData\Microsoft\SmsRouter\MessageStore\SmsInterceptStore.db"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1156
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Users\All Users\Microsoft\ClickToRun\ProductReleases\55E75A3F-8E75-41E5-8961-48B2B983CD6C\en-us.16\stream.x64.en-us.db""2⤵
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Users\All Users\Microsoft\ClickToRun\ProductReleases\55E75A3F-8E75-41E5-8961-48B2B983CD6C\en-us.16\stream.x64.en-us.db"3⤵
- Views/modifies file attributes
PID:684
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\All Users\Microsoft\ClickToRun\ProductReleases\55E75A3F-8E75-41E5-8961-48B2B983CD6C\en-us.16\stream.x64.en-us.db" /E /G Admin:F /C3⤵PID:2688
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Users\All Users\Microsoft\ClickToRun\ProductReleases\55E75A3F-8E75-41E5-8961-48B2B983CD6C\en-us.16\stream.x64.en-us.db"3⤵PID:3592
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Users\All Users\Microsoft\ClickToRun\ProductReleases\55E75A3F-8E75-41E5-8961-48B2B983CD6C\x-none.16\stream.x64.x-none.db""2⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Users\All Users\Microsoft\ClickToRun\ProductReleases\55E75A3F-8E75-41E5-8961-48B2B983CD6C\x-none.16\stream.x64.x-none.db"3⤵PID:3648
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\All Users\Microsoft\ClickToRun\ProductReleases\55E75A3F-8E75-41E5-8961-48B2B983CD6C\x-none.16\stream.x64.x-none.db" /E /G Admin:F /C3⤵PID:1956
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Users\All Users\Microsoft\ClickToRun\ProductReleases\55E75A3F-8E75-41E5-8961-48B2B983CD6C\x-none.16\stream.x64.x-none.db"3⤵PID:2716
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Users\All Users\Microsoft\Network\Downloader\qmgr.db""2⤵
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Users\All Users\Microsoft\Network\Downloader\qmgr.db"3⤵PID:1136
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\All Users\Microsoft\Network\Downloader\qmgr.db" /E /G Admin:F /C3⤵PID:988
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Users\All Users\Microsoft\Network\Downloader\qmgr.db"3⤵PID:2720
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Users\All Users\Microsoft\SmsRouter\MessageStore\SmsInterceptStore.db""2⤵PID:728
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Users\All Users\Microsoft\SmsRouter\MessageStore\SmsInterceptStore.db"3⤵PID:3640
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\All Users\Microsoft\SmsRouter\MessageStore\SmsInterceptStore.db" /E /G Admin:F /C3⤵PID:2896
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Users\All Users\Microsoft\SmsRouter\MessageStore\SmsInterceptStore.db"3⤵
- Modifies file permissions
PID:3200
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\ProgramData\Microsoft\Diagnosis\osver.txt""2⤵PID:1108
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\ProgramData\Microsoft\Diagnosis\osver.txt"3⤵PID:1364
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\ProgramData\Microsoft\Diagnosis\osver.txt" /E /G Admin:F /C3⤵PID:2096
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\ProgramData\Microsoft\Diagnosis\osver.txt"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Users\All Users\Microsoft\Diagnosis\osver.txt""2⤵PID:1036
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Users\All Users\Microsoft\Diagnosis\osver.txt"3⤵
- Views/modifies file attributes
PID:2420
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\All Users\Microsoft\Diagnosis\osver.txt" /E /G Admin:F /C3⤵PID:808
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Users\All Users\Microsoft\Diagnosis\osver.txt"3⤵
- Modifies file permissions
PID:420
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\Stationery\Bears.jpg""2⤵PID:3940
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\Stationery\Bears.jpg"3⤵
- Views/modifies file attributes
PID:2760
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\Stationery\Bears.jpg" /E /G Admin:F /C3⤵PID:1016
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\Stationery\Bears.jpg"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2140
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\Stationery\Garden.jpg""2⤵PID:3604
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\Stationery\Garden.jpg"3⤵PID:1356
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\Stationery\Garden.jpg" /E /G Admin:F /C3⤵PID:2100
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\Stationery\Garden.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1072
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\Stationery\GreenBubbles.jpg""2⤵PID:2888
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\Stationery\GreenBubbles.jpg"3⤵PID:1208
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\Stationery\GreenBubbles.jpg" /E /G Admin:F /C3⤵PID:2320
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\Stationery\GreenBubbles.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\Stationery\HandPrints.jpg""2⤵PID:2396
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\Stationery\HandPrints.jpg"3⤵PID:2424
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\Stationery\HandPrints.jpg" /E /G Admin:F /C3⤵PID:3748
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\Stationery\HandPrints.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4108
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\Stationery\OrangeCircles.jpg""2⤵PID:4128
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\Stationery\OrangeCircles.jpg"3⤵PID:4176
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\Stationery\OrangeCircles.jpg" /E /G Admin:F /C3⤵PID:4196
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\Stationery\OrangeCircles.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4216
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\Stationery\Peacock.jpg""2⤵PID:4236
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\Stationery\Peacock.jpg"3⤵PID:4284
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\Stationery\Peacock.jpg" /E /G Admin:F /C3⤵PID:4304
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\Stationery\Peacock.jpg"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4324
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\Stationery\Roses.jpg""2⤵PID:4344
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\Stationery\Roses.jpg"3⤵PID:4392
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\Stationery\Roses.jpg" /E /G Admin:F /C3⤵PID:4412
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\Stationery\Roses.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4432
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\Stationery\ShadesOfBlue.jpg""2⤵PID:4452
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\Stationery\ShadesOfBlue.jpg"3⤵
- Drops file in Program Files directory
PID:4500
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\Stationery\ShadesOfBlue.jpg" /E /G Admin:F /C3⤵PID:4520
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\Stationery\ShadesOfBlue.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4544
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\Stationery\SoftBlue.jpg""2⤵PID:4564
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\Stationery\SoftBlue.jpg"3⤵PID:4612
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\Stationery\SoftBlue.jpg" /E /G Admin:F /C3⤵PID:4632
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\Stationery\SoftBlue.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4652
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\Stationery\Stars.jpg""2⤵PID:4672
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\Stationery\Stars.jpg"3⤵
- Views/modifies file attributes
PID:4720
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\Stationery\Stars.jpg" /E /G Admin:F /C3⤵PID:4740
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\Stationery\Stars.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4760
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\Bears.jpg""2⤵PID:4780
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\Bears.jpg"3⤵
- Views/modifies file attributes
PID:4828
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\Bears.jpg" /E /G Admin:F /C3⤵PID:4848
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\Bears.jpg"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4868
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\Garden.jpg""2⤵PID:4888
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\Garden.jpg"3⤵
- Views/modifies file attributes
PID:4936
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\Garden.jpg" /E /G Admin:F /C3⤵PID:4956
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\Garden.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4976
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\GreenBubbles.jpg""2⤵PID:4996
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\GreenBubbles.jpg"3⤵
- Views/modifies file attributes
PID:5044
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\GreenBubbles.jpg" /E /G Admin:F /C3⤵PID:5064
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\GreenBubbles.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:5084
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\HandPrints.jpg""2⤵PID:5104
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\HandPrints.jpg"3⤵PID:1252
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\HandPrints.jpg" /E /G Admin:F /C3⤵PID:2404
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\HandPrints.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4144
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\OrangeCircles.jpg""2⤵PID:4204
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\OrangeCircles.jpg"3⤵PID:4132
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\OrangeCircles.jpg" /E /G Admin:F /C3⤵PID:4244
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\OrangeCircles.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4288
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\Peacock.jpg""2⤵PID:4332
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\Peacock.jpg"3⤵
- Views/modifies file attributes
PID:4248
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\Peacock.jpg" /E /G Admin:F /C3⤵PID:4404
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\Peacock.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4424
