本帖最后由 cwmz2005 于 2017-9-5 12:08 编辑
https://habo.qq.com/file/showdetail?md5=b1c05acd8cbbf1bd9a2448da0c10c411&pk=ADAGY11tB2cIP1s1
某讯某勃报告基本信息文件名称: | XXPlayer.exe | MD5: | b1c05acd8cbbf1bd9a2448da0c10c411 | 文件类型: | Autoit | 上传时间: | 2017-09-05 11:15:30 | 出品公司: | N/A | 版本: | 2.2.3.3---2.2.3.3 | 壳或编译器信息: | COMPILER:Microsoft Visual Studio .NET 2005 -- 2008 -> Microsoft Corporation [Overlay] * | 子文件信息: | [url=]详情[/url] |
关键行为行为描述: | 屏蔽窗口关闭消息 | 详情信息: | hWnd = 0x00050340, Text = , ClassName = AutoIt v3 GUI. | 行为描述: | 设置特殊文件夹属性 | 详情信息: | C:\Documents and Settings\Administrator\桌面\32607145 C:\Documents and Settings\Administrator\桌面\29792036 C:\Documents and Settings\Administrator\桌面\77951872 C:\Documents and Settings\Administrator\桌面\84739999 C:\Documents and Settings\Administrator\桌面\36065676 C:\Documents and Settings\Administrator\桌面\65341610 C:\Documents and Settings\Administrator\桌面\96887196 C:\Documents and Settings\Administrator\桌面\98269237 C:\Documents and Settings\Administrator\桌面\64537427 C:\Documents and Settings\Administrator\桌面\55050707 C:\Documents and Settings\Administrator\桌面\86136661 C:\Documents and Settings\Administrator\桌面\46244561 C:\Documents and Settings\Administrator\桌面\67520112 C:\Documents and Settings\Administrator\桌面\77715266 C:\Documents and Settings\Administrator\桌面\18781476 | 行为描述: | 在桌面创建文件 | 详情信息: | C:\Documents and Settings\Administrator\桌面\32607145\Desktop.ini C:\Documents and Settings\Administrator\桌面\29792036\Desktop.ini C:\Documents and Settings\Administrator\桌面\77951872\Desktop.ini C:\Documents and Settings\Administrator\桌面\84739999\Desktop.ini C:\Documents and Settings\Administrator\桌面\36065676\Desktop.ini C:\Documents and Settings\Administrator\桌面\65341610\Desktop.ini C:\Documents and Settings\Administrator\桌面\96887196\Desktop.ini C:\Documents and Settings\Administrator\桌面\98269237\Desktop.ini C:\Documents and Settings\Administrator\桌面\64537427\Desktop.ini C:\Documents and Settings\Administrator\桌面\55050707\Desktop.ini C:\Documents and Settings\Administrator\桌面\86136661\Desktop.ini C:\Documents and Settings\Administrator\桌面\46244561\Desktop.ini C:\Documents and Settings\Administrator\桌面\67520112\Desktop.ini C:\Documents and Settings\Administrator\桌面\77715266\Desktop.ini C:\Documents and Settings\Administrator\桌面\18781476\Desktop.ini | 行为描述: | 跨进程写入数据 | 详情信息: | TargetProcess = C:\WINDOWS\system32\VBoxService.exe, WriteAddress = 0x00010000, Size = 0x000007c2 TargetPID = 0x00000988 TargetProcess = C:\WINDOWS\system32\VBoxService.exe, WriteAddress = 0x00020000, Size = 0x000006e0 TargetPID = 0x00000988 TargetProcess = C:\WINDOWS\system32\VBoxService.exe, WriteAddress = 0x7ffd6010, Size = 0x00000004 TargetPID = 0x00000988 TargetProcess = C:\WINDOWS\system32\VBoxService.exe, WriteAddress = 0x00030000, Size = 0x00000184 TargetPID = 0x00000988 TargetProcess = C:\WINDOWS\system32\VBoxService.exe, WriteAddress = 0x7ffd61e8, Size = 0x00000004 TargetPID = 0x00000988 TargetProcess = C:\WINDOWS\system32\VBoxService.exe, WriteAddress = 0x00010000, Size = 0x000007c2 TargetPID = 0x00000a30 TargetProcess = C:\WINDOWS\system32\VBoxService.exe, WriteAddress = 0x00020000, Size = 0x000006e0 TargetPID = 0x00000a30 TargetProcess = C:\WINDOWS\system32\VBoxService.exe, WriteAddress = 0x7ffd4010, Size = 0x00000004 TargetPID = 0x00000a30 TargetProcess = C:\WINDOWS\system32\VBoxService.exe, WriteAddress = 0x00030000, Size = 0x00000184 TargetPID = 0x00000a30 TargetProcess = C:\WINDOWS\system32\VBoxService.exe, WriteAddress = 0x7ffd41e8, Size = 0x00000004 TargetPID = 0x00000a30 TargetProcess = C:\WINDOWS\system32\VBoxService.exe, WriteAddress = 0x00010000, Size = 0x000007c2 TargetPID = 0x00000a68 TargetProcess = C:\WINDOWS\system32\VBoxService.exe, WriteAddress = 0x00020000, Size = 0x000006e0 TargetPID = 0x00000a68 TargetProcess = C:\WINDOWS\system32\VBoxService.exe, WriteAddress = 0x7ffd3010, Size = 0x00000004 TargetPID = 0x00000a68 TargetProcess = C:\WINDOWS\system32\VBoxService.exe, WriteAddress = 0x00030000, Size = 0x00000184 TargetPID = 0x00000a68 TargetProcess = C:\WINDOWS\system32\VBoxService.exe, WriteAddress = 0x7ffd31e8, Size = 0x00000004 TargetPID = 0x00000a68 |
进程行为行为描述: | 隐藏窗口创建进程 | 详情信息: | ImagePath = , CmdLine = cmd.exe /c md "Are you OK...\" | 行为描述: | 创建进程 | 详情信息: | [0x00000b10]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = cmd.exe /c md "Are you OK...\" [0x00000b18]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = cmd.exe /c md "Are you OK...\" [0x00000b20]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = cmd.exe /c md "Are you OK...\" [0x00000b28]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = cmd.exe /c md "Are you OK...\" [0x00000b30]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = cmd.exe /c md "Are you OK...\" [0x00000b38]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = cmd.exe /c md "Are you OK...\" [0x00000b40]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = cmd.exe /c md "Are you OK...\" [0x00000b48]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = cmd.exe /c md "Are you OK...\" [0x00000b50]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = cmd.exe /c md "Are you OK...\" [0x00000b78]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = cmd.exe /c md "Are you OK...\" [0x00000b88]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = cmd.exe /c md "Are you OK...\" [0x00000b90]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = cmd.exe /c md "Are you OK...