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\Roses.jpg""2⤵PID:4372
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\Roses.jpg"3⤵PID:4516
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\Roses.jpg" /E /G Admin:F /C3⤵PID:4536
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\Roses.jpg"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4548
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\ShadesOfBlue.jpg""2⤵PID:4484
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\ShadesOfBlue.jpg"3⤵PID:4640
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\ShadesOfBlue.jpg" /E /G Admin:F /C3⤵PID:4668
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\ShadesOfBlue.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4604
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\SoftBlue.jpg""2⤵PID:4584
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\SoftBlue.jpg"3⤵PID:4768
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\SoftBlue.jpg" /E /G Admin:F /C3⤵PID:4716
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\SoftBlue.jpg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4708
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\Stars.jpg""2⤵PID:4796
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\Stars.jpg"3⤵
- Views/modifies file attributes
PID:4880
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\Stars.jpg" /E /G Admin:F /C3⤵PID:4784
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\Stars.jpg"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4896
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\Alphabet.xml""2⤵PID:4952
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\Alphabet.xml"3⤵PID:4920
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\Alphabet.xml" /E /G Admin:F /C3⤵PID:4900
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\Alphabet.xml"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:5056
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\ar-SA\tipresx.dll.mui""2⤵PID:5068
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\ar-SA\tipresx.dll.mui"3⤵PID:5016
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\ar-SA\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:1828
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\ar-SA\tipresx.dll.mui"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:992
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\bg-BG\tipresx.dll.mui""2⤵PID:4188
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\bg-BG\tipresx.dll.mui"3⤵PID:4164
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\bg-BG\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:4296
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\bg-BG\tipresx.dll.mui"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4312
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\Content.xml""2⤵PID:4156
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\Content.xml"3⤵PID:4420
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\Content.xml" /E /G Admin:F /C3⤵PID:4444
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\Content.xml"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4240
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\tipresx.dll.mui""2⤵PID:4280
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\tipresx.dll.mui"3⤵PID:4496
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:4364
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\tipresx.dll.mui"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\da-DK\tipresx.dll.mui""2⤵PID:4636
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\da-DK\tipresx.dll.mui"3⤵
- Views/modifies file attributes
PID:4580
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\da-DK\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:4572
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\da-DK\tipresx.dll.mui"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4728
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\de-DE\tipresx.dll.mui""2⤵PID:4712
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\de-DE\tipresx.dll.mui"3⤵
- Views/modifies file attributes
PID:4576
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\de-DE\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:4832
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\de-DE\tipresx.dll.mui"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4812
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\el-GR\tipresx.dll.mui""2⤵PID:4944
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\el-GR\tipresx.dll.mui"3⤵
- Views/modifies file attributes
PID:4844
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\el-GR\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:4924
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\el-GR\tipresx.dll.mui"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:5072
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\en-GB\tipresx.dll.mui""2⤵PID:4916
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\en-GB\tipresx.dll.mui"3⤵PID:4104
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\en-GB\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:4136
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\en-GB\tipresx.dll.mui"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:5032
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\en-US\boxed-correct.avi""2⤵PID:5024
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\en-US\boxed-correct.avi"3⤵PID:4320
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\en-US\boxed-correct.avi" /E /G Admin:F /C3⤵PID:4168
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\en-US\boxed-correct.avi"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4208
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\en-US\boxed-delete.avi""2⤵PID:4220
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\en-US\boxed-delete.avi"3⤵PID:4272
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\en-US\boxed-delete.avi" /E /G Admin:F /C3⤵PID:4360
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\en-US\boxed-delete.avi"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4172
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\en-US\boxed-join.avi""2⤵PID:4492
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\en-US\boxed-join.avi"3⤵PID:4532
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\en-US\boxed-join.avi" /E /G Admin:F /C3⤵PID:4512
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\en-US\boxed-join.avi"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4456
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\en-US\boxed-split.avi""2⤵PID:4628
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\en-US\boxed-split.avi"3⤵PID:4600
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\en-US\boxed-split.avi" /E /G Admin:F /C3⤵PID:4756
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\en-US\boxed-split.avi"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4820
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\en-US\correct.avi""2⤵PID:4816
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\en-US\correct.avi"3⤵
- Views/modifies file attributes
PID:4860
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\en-US\correct.avi" /E /G Admin:F /C3⤵PID:5012
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\en-US\correct.avi"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:5060
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\en-US\delete.avi""2⤵PID:4856
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\en-US\delete.avi"3⤵
- Views/modifies file attributes
PID:2220
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\en-US\delete.avi" /E /G Admin:F /C3⤵PID:2684
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\en-US\delete.avi"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\en-US\FlickLearningWizard.exe.mui""2⤵PID:4932
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\en-US\FlickLearningWizard.exe.mui"3⤵PID:2508
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\en-US\FlickLearningWizard.exe.mui" /E /G Admin:F /C3⤵PID:5108
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\en-US\FlickLearningWizard.exe.mui"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4148
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\en-US\InkObj.dll.mui""2⤵PID:4448
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\en-US\InkObj.dll.mui"3⤵PID:4556
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\en-US\InkObj.dll.mui" /E /G Admin:F /C3⤵PID:4436
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\en-US\InkObj.dll.mui"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\en-US\InputPersonalization.exe.mui""2⤵PID:4524
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\en-US\InputPersonalization.exe.mui"3⤵
- Views/modifies file attributes
PID:4540
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\en-US\InputPersonalization.exe.mui" /E /G Admin:F /C3⤵PID:4368
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\en-US\InputPersonalization.exe.mui"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4608
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\en-US\IPSEventLogMsg.dll.mui""2⤵PID:4732
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\en-US\IPSEventLogMsg.dll.mui"3⤵PID:4596
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\en-US\IPSEventLogMsg.dll.mui" /E /G Admin:F /C3⤵PID:4892
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\en-US\IPSEventLogMsg.dll.mui"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:5048
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\en-US\IpsMigrationPlugin.dll.mui""2⤵PID:5080
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\en-US\IpsMigrationPlugin.dll.mui"3⤵PID:4884
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\en-US\IpsMigrationPlugin.dll.mui" /E /G Admin:F /C3⤵PID:5092
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\en-US\IpsMigrationPlugin.dll.mui"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2392
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\en-US\join.avi""2⤵PID:4928
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\en-US\join.avi"3⤵
- Views/modifies file attributes
PID:4124
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\en-US\join.avi" /E /G Admin:F /C3⤵PID:4252