\" [0x00000b98]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = cmd.exe /c md "Are you OK...\" [0x00000ba0]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = cmd.exe /c md "Are you OK...\" [0x00000ba8]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = cmd.exe /c md "Are you OK...\" | 行为描述: | 创建本地线程 | 详情信息: | TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2720, ThreadID = 2744, StartAddress = 77DC845A, Parameter = 00000000 TargetProcess: %temp%\****.exe, InheritedFromPID = 2000, ProcessID = 2720, ThreadID = 2748, StartAddress = 0044B252, Parameter = 01673010 | 行为描述: | 跨进程写入数据 | 详情信息: | TargetProcess = C:\WINDOWS\system32\VBoxService.exe, WriteAddress = 0x00010000, Size = 0x000007c2 TargetPID = 0x00000988 TargetProcess = C:\WINDOWS\system32\VBoxService.exe, WriteAddress = 0x00020000, Size = 0x000006e0 TargetPID = 0x00000988 TargetProcess = C:\WINDOWS\system32\VBoxService.exe, WriteAddress = 0x7ffd6010, Size = 0x00000004 TargetPID = 0x00000988 TargetProcess = C:\WINDOWS\system32\VBoxService.exe, WriteAddress = 0x00030000, Size = 0x00000184 TargetPID = 0x00000988 TargetProcess = C:\WINDOWS\system32\VBoxService.exe, WriteAddress = 0x7ffd61e8, Size = 0x00000004 TargetPID = 0x00000988 TargetProcess = C:\WINDOWS\system32\VBoxService.exe, WriteAddress = 0x00010000, Size = 0x000007c2 TargetPID = 0x00000a30 TargetProcess = C:\WINDOWS\system32\VBoxService.exe, WriteAddress = 0x00020000, Size = 0x000006e0 TargetPID = 0x00000a30 TargetProcess = C:\WINDOWS\system32\VBoxService.exe, WriteAddress = 0x7ffd4010, Size = 0x00000004 TargetPID = 0x00000a30 TargetProcess = C:\WINDOWS\system32\VBoxService.exe, WriteAddress = 0x00030000, Size = 0x00000184 TargetPID = 0x00000a30 TargetProcess = C:\WINDOWS\system32\VBoxService.exe, WriteAddress = 0x7ffd41e8, Size = 0x00000004 TargetPID = 0x00000a30 TargetProcess = C:\WINDOWS\system32\VBoxService.exe, WriteAddress = 0x00010000, Size = 0x000007c2 TargetPID = 0x00000a68 TargetProcess = C:\WINDOWS\system32\VBoxService.exe, WriteAddress = 0x00020000, Size = 0x000006e0 TargetPID = 0x00000a68 TargetProcess = C:\WINDOWS\system32\VBoxService.exe, WriteAddress = 0x7ffd3010, Size = 0x00000004 TargetPID = 0x00000a68 TargetProcess = C:\WINDOWS\system32\VBoxService.exe, WriteAddress = 0x00030000, Size = 0x00000184 TargetPID = 0x00000a68 TargetProcess = C:\WINDOWS\system32\VBoxService.exe, WriteAddress = 0x7ffd31e8, Size = 0x00000004 TargetPID = 0x00000a68 |
文件行为行为描述: | 创建文件 | 详情信息: | C:\Documents and Settings\Administrator\Local Settings\Temp\aut3.tmp C:\Documents and Settings\Administrator\Application Data\83908025.ico C:\Documents and Settings\Administrator\Local Settings\Temp\aut4.tmp C:\Documents and Settings\Administrator\Application Data\57641833.bmp C:\Documents and Settings\Administrator\Local Settings\Temp\aut5.tmp C:\Documents and Settings\Administrator\Application Data\99077484.reg | 行为描述: | 覆盖已有文件 | 详情信息: | C:\Documents and Settings\Administrator\Local Settings\Temp\aut3.tmp C:\Documents and Settings\Administrator\Local Settings\Temp\aut4.tmp C:\Documents and Settings\Administrator\Local Settings\Temp\aut5.tmp | 行为描述: | 查找文件 | 详情信息: | FileName = C:\Documents and Settings FileName = C:\Documents and Settings\Administrator FileName = C:\Documents and Settings\Administrator\Local Settings FileName = C:\Documents and Settings\Administrator\Local Settings\Temp FileName = C:\Documents and Settings\Administrator\Local Settings\%temp% FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe FileName = C:\Documents and Settings\Administrator\Application Data\83908025.ico FileName = C:\Documents and Settings\Administrator\Application Data\57641833.bmp FileName = C:\Documents and Settings\Administrator\Application Data\99077484.reg FileName = C:\Documents and Settings\Administrator\桌面\32607145\ FileName = C:\WINDOWS FileName = C:\WINDOWS\system32 FileName = C:\WINDOWS\system32\cmd.exe FileName = C:\Documents and Settings\Administrator\桌面 FileName = C:\Documents and Settings\Administrator\桌面\32607145 | 行为描述: | 删除文件 | 详情信息: | C:\Documents and Settings\Administrator\Local Settings\Temp\aut3.tmp C:\Documents and Settings\Administrator\Local Settings\Temp\aut4.tmp C:\Documents and Settings\Administrator\Local Settings\Temp\aut5.tmp | 行为描述: | 在桌面创建文件 | 详情信息: | C:\Documents and Settings\Administrator\桌面\32607145\Desktop.ini C:\Documents and Settings\Administrator\桌面\29792036\Desktop.ini C:\Documents and Settings\Administrator\桌面\77951872\Desktop.ini C:\Documents and Settings\Administrator\桌面\84739999\Desktop.ini C:\Documents and Settings\Administrator\桌面\36065676\Desktop.ini C:\Documents and Settings\Administrator\桌面\65341610\Desktop.ini C:\Documents and Settings\Administrator\桌面\96887196\Desktop.ini C:\Documents and Settings\Administrator\桌面\98269237\Desktop.ini C:\Documents and Settings\Administrator\桌面\64537427\Desktop.ini C:\Documents and Settings\Administrator\桌面\55050707\Desktop.ini C:\Documents and Settings\Administrator\桌面\86136661\Desktop.ini C:\Documents and Settings\Administrator\桌面\46244561\Desktop.ini C:\Documents and Settings\Administrator\桌面\67520112\Desktop.ini C:\Documents and Settings\Administrator\桌面\77715266\Desktop.ini C:\Documents and Settings\Administrator\桌面\18781476\Desktop.ini | 行为描述: | 设置特殊文件夹属性 | 详情信息: | C:\Documents and Settings\Administrator\桌面\32607145 C:\Documents and Settings\Administrator\桌面\29792036 C:\Documents and Settings\Administrator\桌面\77951872 C:\Documents and Settings\Administrator\桌面\84739999 C:\Documents and Settings\Administrator\桌面\36065676 