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\en-US\join.avi"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4160
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\en-US\micaut.dll.mui""2⤵PID:4228
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\en-US\micaut.dll.mui"3⤵
- Views/modifies file attributes
PID:4256
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\en-US\micaut.dll.mui" /E /G Admin:F /C3⤵PID:4552
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\en-US\micaut.dll.mui"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4408
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\en-US\mip.exe.mui""2⤵PID:4624
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\en-US\mip.exe.mui"3⤵PID:4676
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\en-US\mip.exe.mui" /E /G Admin:F /C3⤵PID:4620
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\en-US\mip.exe.mui"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4664
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\en-US\mshwLatin.dll.mui""2⤵PID:3568
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\en-US\mshwLatin.dll.mui"3⤵PID:4588
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\en-US\mshwLatin.dll.mui" /E /G Admin:F /C3⤵PID:4792
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\en-US\mshwLatin.dll.mui"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\en-US\rtscom.dll.mui""2⤵PID:5036
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\en-US\rtscom.dll.mui"3⤵PID:4736
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\en-US\rtscom.dll.mui" /E /G Admin:F /C3⤵PID:5000
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\en-US\rtscom.dll.mui"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4140
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\en-US\ShapeCollector.exe.mui""2⤵PID:4100
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\en-US\ShapeCollector.exe.mui"3⤵
- Views/modifies file attributes
PID:4268
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\en-US\ShapeCollector.exe.mui" /E /G Admin:F /C3⤵PID:4212
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\en-US\ShapeCollector.exe.mui"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4400
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\en-US\split.avi""2⤵PID:4232
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\en-US\split.avi"3⤵PID:4472
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\en-US\split.avi" /E /G Admin:F /C3⤵PID:4840
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\en-US\split.avi"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4684
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\en-US\tabskb.dll.mui""2⤵PID:4380
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\en-US\tabskb.dll.mui"3⤵
- Views/modifies file attributes
PID:4744
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\en-US\tabskb.dll.mui" /E /G Admin:F /C3⤵PID:4680
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\en-US\tabskb.dll.mui"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:5004
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\en-US\TabTip.exe.mui""2⤵PID:4984
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\en-US\TabTip.exe.mui"3⤵
- Views/modifies file attributes
PID:4224
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\en-US\TabTip.exe.mui" /E /G Admin:F /C3⤵PID:4980
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\en-US\TabTip.exe.mui"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:5100
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\en-US\TipRes.dll.mui""2⤵PID:4336
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\en-US\TipRes.dll.mui"3⤵PID:5116
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\en-US\TipRes.dll.mui" /E /G Admin:F /C3⤵PID:4112
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\en-US\TipRes.dll.mui"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4644
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\en-US\tipresx.dll.mui""2⤵PID:4772
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\en-US\tipresx.dll.mui"3⤵PID:4264
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\en-US\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:5028
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\en-US\tipresx.dll.mui"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4656
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\en-US\TipTsf.dll.mui""2⤵PID:5052
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\en-US\TipTsf.dll.mui"3⤵PID:4804
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\en-US\TipTsf.dll.mui" /E /G Admin:F /C3⤵PID:5008
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\en-US\TipTsf.dll.mui"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:760
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\es-ES\tipresx.dll.mui""2⤵PID:5096
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\es-ES\tipresx.dll.mui"3⤵
- Views/modifies file attributes
PID:4340
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\es-ES\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:4700
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\es-ES\tipresx.dll.mui"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:4200
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\es-MX\tipresx.dll.mui""2⤵PID:4328
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\es-MX\tipresx.dll.mui"3⤵
- Views/modifies file attributes
PID:4968
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\es-MX\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:4356
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\es-MX\tipresx.dll.mui"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4440
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\et-EE\tipresx.dll.mui""2⤵PID:5112
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\et-EE\tipresx.dll.mui"3⤵
- Views/modifies file attributes
PID:4692
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\et-EE\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:4508
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\et-EE\tipresx.dll.mui"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4152
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\fi-FI\tipresx.dll.mui""2⤵PID:4824
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\fi-FI\tipresx.dll.mui"3⤵PID:4904
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\fi-FI\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:4776
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\fi-FI\tipresx.dll.mui"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4988
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\FlickAnimation.avi""2⤵PID:4560
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\FlickAnimation.avi"3⤵
- Views/modifies file attributes
PID:4912
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\FlickAnimation.avi" /E /G Admin:F /C3⤵PID:4696
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\FlickAnimation.avi"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4724
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\fr-CA\tipresx.dll.mui""2⤵PID:4808
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\fr-CA\tipresx.dll.mui"3⤵PID:4872
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\fr-CA\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:5088
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\fr-CA\tipresx.dll.mui"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\fr-FR\tipresx.dll.mui""2⤵PID:2224
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\fr-FR\tipresx.dll.mui"3⤵PID:4348
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\fr-FR\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:4800
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\fr-FR\tipresx.dll.mui"3⤵
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:5020
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\auxbase.xml""2⤵PID:4592
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\auxbase.xml"3⤵PID:892
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\auxbase.xml" /E /G Admin:F /C3⤵PID:4276
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\auxbase.xml"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4300
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad.xml""2⤵PID:4864
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad.xml"3⤵PID:4384
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad.xml" /E /G Admin:F /C3⤵PID:4260
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad.xml"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4120
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\insertbase.xml""2⤵PID:1096
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\insertbase.xml"3⤵
- Views/modifies file attributes
PID:4852
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\insertbase.xml" /E /G Admin:F /C3⤵PID:4396
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\insertbase.xml"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4688
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert.xml""2⤵PID:4308
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert.xml"3⤵PID:4428
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert.xml" /E /G Admin:F /C3⤵PID:4192
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert.xml"3⤵PID:4464
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\ea.xml""2⤵PID:4948
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\ea.xml"3⤵PID:3308
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\ea.xml" /E /G Admin:F /C3⤵PID:4940
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\ea.xml"3⤵
- Modifies file permissions
PID:4504
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\keypadbase.xml""2⤵PID:4764
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\keypadbase.xml"3⤵PID:4788
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\keypadbase.xml" /E /G Admin:F /C3⤵PID:4836
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\keypadbase.xml"3⤵
- Modifies file permissions
PID:4292
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\kor-kor.xml""2⤵PID:4964
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\kor-kor.xml"3⤵
- Drops file in Program Files directory
PID:4704
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\kor-kor.xml" /E /G Admin:F /C3⤵PID:4316
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\kor-kor.xml"3⤵PID:4992