C:\Documents and Settings\Administrator\桌面\65341610 C:\Documents and Settings\Administrator\桌面\96887196 C:\Documents and Settings\Administrator\桌面\98269237 C:\Documents and Settings\Administrator\桌面\64537427 C:\Documents and Settings\Administrator\桌面\55050707 C:\Documents and Settings\Administrator\桌面\86136661 C:\Documents and Settings\Administrator\桌面\46244561 C:\Documents and Settings\Administrator\桌面\67520112 C:\Documents and Settings\Administrator\桌面\77715266 C:\Documents and Settings\Administrator\桌面\18781476 | 行为描述: | 修改文件内容 | 详情信息: | C:\Documents and Settings\Administrator\Local Settings\Temp\aut3.tmp ---> Offset = 0 C:\Documents and Settings\Administrator\Application Data\83908025.ico ---> Offset = 0 C:\Documents and Settings\Administrator\Application Data\83908025.ico ---> Offset = 65536 C:\Documents and Settings\Administrator\Local Settings\Temp\aut4.tmp ---> Offset = 0 C:\Documents and Settings\Administrator\Application Data\57641833.bmp ---> Offset = 0 C:\Documents and Settings\Administrator\Local Settings\Temp\aut5.tmp ---> Offset = 0 C:\Documents and Settings\Administrator\Application Data\99077484.reg ---> Offset = 0 C:\Documents and Settings\Administrator\桌面\32607145\Desktop.ini ---> Offset = 0 C:\Documents and Settings\Administrator\桌面\32607145\Desktop.ini ---> Offset = 54 C:\Documents and Settings\Administrator\桌面\32607145\Desktop.ini ---> Offset = 138 C:\Documents and Settings\Administrator\桌面\29792036\Desktop.ini ---> Offset = 0 C:\Documents and Settings\Administrator\桌面\29792036\Desktop.ini ---> Offset = 54 C:\Documents and Settings\Administrator\桌面\29792036\Desktop.ini ---> Offset = 138 C:\Documents and Settings\Administrator\桌面\77951872\Desktop.ini ---> Offset = 0 C:\Documents and Settings\Administrator\桌面\77951872\Desktop.ini ---> Offset = 54 |
其他行为行为描述: | 检测自身是否被调试 | 详情信息: | IsDebuggerPresent | 行为描述: | 创建互斥体 | 详情信息: | CTF.LBES.MutexDefaultS-* CTF.Compart.MutexDefaultS-* CTF.Asm.MutexDefaultS-* CTF.Layouts.MutexDefaultS-* CTF.TMD.MutexDefaultS-* CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-* MSCTF.Shared.MUTEX.IOH MSCTF.Shared.MUTEX.EKK | 行为描述: | 创建事件对象 | 详情信息: | EventName = DINPUTWINMM EventName = Global\userenv: User Profile setup event EventName = MSCTF.SendReceive.Event.EKK.IC EventName = MSCTF.SendReceiveConection.Event.EKK.IC | 行为描述: | 查找指定窗口 | 详情信息: | NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,] NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,] | 行为描述: | 调整进程token权限 | 详情信息: | SE_LOAD_DRIVER_PRIVILEGE | 行为描述: | 屏蔽窗口关闭消息 | 详情信息: | hWnd = 0x00050340, Text = , ClassName = AutoIt v3 GUI. | 行为描述: | 打开事件 | 详情信息: | HookSwitchHookEnabledEvent _fCanRegisterWithShellService Global\SvcctrlStartEvent_A3752DX CTF.ThreadMIConnectionEvent.000007E8.00000000.00000010 CTF.ThreadMarshalInterfaceEvent.000007E8.00000000.00000010 MSCTF.SendReceiveConection.Event.IOH.IC MSCTF.SendReceive.Event.IOH.IC | 行为描述: | 隐藏指定窗口 | 详情信息: | [Window,Class] = [AutoIt v3,AutoIt v3] | 行为描述: | 打开互斥体 | 详情信息: | ShimCacheMutex |