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad.xml""2⤵PID:4388
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad.xml"3⤵
- Views/modifies file attributes
PID:4416
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad.xml" /E /G Admin:F /C3⤵PID:4480
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad.xml"3⤵PID:5076
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base.xml""2⤵PID:5040
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base.xml"3⤵
- Views/modifies file attributes
PID:4116
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base.xml" /E /G Admin:F /C3⤵PID:4648
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base.xml"3⤵
- Modifies file permissions
PID:4748
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\baseAltGr_rtl.xml""2⤵PID:4488
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\baseAltGr_rtl.xml"3⤵
- Views/modifies file attributes
PID:4184
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\baseAltGr_rtl.xml" /E /G Admin:F /C3⤵PID:4180
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\baseAltGr_rtl.xml"3⤵PID:4376
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_altgr.xml""2⤵PID:5128
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_altgr.xml"3⤵PID:5176
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_altgr.xml" /E /G Admin:F /C3⤵PID:5196
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_altgr.xml"3⤵PID:5216
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_ca.xml""2⤵PID:5236
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_ca.xml"3⤵PID:5284
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_ca.xml" /E /G Admin:F /C3⤵PID:5304
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_ca.xml"3⤵PID:5324
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_heb.xml""2⤵PID:5344
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_heb.xml"3⤵PID:5392
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_heb.xml" /E /G Admin:F /C3⤵PID:5412
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_heb.xml"3⤵PID:5432
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_jpn.xml""2⤵PID:5452
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_jpn.xml"3⤵PID:5500
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_jpn.xml" /E /G Admin:F /C3⤵PID:5520
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_jpn.xml"3⤵PID:5540
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_kor.xml""2⤵PID:5560
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_kor.xml"3⤵PID:5608
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_kor.xml" /E /G Admin:F /C3⤵PID:5628
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_kor.xml"3⤵PID:5648
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_rtl.xml""2⤵PID:5668
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_rtl.xml"3⤵
- Views/modifies file attributes
PID:5716
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_rtl.xml" /E /G Admin:F /C3⤵PID:5736
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_rtl.xml"3⤵PID:5756
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\ja-jp.xml""2⤵PID:5776
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\ja-jp.xml"3⤵PID:5824
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\ja-jp.xml" /E /G Admin:F /C3⤵PID:5844
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\ja-jp.xml"3⤵PID:5864
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\ko-kr.xml""2⤵PID:5884
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\ko-kr.xml"3⤵PID:5932
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\ko-kr.xml" /E /G Admin:F /C3⤵PID:5952
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\ko-kr.xml"3⤵
- Modifies file permissions
PID:5972
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\zh-changjei.xml""2⤵PID:5992
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\zh-changjei.xml"3⤵PID:6040
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\zh-changjei.xml" /E /G Admin:F /C3⤵PID:6060
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\zh-changjei.xml"3⤵
- Modifies file permissions
PID:6080
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\zh-dayi.xml""2⤵PID:6100
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\zh-dayi.xml"3⤵
- Views/modifies file attributes
PID:4908
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\zh-dayi.xml" /E /G Admin:F /C3⤵PID:4528
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\zh-dayi.xml"3⤵PID:4352
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\zh-phonetic.xml""2⤵PID:5180
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\zh-phonetic.xml"3⤵
- Views/modifies file attributes
PID:5160
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\zh-phonetic.xml" /E /G Admin:F /C3⤵PID:5148
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\zh-phonetic.xml"3⤵PID:5288
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main.xml""2⤵PID:5308
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main.xml"3⤵PID:5272
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main.xml" /E /G Admin:F /C3⤵PID:5400
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main.xml"3⤵PID:5428
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\oskclearuibase.xml""2⤵PID:5436
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\oskclearuibase.xml"3⤵PID:5468
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\oskclearuibase.xml" /E /G Admin:F /C3⤵PID:5528
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\oskclearuibase.xml"3⤵PID:5556
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui.xml""2⤵PID:5484
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui.xml"3⤵
- Views/modifies file attributes
PID:5624
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui.xml" /E /G Admin:F /C3⤵PID:5656
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui.xml"3⤵
- Modifies file permissions
PID:2712
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\oskmenubase.xml""2⤵PID:5564
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\oskmenubase.xml"3⤵PID:5752
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\oskmenubase.xml" /E /G Admin:F /C3⤵PID:5760
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\oskmenubase.xml"3⤵PID:5672
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu.xml""2⤵PID:5680
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu.xml"3⤵
- Views/modifies file attributes
PID:5868
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu.xml" /E /G Admin:F /C3⤵PID:5808
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu.xml"3⤵PID:5796
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav\osknavbase.xml""2⤵PID:5936
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav\osknavbase.xml"3⤵PID:5928
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav\osknavbase.xml" /E /G Admin:F /C3⤵PID:5920
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav\osknavbase.xml"3⤵
- Modifies file permissions
PID:6048
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav.xml""2⤵PID:6076
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav.xml"3⤵
- Views/modifies file attributes
PID:6016
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav.xml" /E /G Admin:F /C3⤵PID:6116
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav.xml"3⤵PID:4972
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad\osknumpadbase.xml""2⤵PID:5188
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad\osknumpadbase.xml"3⤵PID:5204
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad\osknumpadbase.xml" /E /G Admin:F /C3⤵PID:5164
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad\osknumpadbase.xml"3⤵PID:5300
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad.xml""2⤵PID:5232
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad.xml"3⤵
- Views/modifies file attributes
PID:5352
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad.xml" /E /G Admin:F /C3⤵PID:5408
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad.xml"3⤵PID:5280
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\oskpredbase.xml""2⤵PID:5264
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\oskpredbase.xml"3⤵PID:5524
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\oskpredbase.xml" /E /G Admin:F /C3⤵PID:5480
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\oskpredbase.xml"3⤵
- Modifies file permissions
PID:5444
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred.xml""2⤵PID:5456
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred.xml"3⤵PID:5588
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred.xml" /E /G Admin:F /C3⤵PID:5576
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred.xml"3⤵PID:5476
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\ea-sym.xml""2⤵PID:5764
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\ea-sym.xml"3⤵PID:5728
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\ea-sym.xml" /E /G Admin:F /C3⤵PID:5720
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\ea-sym.xml"3⤵
- Modifies file permissions
PID:5804
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\ja-jp-sym.xml""2⤵PID:5800
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\ja-jp-sym.xml"3⤵
- Views/modifies file attributes
PID:5856
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\ja-jp-sym.xml" /E /G Admin:F /C3⤵PID:5924
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\ja-jp-sym.xml"3⤵
- Modifies file permissions
PID:6008
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\symbase.xml""2⤵PID:6044
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\symbase.xml"3⤵
- Views/modifies file attributes
PID:6096
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\symbase.xml" /E /G Admin:F /C3⤵PID:4876
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\symbase.xml"3⤵
- Modifies file permissions
PID:2260
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols.xml""2⤵PID:6032
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols.xml"3⤵PID:5168
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols.xml" /E /G Admin:F /C3⤵PID:5244
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols.xml"3⤵PID:6104
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\he-IL\tipresx.dll.mui""2⤵PID:6132
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\he-IL\tipresx.dll.mui"3⤵PID:5424
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\he-IL\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:5260
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\he-IL\tipresx.dll.mui"3⤵PID:5220
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\hr-HR\tipresx.dll.mui""2⤵PID:5336
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\hr-HR\tipresx.dll.mui"3⤵PID:5348
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\hr-HR\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:5532
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\hr-HR\tipresx.dll.mui"3⤵PID:5340
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\hu-HU\tipresx.dll.mui""2⤵PID:5620
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\hu-HU\tipresx.dll.mui"3⤵
- Views/modifies file attributes
PID:2708
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\hu-HU\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:5632
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\hu-HU\tipresx.dll.mui"3⤵PID:5584
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\hwrcommonlm.dat""2⤵PID:5828
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\hwrcommonlm.dat"3⤵PID:5704
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\hwrcommonlm.dat" /E /G Admin:F /C3⤵PID:5832
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\hwrcommonlm.dat"3⤵PID:5948
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\hwrenclm.dat""2⤵PID:5904
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\hwrenclm.dat"3⤵PID:5940
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\hwrenclm.dat" /E /G Admin:F /C3⤵PID:6108
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\hwrenclm.dat"3⤵
- Modifies file permissions
PID:1100
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\hwrlatinlm.dat""2⤵PID:6064
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\hwrlatinlm.dat"3⤵PID:5208
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\hwrlatinlm.dat" /E /G Admin:F /C3⤵PID:5312
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\hwrlatinlm.dat"3⤵PID:6120
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\hwrusalm.dat""2⤵PID:6036
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\hwrusalm.dat"3⤵
- Views/modifies file attributes
PID:5248
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\hwrusalm.dat" /E /G Admin:F /C3⤵PID:5200
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\hwrusalm.dat"3⤵PID:5420
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\hwrusash.dat""2⤵PID:5124
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\hwrusash.dat"3⤵
- Views/modifies file attributes
PID:5592
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\hwrusash.dat" /E /G Admin:F /C3⤵PID:5368
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\hwrusash.dat"3⤵
- Modifies file permissions
PID:5544
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\ipsar.xml""2⤵PID:5660
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\ipsar.xml"3⤵PID:5604
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\ipsar.xml" /E /G Admin:F /C3⤵PID:5740
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\ipsar.xml"3⤵PID:5708
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\ipscat.xml""2⤵PID:5840
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\ipscat.xml"3⤵PID:5700
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\ipscat.xml" /E /G Admin:F /C3⤵PID:5872
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\ipscat.xml"3⤵
- Modifies file permissions
PID:4752
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\ipschs.xml""2⤵PID:4476
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\ipschs.xml"3⤵
- Views/modifies file attributes
PID:5956
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\ipschs.xml" /E /G Admin:F /C3⤵PID:5140
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\ipschs.xml"3⤵PID:5152
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\ipscht.xml""2⤵PID:6092
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\ipscht.xml"3⤵PID:5184
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\ipscht.xml" /E /G Admin:F /C3⤵PID:5228
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\ipscht.xml"3⤵PID:5276
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\ipscsy.xml""2⤵PID:5156
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\ipscsy.xml"3⤵PID:5460
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\ipscsy.xml" /E /G Admin:F /C3⤵PID:5616
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\ipscsy.xml"3⤵
- Modifies file permissions
PID:5552
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\ipsdan.xml""2⤵PID:5652
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\ipsdan.xml"3⤵PID:5712
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\ipsdan.xml" /E /G Admin:F /C3⤵PID:5792
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\ipsdan.xml"3⤵PID:5696
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\ipsdeu.xml""2⤵PID:5812
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\ipsdeu.xml"3⤵PID:5748
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\ipsdeu.xml" /E /G Admin:F /C3⤵PID:5888
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\ipsdeu.xml"3⤵
- Modifies file permissions
PID:6052
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\ipsel.xml""2⤵PID:5192
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\ipsel.xml"3⤵
- Views/modifies file attributes
PID:5852
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\ipsel.xml" /E /G Admin:F /C3⤵PID:5440
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\ipsel.xml"3⤵PID:6136
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\ipsen.xml""2⤵PID:5268
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\ipsen.xml"3⤵PID:5496
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\ipsen.xml" /E /G Admin:F /C3⤵PID:5640
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\ipsen.xml"3⤵
- Modifies file permissions
PID:5508
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\ipsesp.xml""2⤵PID:5380
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\ipsesp.xml"3⤵
- Views/modifies file attributes
PID:5788
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\ipsesp.xml" /E /G Admin:F /C3⤵PID:5916
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\ipsesp.xml"3⤵PID:492
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\ipsfin.xml""2⤵PID:5492
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\ipsfin.xml"3⤵PID:5896
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\ipsfin.xml" /E /G Admin:F /C3⤵PID:5688
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\ipsfin.xml"3⤵
- Modifies file permissions
PID:6004
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\ipsfra.xml""2⤵PID:5136
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\ipsfra.xml"3⤵PID:5404
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\ipsfra.xml" /E /G Admin:F /C3⤵PID:6068
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\ipsfra.xml"3⤵PID:5292
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\ipshe.xml""2⤵PID:5536
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\ipshe.xml"3⤵PID:6072
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\ipshe.xml" /E /G Admin:F /C3⤵PID:5212
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\ipshe.xml"3⤵PID:5664
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\ipshi.xml""2⤵PID:5780
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\ipshi.xml"3⤵PID:5732
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\ipshi.xml" /E /G Admin:F /C3⤵PID:5172
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\ipshi.xml"3⤵PID:5580
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\ipshrv.xml""2⤵PID:4616
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\ipshrv.xml"3⤵
- Drops file in Program Files directory
- Views/modifies file attributes
PID:5912
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\ipshrv.xml" /E /G Admin:F /C3⤵PID:6056
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\ipshrv.xml"3⤵PID:5464
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\ipsid.xml""2⤵PID:5328
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\ipsid.xml"3⤵
- Views/modifies file attributes
PID:5960
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\ipsid.xml" /E /G Admin:F /C3⤵PID:5636
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\ipsid.xml"3⤵
- Modifies file permissions
PID:5944
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\ipsita.xml""2⤵PID:5356
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\ipsita.xml"3⤵
- Views/modifies file attributes
PID:5296
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\ipsita.xml" /E /G Admin:F /C3⤵PID:5600
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\ipsita.xml"3⤵
- Modifies file permissions
PID:5772
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\ipsjpn.xml""2⤵PID:5252
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\ipsjpn.xml"3⤵PID:5224
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\ipsjpn.xml" /E /G Admin:F /C3⤵PID:6012
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\ipsjpn.xml"3⤵
- Modifies file permissions
PID:376
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\ipskor.xml""2⤵PID:5316
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\ipskor.xml"3⤵PID:5504
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\ipskor.xml" /E /G Admin:F /C3⤵PID:5360
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\ipskor.xml"3⤵PID:5144
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\ipsnld.xml""2⤵PID:6024
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\ipsnld.xml"3⤵
- Views/modifies file attributes
PID:5568
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\ipsnld.xml" /E /G Admin:F /C3⤵PID:5980
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\ipsnld.xml"3⤵PID:5572
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\ipsnor.xml""2⤵PID:6124
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\ipsnor.xml"3⤵PID:5396
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\ipsnor.xml" /E /G Admin:F /C3⤵PID:6088
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\ipsnor.xml"3⤵PID:6000
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\ipsplk.xml""2⤵PID:5676
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\ipsplk.xml"3⤵PID:5744
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\ipsplk.xml" /E /G Admin:F /C3⤵PID:5448
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\ipsplk.xml"3⤵PID:6028