进程树- [url=]****.exe (PID: 0x00000aa0)[/url]
- [url=]cmd.exe (PID: 0x00000b10)[/url]
- [url=]cmd.exe (PID: 0x00000b18)[/url]
- [url=]cmd.exe (PID: 0x00000b20)[/url]
- [url=]cmd.exe (PID: 0x00000b28)[/url]
- [url=]cmd.exe (PID: 0x00000b30)[/url]
- [url=]cmd.exe (PID: 0x00000b38)[/url]
- [url=]cmd.exe (PID: 0x00000b40)[/url]
- [url=]cmd.exe (PID: 0x00000b48)[/url]
- [url=]cmd.exe (PID: 0x00000b50)[/url]
- [url=]cmd.exe (PID: 0x00000b78)[/url]
- [url=]cmd.exe (PID: 0x00000b88)[/url]
- [url=]cmd.exe (PID: 0x00000b90)[/url]
- [url=]cmd.exe (PID: 0x00000b98)[/url]
- [url=]cmd.exe (PID: 0x00000ba0)[/url]
- [url=]cmd.exe (PID: 0x00000ba8)[/url]
- [url=]cmd.exe (PID: 0x00000bb0)[/url]
- [url=]cmd.exe (PID: 0x00000bb8)[/url]
- [url=]cmd.exe (PID: 0x00000bc0)[/url]
- [url=]cmd.exe (PID: 0x00000bc8)[/url]
- [url=]cmd.exe (PID: 0x00000bd0)[/url]
- [url=]cmd.exe (PID: 0x00000bd8)[/url]
- [url=]cmd.exe (PID: 0x00000bf8)[/url]
- [url=]cmd.exe (PID: 0x00000c04)[/url]
- [url=]cmd.exe (PID: 0x00000c0c)[/url]
- [url=]cmd.exe (PID: 0x00000c14)[/url]
- [url=]cmd.exe (PID: 0x00000c1c)[/url]
- [url=]cmd.exe (PID: 0x00000c24)[/url]
- [url=]cmd.exe (PID: 0x00000c2c)[/url]
- [url=]cmd.exe (PID: 0x00000c34)[/url]
- [url=]cmd.exe (PID: 0x00000c3c)[/url]
- [url=]cmd.exe (PID: 0x00000c44)[/url]
- [url=]cmd.exe (PID: 0x00000c4c)[/url]
- [url=]cmd.exe (PID: 0x00000c54)[/url]
- [url=]cmd.exe (PID: 0x00000c5c)[/url]
- [url=]cmd.exe (PID: 0x00000c74)[/url]
- [url=]cmd.exe (PID: 0x00000c84)[/url]
- [url=]cmd.exe (PID: 0x00000c8c)[/url]
- [url=]cmd.exe (PID: 0x00000c94)[/url]
- [url=]cmd.exe (PID: 0x00000c9c)[/url]
- [url=]cmd.exe (PID: 0x00000ca4)[/url]
- [url=]cmd.exe (PID: 0x00000cac)[/url]
- [url=]cmd.exe (PID: 0x00000cb4)[/url]
- [url=]cmd.exe (PID: 0x00000cbc)[/url]
- [url=]cmd.exe (PID: 0x00000cc4)[/url]
- [url=]cmd.exe (PID: 0x00000ccc)[/url]
- [url=]cmd.exe (PID: 0x00000ce0)[/url]
- [url=]cmd.exe (PID: 0x00000d10)[/url]
- [url=]cmd.exe (PID: 0x00000d4c)[/url]
- [url=]cmd.exe (PID: 0x00000d5c)[/url]
- [url=]cmd.exe (PID: 0x00000d64)[/url]
- [url=]cmd.exe (PID: 0x00000d78)[/url]
- [url=]cmd.exe (PID: 0x00000d80)[/url]
- [url=]cmd.exe (PID: 0x00000d88)[/url]
- [url=]cmd.exe (PID: 0x00000d90)[/url]
- [url=]cmd.exe (PID: 0x00000d98)[/url]
- [url=]cmd.exe (PID: 0x00000da0)[/url]
- [url=]cmd.exe (PID: 0x00000dd4)[/url]
- [url=]cmd.exe (PID: 0x00000dec)[/url]
- [url=]cmd.exe (PID: 0x00000dfc)[/url]
- [url=]cmd.exe (PID: 0x00000e0c)[/url]
- [url=]cmd.exe (PID: 0x00000e18)[/url]