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\ipsptb.xml""2⤵PID:5596
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\ipsptb.xml"3⤵PID:5548
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\ipsptb.xml" /E /G Admin:F /C3⤵PID:5964
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\ipsptb.xml"3⤵PID:5644
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\ipsptg.xml""2⤵PID:5996
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\ipsptg.xml"3⤵
- Views/modifies file attributes
PID:5836
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\ipsptg.xml" /E /G Admin:F /C3⤵PID:5472
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\ipsptg.xml"3⤵
- Modifies file permissions
PID:5816
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\ipsrom.xml""2⤵PID:5976
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\ipsrom.xml"3⤵PID:5372
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\ipsrom.xml" /E /G Admin:F /C3⤵PID:536
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\ipsrom.xml"3⤵
- Modifies file permissions
PID:5900
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\ipsrus.xml""2⤵PID:5848
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\ipsrus.xml"3⤵PID:5784
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\ipsrus.xml" /E /G Admin:F /C3⤵PID:5988
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\ipsrus.xml"3⤵PID:5332
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\ipssrb.xml""2⤵PID:5376
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\ipssrb.xml"3⤵PID:5880
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\ipssrb.xml" /E /G Admin:F /C3⤵PID:5724
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\ipssrb.xml"3⤵PID:5908
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\ipssrl.xml""2⤵PID:6020
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\ipssrl.xml"3⤵PID:6084
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\ipssrl.xml" /E /G Admin:F /C3⤵PID:5384
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\ipssrl.xml"3⤵PID:5768
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\ipssve.xml""2⤵PID:5256
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\ipssve.xml"3⤵PID:5860
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\ipssve.xml" /E /G Admin:F /C3⤵PID:5516
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\ipssve.xml"3⤵PID:5612
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\ipstr.xml""2⤵PID:5876
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\ipstr.xml"3⤵PID:5512
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\ipstr.xml" /E /G Admin:F /C3⤵PID:5132
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\ipstr.xml"3⤵PID:4568
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\it-IT\tipresx.dll.mui""2⤵PID:5892
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\it-IT\tipresx.dll.mui"3⤵PID:5692
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\it-IT\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:5416
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\it-IT\tipresx.dll.mui"3⤵
- Modifies file permissions
PID:6128
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\ja-JP\tipresx.dll.mui""2⤵PID:5488
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\ja-JP\tipresx.dll.mui"3⤵
- Views/modifies file attributes
PID:6140
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\ja-JP\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:6160
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\ja-JP\tipresx.dll.mui"3⤵PID:6180
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\ko-KR\tipresx.dll.mui""2⤵PID:6200
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\ko-KR\tipresx.dll.mui"3⤵PID:6248
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\ko-KR\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:6268
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\ko-KR\tipresx.dll.mui"3⤵PID:6288
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\LanguageModel\chstic.dgml""2⤵PID:6308
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\LanguageModel\chstic.dgml"3⤵
- Views/modifies file attributes
PID:6356
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\LanguageModel\chstic.dgml" /E /G Admin:F /C3⤵PID:6376
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\LanguageModel\chstic.dgml"3⤵
- Modifies file permissions
PID:6396
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\lt-LT\tipresx.dll.mui""2⤵PID:6416
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\lt-LT\tipresx.dll.mui"3⤵PID:6464
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\lt-LT\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:6484
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\lt-LT\tipresx.dll.mui"3⤵
- Modifies file permissions
PID:6504
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\lv-LV\tipresx.dll.mui""2⤵PID:6524
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\lv-LV\tipresx.dll.mui"3⤵
- Views/modifies file attributes
PID:6572
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\lv-LV\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:6592
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\lv-LV\tipresx.dll.mui"3⤵PID:6612
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\nb-NO\tipresx.dll.mui""2⤵PID:6632
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\nb-NO\tipresx.dll.mui"3⤵PID:6680
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\nb-NO\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:6700
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\nb-NO\tipresx.dll.mui"3⤵
- Modifies file permissions
PID:6720
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\nl-NL\tipresx.dll.mui""2⤵PID:6740
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\nl-NL\tipresx.dll.mui"3⤵PID:6788
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\nl-NL\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:6808
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\nl-NL\tipresx.dll.mui"3⤵
- Modifies file permissions
PID:6828
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\pl-PL\tipresx.dll.mui""2⤵PID:6848
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\pl-PL\tipresx.dll.mui"3⤵
- Views/modifies file attributes
PID:6896
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\pl-PL\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:6916
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\pl-PL\tipresx.dll.mui"3⤵PID:6936
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\pt-BR\tipresx.dll.mui""2⤵PID:6956
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\pt-BR\tipresx.dll.mui"3⤵
- Views/modifies file attributes
PID:7004
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\pt-BR\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:7020
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\pt-BR\tipresx.dll.mui"3⤵
- Modifies file permissions
PID:7040
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\pt-PT\tipresx.dll.mui""2⤵PID:7060
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\pt-PT\tipresx.dll.mui"3⤵PID:7108
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\pt-PT\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:7128
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\pt-PT\tipresx.dll.mui"3⤵PID:7148
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\ro-RO\tipresx.dll.mui""2⤵PID:6148
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\ro-RO\tipresx.dll.mui"3⤵
- Views/modifies file attributes
PID:4660
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\ro-RO\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:5320
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\ro-RO\tipresx.dll.mui"3⤵
- Modifies file permissions
PID:6216
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\ru-RU\tipresx.dll.mui""2⤵PID:6276
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\ru-RU\tipresx.dll.mui"3⤵
- Views/modifies file attributes
PID:6204
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\ru-RU\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:6316
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\ru-RU\tipresx.dll.mui"3⤵
- Modifies file permissions
PID:6360
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\sk-SK\tipresx.dll.mui""2⤵PID:6404
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\sk-SK\tipresx.dll.mui"3⤵
- Views/modifies file attributes
PID:6320
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\sk-SK\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:6476
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\sk-SK\tipresx.dll.mui"3⤵PID:6488
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\sl-SI\tipresx.dll.mui""2⤵PID:6460
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\sl-SI\tipresx.dll.mui"3⤵PID:6576
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\sl-SI\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:6604
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\sl-SI\tipresx.dll.mui"3⤵
- Modifies file permissions
PID:6624
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\sr-Latn-RS\tipresx.dll.mui""2⤵PID:6528
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\sr-Latn-RS\tipresx.dll.mui"3⤵PID:6716
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\sr-Latn-RS\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:6724
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\sr-Latn-RS\tipresx.dll.mui"3⤵PID:6664
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\sv-SE\tipresx.dll.mui""2⤵PID:6644
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\sv-SE\tipresx.dll.mui"3⤵PID:6844
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\sv-SE\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:6780
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\sv-SE\tipresx.dll.mui"3⤵PID:6772
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\th-TH\tipresx.dll.mui""2⤵PID:6900
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\th-TH\tipresx.dll.mui"3⤵PID:6892
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\th-TH\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:6884
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\th-TH\tipresx.dll.mui"3⤵PID:7012
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\tr-TR\tipresx.dll.mui""2⤵PID:7032
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\tr-TR\tipresx.dll.mui"3⤵PID:6992
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\tr-TR\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:7116
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\tr-TR\tipresx.dll.mui"3⤵PID:7144
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\uk-UA\tipresx.dll.mui""2⤵PID:7152
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\uk-UA\tipresx.dll.mui"3⤵PID:6168
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\uk-UA\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:5820
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\uk-UA\tipresx.dll.mui"3⤵PID:6260
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\zh-CN\tipresx.dll.mui""2⤵PID:6188
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\zh-CN\tipresx.dll.mui"3⤵PID:6212
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\zh-CN\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:6392
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\zh-CN\tipresx.dll.mui"3⤵
- Modifies file permissions
PID:6240
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\ink\zh-TW\tipresx.dll.mui""2⤵PID:6244
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\ink\zh-TW\tipresx.dll.mui"3⤵PID:6468
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\ink\zh-TW\tipresx.dll.mui" /E /G Admin:F /C3⤵PID:6312
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\ink\zh-TW\tipresx.dll.mui"3⤵PID:6348
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\msinfo32.exe.mui""2⤵PID:6420
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\msinfo32.exe.mui"3⤵PID:6556
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\msinfo32.exe.mui" /E /G Admin:F /C3⤵PID:6444
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\msinfo32.exe.mui"3⤵
- Modifies file permissions
PID:6560
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\Stationery\Bears.htm""2⤵PID:6712
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\Stationery\Bears.htm"3⤵
- Views/modifies file attributes
PID:6696
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\Stationery\Bears.htm" /E /G Admin:F /C3⤵PID:6544
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\Stationery\Bears.htm"3⤵PID:6768
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\Stationery\Garden.htm""2⤵PID:6776
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\Stationery\Garden.htm"3⤵
- Views/modifies file attributes
PID:6824
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\Stationery\Garden.htm" /E /G Admin:F /C3⤵PID:6868
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\Stationery\Garden.htm"3⤵PID:6872
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\Stationery\Green Bubbles.htm""2⤵PID:6944
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\Stationery\Green Bubbles.htm"3⤵PID:6976
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\Stationery\Green Bubbles.htm" /E /G Admin:F /C3⤵PID:7120
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\Stationery\Green Bubbles.htm"3⤵PID:7156
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\Stationery\Hand Prints.htm""2⤵PID:7024
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\Stationery\Hand Prints.htm"3⤵PID:6252
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\Stationery\Hand Prints.htm" /E /G Admin:F /C3⤵PID:6256
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\Stationery\Hand Prints.htm"3⤵PID:7096
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\Stationery\Orange Circles.htm""2⤵PID:7104
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\Stationery\Orange Circles.htm"3⤵
- Views/modifies file attributes
PID:6292
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\Stationery\Orange Circles.htm" /E /G Admin:F /C3⤵PID:6296
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\Stationery\Orange Circles.htm"3⤵PID:6176
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\Stationery\Peacock.htm""2⤵PID:6508
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\Stationery\Peacock.htm"3⤵PID:6500
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\Stationery\Peacock.htm" /E /G Admin:F /C3⤵PID:6492
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\Stationery\Peacock.htm"3⤵
- Modifies file permissions
PID:6436
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\Stationery\Roses.htm""2⤵PID:6456
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\Stationery\Roses.htm"3⤵PID:6616
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\Stationery\Roses.htm" /E /G Admin:F /C3⤵PID:6732
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\Stationery\Roses.htm"3⤵PID:6792
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\Stationery\Shades of Blue.htm""2⤵PID:6744
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\Stationery\Shades of Blue.htm"3⤵PID:6904
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\Stationery\Shades of Blue.htm" /E /G Admin:F /C3⤵PID:6932
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\Stationery\Shades of Blue.htm"3⤵PID:6972
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\Stationery\Soft Blue.htm""2⤵PID:6820
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\Stationery\Soft Blue.htm"3⤵PID:7068
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\Stationery\Soft Blue.htm" /E /G Admin:F /C3⤵PID:7164
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\Stationery\Soft Blue.htm"3⤵PID:7000
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\microsoft shared\Stationery\Stars.htm""2⤵PID:6876
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\microsoft shared\Stationery\Stars.htm"3⤵PID:6164
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\microsoft shared\Stationery\Stars.htm" /E /G Admin:F /C3⤵PID:7160
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\microsoft shared\Stationery\Stars.htm"3⤵PID:6112
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\Services\verisign.bmp""2⤵PID:7052
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\Services\verisign.bmp"3⤵PID:6172
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\Services\verisign.bmp" /E /G Admin:F /C3⤵PID:6300
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\Services\verisign.bmp"3⤵PID:6372
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\System\ado\adojavas.inc""2⤵PID:6496
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\ado\adojavas.inc"3⤵PID:6472
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\ado\adojavas.inc" /E /G Admin:F /C3⤵PID:6328
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\ado\adojavas.inc"3⤵PID:6620
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\System\ado\adovbs.inc""2⤵PID:6692
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\ado\adovbs.inc"3⤵PID:6736
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\ado\adovbs.inc" /E /G Admin:F /C3⤵PID:6708
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\ado\adovbs.inc"3⤵PID:6964
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\System\ado\en-US\msader15.dll.mui""2⤵PID:7016
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\ado\en-US\msader15.dll.mui"3⤵
- Drops file in Program Files directory
PID:6800
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\ado\en-US\msader15.dll.mui" /E /G Admin:F /C3⤵PID:7140
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\ado\en-US\msader15.dll.mui"3⤵PID:6968
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\System\ado\msado20.tlb""2⤵PID:7076
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\ado\msado20.tlb"3⤵
- Views/modifies file attributes
PID:7064
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\ado\msado20.tlb" /E /G Admin:F /C3⤵PID:7080
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\ado\msado20.tlb"3⤵
- Modifies file permissions
PID:7084
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\System\ado\msado21.tlb""2⤵PID:7056
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\ado\msado21.tlb"3⤵PID:6324
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\ado\msado21.tlb" /E /G Admin:F /C3⤵PID:6412
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\ado\msado21.tlb"3⤵
- Modifies file permissions
PID:6196
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\System\ado\msado25.tlb""2⤵PID:6480
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\ado\msado25.tlb"3⤵PID:6568
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\ado\msado25.tlb" /E /G Admin:F /C3⤵PID:6428
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\ado\msado25.tlb"3⤵
- Modifies file permissions
PID:6400
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\System\ado\msado26.tlb""2⤵PID:6704
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\ado\msado26.tlb"3⤵PID:6588
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\ado\msado26.tlb" /E /G Admin:F /C3⤵PID:6832
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\ado\msado26.tlb"3⤵
- Modifies file permissions
PID:6856
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\System\ado\msado27.tlb""2⤵PID:6980
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\ado\msado27.tlb"3⤵PID:6688
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\ado\msado27.tlb" /E /G Admin:F /C3⤵PID:5240
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\ado\msado27.tlb"3⤵PID:5388
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\System\ado\msado28.tlb""2⤵PID:5968
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\ado\msado28.tlb"3⤵
- Views/modifies file attributes
PID:6364
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\ado\msado28.tlb" /E /G Admin:F /C3⤵PID:6280
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\ado\msado28.tlb"3⤵PID:6284
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\System\ado\msado60.tlb""2⤵PID:6384
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\ado\msado60.tlb"3⤵PID:6672
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\ado\msado60.tlb" /E /G Admin:F /C3⤵PID:6764
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\ado\msado60.tlb"3⤵PID:6600
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\System\ado\msadomd28.tlb""2⤵PID:6452
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\ado\msadomd28.tlb"3⤵PID:7132
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\ado\msadomd28.tlb" /E /G Admin:F /C3⤵PID:6564
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\ado\msadomd28.tlb"3⤵PID:6880
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\System\ado\msador28.tlb""2⤵PID:6660