- [url=]cmd.exe (PID: 0x00000e20)[/url]
- [url=]cmd.exe (PID: 0x00000e28)[/url]
- [url=]cmd.exe (PID: 0x00000e30)[/url]
- [url=]cmd.exe (PID: 0x00000e38)[/url]
- [url=]cmd.exe (PID: 0x00000e40)[/url]
- [url=]cmd.exe (PID: 0x00000e50)[/url]
- [url=]cmd.exe (PID: 0x00000e68)[/url]
- [url=]cmd.exe (PID: 0x00000e70)[/url]
- [url=]cmd.exe (PID: 0x00000e78)[/url]
- [url=]cmd.exe (PID: 0x00000e84)[/url]
- [url=]cmd.exe (PID: 0x00000e8c)[/url]
- [url=]cmd.exe (PID: 0x00000e94)[/url]
- [url=]cmd.exe (PID: 0x00000e9c)[/url]
- [url=]cmd.exe (PID: 0x00000ea4)[/url]
- [url=]cmd.exe (PID: 0x00000eac)[/url]
- [url=]cmd.exe (PID: 0x00000eb4)[/url]
- [url=]cmd.exe (PID: 0x00000ebc)[/url]
- [url=]cmd.exe (PID: 0x00000ec4)[/url]
- [url=]cmd.exe (PID: 0x00000ed8)[/url]
- [url=]cmd.exe (PID: 0x00000eec)[/url]
- [url=]cmd.exe (PID: 0x00000ef4)[/url]
- [url=]cmd.exe (PID: 0x00000efc)[/url]
- [url=]cmd.exe (PID: 0x00000f04)[/url]
- [url=]cmd.exe (PID: 0x00000f0c)[/url]
- [url=]cmd.exe (PID: 0x00000f14)[/url]
- [url=]cmd.exe (PID: 0x00000f1c)[/url]
- [url=]cmd.exe (PID: 0x00000f24)[/url]
- [url=]cmd.exe (PID: 0x00000f2c)[/url]
- [url=]cmd.exe (PID: 0x00000f34)[/url]
- [url=]cmd.exe (PID: 0x00000f3c)[/url]
- [url=]cmd.exe (PID: 0x00000f44)[/url]
- [url=]cmd.exe (PID: 0x00000f5c)[/url]
- [url=]cmd.exe (PID: 0x00000f6c)[/url]
- [url=]cmd.exe (PID: 0x00000f74)[/url]
- [url=]cmd.exe (PID: 0x00000f7c)[/url]
- [url=]cmd.exe (PID: 0x00000f84)[/url]
- [url=]cmd.exe (PID: 0x00000f90)[/url]
- [url=]cmd.exe (PID: 0x00000f98)[/url]
- [url=]cmd.exe (PID: 0x00000fa0)[/url]
- [url=]cmd.exe (PID: 0x00000fa8)[/url]
- [url=]cmd.exe (PID: 0x00000fb0)[/url]
- [url=]cmd.exe (PID: 0x00000fbc)[/url]
- [url=]cmd.exe (PID: 0x00000fc4)[/url]
- [url=]cmd.exe (PID: 0x00000fcc)[/url]
- [url=]cmd.exe (PID: 0x00000ff0)[/url]
- [url=]cmd.exe (PID: 0x00000ff8)[/url]
- [url=]cmd.exe (PID: 0x00000784)[/url]
- [url=]cmd.exe (PID: 0x00000070)[/url]
- [url=]cmd.exe (PID: 0x00000798)[/url]
- [url=]cmd.exe (PID: 0x000006d4)[/url]
- [url=]cmd.exe (PID: 0x000001d8)[/url]
- [url=]cmd.exe (PID: 0x00000090)[/url]
- [url=]cmd.exe (PID: 0x00000228)[/url]
- [url=]cmd.exe (PID: 0x000001c0)[/url]
- [url=]cmd.exe (PID: 0x0000014c)[/url]
- [url=]cmd.exe (PID: 0x00000538)[/url]
- [url=]cmd.exe (PID: 0x0000078c)[/url]
- [url=]cmd.exe (PID: 0x00000674)[/url]
- [url=]cmd.exe (PID: 0x00000654)[/url]
- [url=]cmd.exe (PID: 0x00000680)[/url]
- [url=]cmd.exe (PID: 0x0000067c)[/url]
- [url=]cmd.exe (PID: 0x000000c4)[/url]
- [url=]cmd.exe (PID: 0x0000066c)[/url]
- [url=]cmd.exe (PID: 0x000001b4)[/url]
- [url=]cmd.exe (PID: 0x000003ec)[/url]
- [url=]cmd.exe (PID: 0x000000a8)[/url]
- [url=]cmd.exe (PID: 0x000000c0)[/url]
- [url=]cmd.exe (PID: 0x000005c8)[/url]