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\ado\msador28.tlb"3⤵PID:6656
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\ado\msador28.tlb" /E /G Admin:F /C3⤵PID:6784
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\ado\msador28.tlb"3⤵PID:7048
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\System\ado\msadox28.tlb""2⤵PID:6152
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\ado\msadox28.tlb"3⤵PID:6192
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\ado\msadox28.tlb" /E /G Admin:F /C3⤵PID:6264
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\ado\msadox28.tlb"3⤵PID:6424
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\System\en-US\wab32res.dll.mui""2⤵PID:6760
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\en-US\wab32res.dll.mui"3⤵PID:6220
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\en-US\wab32res.dll.mui" /E /G Admin:F /C3⤵PID:7112
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\en-US\wab32res.dll.mui"3⤵PID:6596
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\System\msadc\adcjavas.inc""2⤵PID:6924
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\msadc\adcjavas.inc"3⤵PID:6636
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\msadc\adcjavas.inc" /E /G Admin:F /C3⤵PID:6156
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\msadc\adcjavas.inc"3⤵PID:6388
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\System\msadc\adcvbs.inc""2⤵PID:6652
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\msadc\adcvbs.inc"3⤵PID:6608
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\msadc\adcvbs.inc" /E /G Admin:F /C3⤵PID:6536
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\msadc\adcvbs.inc"3⤵PID:6996
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\System\msadc\en-US\msadcer.dll.mui""2⤵PID:6380
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\msadc\en-US\msadcer.dll.mui"3⤵PID:6888
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\msadc\en-US\msadcer.dll.mui" /E /G Admin:F /C3⤵PID:6540
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\msadc\en-US\msadcer.dll.mui"3⤵PID:5364
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\System\msadc\en-US\msadcor.dll.mui""2⤵PID:6668
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\msadc\en-US\msadcor.dll.mui"3⤵
- Views/modifies file attributes
PID:5684
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\msadc\en-US\msadcor.dll.mui" /E /G Admin:F /C3⤵PID:6756
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\msadc\en-US\msadcor.dll.mui"3⤵PID:6228
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\System\msadc\en-US\msaddsr.dll.mui""2⤵PID:6512
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\msadc\en-US\msaddsr.dll.mui"3⤵PID:6184
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\msadc\en-US\msaddsr.dll.mui" /E /G Admin:F /C3⤵PID:6864
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\msadc\en-US\msaddsr.dll.mui"3⤵
- Modifies file permissions
PID:6928
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\System\msadc\en-US\msdaprsr.dll.mui""2⤵PID:7036
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\msadc\en-US\msdaprsr.dll.mui"3⤵PID:7044
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\msadc\en-US\msdaprsr.dll.mui" /E /G Admin:F /C3⤵PID:6628
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\msadc\en-US\msdaprsr.dll.mui"3⤵PID:6676
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\System\msadc\en-US\msdaremr.dll.mui""2⤵PID:6816
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\msadc\en-US\msdaremr.dll.mui"3⤵PID:6344
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\msadc\en-US\msdaremr.dll.mui" /E /G Admin:F /C3⤵PID:6520
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\msadc\en-US\msdaremr.dll.mui"3⤵PID:6532
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\System\Ole DB\en-US\msdasqlr.dll.mui""2⤵PID:6908
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\Ole DB\en-US\msdasqlr.dll.mui"3⤵PID:6912
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\Ole DB\en-US\msdasqlr.dll.mui" /E /G Admin:F /C3⤵PID:6548
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\Ole DB\en-US\msdasqlr.dll.mui"3⤵PID:6640
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\System\Ole DB\en-US\oledb32r.dll.mui""2⤵PID:6960
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\Ole DB\en-US\oledb32r.dll.mui"3⤵PID:6272
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\Ole DB\en-US\oledb32r.dll.mui" /E /G Admin:F /C3⤵PID:6812
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\Ole DB\en-US\oledb32r.dll.mui"3⤵PID:6988
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\System\Ole DB\en-US\sqloledb.rll.mui""2⤵PID:7088
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\Ole DB\en-US\sqloledb.rll.mui"3⤵PID:7092
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\Ole DB\en-US\sqloledb.rll.mui" /E /G Admin:F /C3⤵PID:7136
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\Ole DB\en-US\sqloledb.rll.mui"3⤵PID:6920
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\System\Ole DB\en-US\sqlxmlx.rll.mui""2⤵PID:6648
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\Ole DB\en-US\sqlxmlx.rll.mui"3⤵PID:7100
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\Ole DB\en-US\sqlxmlx.rll.mui" /E /G Admin:F /C3⤵PID:7124
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\Ole DB\en-US\sqlxmlx.rll.mui"3⤵
- Modifies file permissions
PID:6836
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\System\Ole DB\oledbjvs.inc""2⤵PID:5984
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\Ole DB\oledbjvs.inc"3⤵PID:6340
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\Ole DB\oledbjvs.inc" /E /G Admin:F /C3⤵PID:6752
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\Ole DB\oledbjvs.inc"3⤵
- Modifies file permissions
PID:6940
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\System\Ole DB\oledbvbs.inc""2⤵PID:6952
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\Ole DB\oledbvbs.inc"3⤵PID:6584
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\Ole DB\oledbvbs.inc" /E /G Admin:F /C3⤵PID:6336
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\Ole DB\oledbvbs.inc"3⤵
- Modifies file permissions
PID:6580
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\System\Ole DB\sqloledb.rll""2⤵PID:6728
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\Ole DB\sqloledb.rll"3⤵PID:6804
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\Ole DB\sqloledb.rll" /E /G Admin:F /C3⤵PID:6236
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\Ole DB\sqloledb.rll"3⤵
- Modifies file permissions
PID:6332
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Common Files\System\Ole DB\sqlxmlx.rll""2⤵PID:7028
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Common Files\System\Ole DB\sqlxmlx.rll"3⤵PID:6304
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Common Files\System\Ole DB\sqlxmlx.rll" /E /G Admin:F /C3⤵PID:6684
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Common Files\System\Ole DB\sqlxmlx.rll"3⤵PID:6552
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Internet Explorer\en-US\hmmapi.dll.mui""2⤵PID:6796
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Internet Explorer\en-US\hmmapi.dll.mui"3⤵PID:6440
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Internet Explorer\en-US\hmmapi.dll.mui" /E /G Admin:F /C3⤵PID:6208
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Internet Explorer\en-US\hmmapi.dll.mui"3⤵PID:6860
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Internet Explorer\en-US\ieinstal.exe.mui""2⤵PID:7008
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Internet Explorer\en-US\ieinstal.exe.mui"3⤵
- Views/modifies file attributes
PID:6748
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Internet Explorer\en-US\ieinstal.exe.mui" /E /G Admin:F /C3⤵PID:6224
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Internet Explorer\en-US\ieinstal.exe.mui"3⤵
- Modifies file permissions
PID:6852
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foo\ZNInNyp5.cmd" "C:\Program Files\Internet Explorer\en-US\iexplore.exe.mui""2⤵PID:7176
-
C:\Windows\SysWOW64\attrib.exeattrib -R -A -S "C:\Program Files\Internet Explorer\en-US\iexplore.exe.mui"3⤵
- Views/modifies file attributes
PID:7224
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Program Files\Internet Explorer\en-US\iexplore.exe.mui" /E /G Admin:F /C3⤵PID:7244
-
-
C:\Windows\SysWOW64\takeown.exetakeown /F "C:\Program Files\Internet Explorer\en-US\iexplore.exe.mui"3⤵PID:7264
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
6650ce31671b194e0f941868f2f3542f
SHA1792a8fd0204ec0417f720a95a7cfd6286792d6dd
SHA256bea908f559e636b7a4a693045bb957f1f9892204fb084d7aa411986b3386899b
SHA5126eeb7a14d69b1ea6523bc7484777748f2e9f1b29be4802414a1a8806552bb1316021c977e7a3c79f8838f7a4692682ead66090d1692b2d102a91ee57a4d77b78
-
MD5
383497fda5ca670a06dc688443c2011b
SHA1c622ebf694003368c3246e166a3a7bfc6b787652
SHA256d84d8ebcdfb0abcd821c24197517a5e329a1a6ae8e534509db78899b147cd60f
SHA5125f1f854690f9743a09fcdd0b6be43fd09af3eb5bc0f1ee4c20659458e34f46c33eec8eb651e569315902d99a12a217e5dea750411effca79485fa343c24d0129
-
MD5
383497fda5ca670a06dc688443c2011b
SHA1c622ebf694003368c3246e166a3a7bfc6b787652
SHA256d84d8ebcdfb0abcd821c24197517a5e329a1a6ae8e534509db78899b147cd60f
SHA5125f1f854690f9743a09fcdd0b6be43fd09af3eb5bc0f1ee4c20659458e34f46c33eec8eb651e569315902d99a12a217e5dea750411effca79485fa343c24d0129
-
C:\Users\All Users\Microsoft\ClickToRun\ProductReleases\55E75A3F-8E75-41E5-8961-48B2B983CD6C\en-us.16\stream.x64.en-us.db
MD53d37ed82ee29e84e6bc8bc612c0ea952
SHA11df756665da6af091496f81b45ad7aa81eb5f6bf
SHA256456d7e0ec2dcb1491f33b71486fdabcc0bab609d05a183a22236cf35ed860ab2
SHA512189ffe611ca1721702499957c220ffae85facefcf37dd61dea233dede658cf4f966a2afff076a49f5c873248886bc13ebe0f8d35630f91b868980135bb5532e9
-
C:\Users\All Users\Microsoft\ClickToRun\ProductReleases\55E75A3F-8E75-41E5-8961-48B2B983CD6C\x-none.16\stream.x64.x-none.db
MD5b019b3af6e7223cffa1025666ba47664
SHA1c8175b279395fdfd8be5b7fc0435994ca76dd7e4
SHA256182df96f75cba03f299d987a2403e256081c9546c33a8d4fb2f389617ee3b435
SHA512e40d37a597a76926dae16cdd40d6a3cc077f1b6d7ceb003c55f202b792ea950c7cfed9b677e116336a12870ce11dc2a423a3b2a62c5f7787aa56e927b6835087