- [url=]cmd.exe (PID: 0x000005f4)[/url]
- [url=]cmd.exe (PID: 0x00000504)[/url]
- [url=]cmd.exe (PID: 0x00000718)[/url]
- [url=]cmd.exe (PID: 0x000002c4)[/url]
- [url=]cmd.exe (PID: 0x0000021c)[/url]
- [url=]cmd.exe (PID: 0x00000710)[/url]
- [url=]cmd.exe (PID: 0x00000750)[/url]
- [url=]cmd.exe (PID: 0x00000714)[/url]
- [url=]cmd.exe (PID: 0x00000774)[/url]
- [url=]cmd.exe (PID: 0x00000550)[/url]
- [url=]cmd.exe (PID: 0x00000568)[/url]
- [url=]cmd.exe (PID: 0x000008b4)[/url]
- [url=]cmd.exe (PID: 0x00000874)[/url]
- [url=]cmd.exe (PID: 0x000008bc)[/url]
- [url=]cmd.exe (PID: 0x0000087c)[/url]
- [url=]cmd.exe (PID: 0x000008a4)[/url]
- [url=]cmd.exe (PID: 0x000008b0)[/url]
- [url=]cmd.exe (PID: 0x000008e0)[/url]
- [url=]cmd.exe (PID: 0x000008e8)[/url]
- [url=]cmd.exe (PID: 0x00000700)[/url]
- [url=]cmd.exe (PID: 0x00000778)[/url]
- [url=]cmd.exe (PID: 0x00000804)[/url]
- [url=]cmd.exe (PID: 0x0000080c)[/url]
- [url=]cmd.exe (PID: 0x00000814)[/url]
- [url=]cmd.exe (PID: 0x00000820)[/url]
- [url=]cmd.exe (PID: 0x00000828)[/url]
- [url=]cmd.exe (PID: 0x00000830)[/url]
- [url=]cmd.exe (PID: 0x00000848)[/url]
- [url=]cmd.exe (PID: 0x00000858)[/url]
- [url=]cmd.exe (PID: 0x00000860)[/url]
- [url=]cmd.exe (PID: 0x00000890)[/url]
- [url=]cmd.exe (PID: 0x000008a8)[/url]
- [url=]cmd.exe (PID: 0x000002f8)[/url]
- [url=]cmd.exe (PID: 0x000005ac)[/url]
- [url=]cmd.exe (PID: 0x000008c4)[/url]
- [url=]cmd.exe (PID: 0x000008b8)[/url]
- [url=]cmd.exe (PID: 0x000008c8)[/url]
- [url=]cmd.exe (PID: 0x00000508)[/url]
- [url=]cmd.exe (PID: 0x0000090c)[/url]
- [url=]cmd.exe (PID: 0x00000914)[/url]
- [url=]cmd.exe (PID: 0x00000980)[/url]
- [url=]cmd.exe (PID: 0x000009b0)[/url]
- [url=]cmd.exe (PID: 0x000009a8)[/url]
- [url=]cmd.exe (PID: 0x00000998)[/url]
- [url=]cmd.exe (PID: 0x000009e0)[/url]
- [url=]vboxservice.exe guestsession --session-id=5 --session-proto=2 --user Administrator (PID: 0x00000988)[/url]
- [url=]cmd.exe (PID: 0x00000994)[/url]
- [url=]cmd.exe (PID: 0x00000a18)[/url]
- [url=]cmd.exe (PID: 0x00000a28)[/url]
- [url=]cmd.exe (PID: 0x00000a3c)[/url]
- [url=]cmd.exe (PID: 0x00000a50)[/url]
- [url=]cmd.exe (PID: 0x00000a58)[/url]
- [url=]vboxservice.exe guestsession --session-id=5 --session-proto=2 --user Administrator (PID: 0x00000a30)[/url]
- [url=]cmd.exe (PID: 0x00000a7c)[/url]
- [url=]cmd.exe (PID: 0x00000a20)[/url]
- [url=]cmd.exe (PID: 0x00000a9c)[/url]
- [url=]cmd.exe (PID: 0x00000ab4)[/url]
- [url=]cmd.exe (PID: 0x00000aac)[/url]
- [url=]cmd.exe (PID: 0x00000a74)[/url]
- [url=]vboxservice.exe guestsession --session-id=5 --session-proto=2 --user Administrator (PID: 0x00000a68)[/url]
- [url=]cmd.exe (PID: 0x00000ad4)[/url]
- [url=]cmd.exe /c md "Are you OK...\" (PID: 0x00000acc)[/url]
|