Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
43s -
max time network
47s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2023, 14:22
Static task
static1
Behavioral task
behavioral1
Sample
funnyfunfunfunfunny.bat
Resource
win7-20230831-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
funnyfunfunfunfunny.bat
Resource
win10v2004-20230915-en
6 signatures
150 seconds
General
-
Target
funnyfunfunfunfunny.bat
-
Size
114B
-
MD5
9d976c9b986e49e54eb7d56cf516a26c
-
SHA1
158502200e1508e7f37983872e8c8060a273edd5
-
SHA256
92e8983db2d41aa84c9c66ffa447492ca3e17091238638f702b15796bf06eaad
-
SHA512
c9914137a7f820f98a056a45824bfdfe27c0060621f2277e6a872706dce058dd5df1d1a27cca1ad431243a0d122fa45cab91696f9571226d20d2a62b767cdd2f
Score
1/10
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 33 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "229" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeShutdownPrivilege 464 shutdown.exe Token: SeRemoteShutdownPrivilege 464 shutdown.exe Token: SeCreateGlobalPrivilege 13016 dwm.exe Token: SeChangeNotifyPrivilege 13016 dwm.exe Token: 33 13016 dwm.exe Token: SeIncBasePriorityPrivilege 13016 dwm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2696 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4916 wrote to memory of 464 4916 cmd.exe 87 PID 4916 wrote to memory of 464 4916 cmd.exe 87 PID 4916 wrote to memory of 4912 4916 cmd.exe 90 PID 4916 wrote to memory of 4912 4916 cmd.exe 90 PID 4916 wrote to memory of 2744 4916 cmd.exe 91 PID 4916 wrote to memory of 2744 4916 cmd.exe 91 PID 4916 wrote to memory of 2340 4916 cmd.exe 93 PID 4916 wrote to memory of 2340 4916 cmd.exe 93 PID 4916 wrote to memory of 1384 4916 cmd.exe 98 PID 4916 wrote to memory of 1384 4916 cmd.exe 98 PID 4916 wrote to memory of 2360 4916 cmd.exe 97 PID 4916 wrote to memory of 2360 4916 cmd.exe 97 PID 4916 wrote to memory of 1908 4916 cmd.exe 96 PID 4916 wrote to memory of 1908 4916 cmd.exe 96 PID 4916 wrote to memory of 1012 4916 cmd.exe 94 PID 4916 wrote to memory of 1012 4916 cmd.exe 94 PID 4916 wrote to memory of 1976 4916 cmd.exe 103 PID 4916 wrote to memory of 1976 4916 cmd.exe 103 PID 4916 wrote to memory of 4272 4916 cmd.exe 105 PID 4916 wrote to memory of 4272 4916 cmd.exe 105 PID 4916 wrote to memory of 1916 4916 cmd.exe 104 PID 4916 wrote to memory of 1916 4916 cmd.exe 104 PID 4916 wrote to memory of 3748 4916 cmd.exe 106 PID 4916 wrote to memory of 3748 4916 cmd.exe 106 PID 4916 wrote to memory of 3100 4916 cmd.exe 116 PID 4916 wrote to memory of 3100 4916 cmd.exe 116 PID 4916 wrote to memory of 2828 4916 cmd.exe 115 PID 4916 wrote to memory of 2828 4916 cmd.exe 115 PID 4916 wrote to memory of 2040 4916 cmd.exe 114 PID 4916 wrote to memory of 2040 4916 cmd.exe 114 PID 4916 wrote to memory of 212 4916 cmd.exe 117 PID 4916 wrote to memory of 212 4916 cmd.exe 117 PID 4916 wrote to memory of 5056 4916 cmd.exe 119 PID 4916 wrote to memory of 5056 4916 cmd.exe 119 PID 4916 wrote to memory of 3172 4916 cmd.exe 134 PID 4916 wrote to memory of 3172 4916 cmd.exe 134 PID 4916 wrote to memory of 3264 4916 cmd.exe 133 PID 4916 wrote to memory of 3264 4916 cmd.exe 133 PID 4916 wrote to memory of 1284 4916 cmd.exe 122 PID 4916 wrote to memory of 1284 4916 cmd.exe 122 PID 4916 wrote to memory of 2488 4916 cmd.exe 130 PID 4916 wrote to memory of 2488 4916 cmd.exe 130 PID 4916 wrote to memory of 4520 4916 cmd.exe 123 PID 4916 wrote to memory of 4520 4916 cmd.exe 123 PID 4916 wrote to memory of 1400 4916 cmd.exe 124 PID 4916 wrote to memory of 1400 4916 cmd.exe 124 PID 4916 wrote to memory of 3912 4916 cmd.exe 129 PID 4916 wrote to memory of 3912 4916 cmd.exe 129 PID 4916 wrote to memory of 3416 4916 cmd.exe 135 PID 4916 wrote to memory of 3416 4916 cmd.exe 135 PID 4916 wrote to memory of 2172 4916 cmd.exe 137 PID 4916 wrote to memory of 2172 4916 cmd.exe 137 PID 4916 wrote to memory of 4896 4916 cmd.exe 139 PID 4916 wrote to memory of 4896 4916 cmd.exe 139 PID 4916 wrote to memory of 2492 4916 cmd.exe 166 PID 4916 wrote to memory of 2492 4916 cmd.exe 166 PID 4916 wrote to memory of 3784 4916 cmd.exe 165 PID 4916 wrote to memory of 3784 4916 cmd.exe 165 PID 4916 wrote to memory of 3608 4916 cmd.exe 163 PID 4916 wrote to memory of 3608 4916 cmd.exe 163 PID 4916 wrote to memory of 548 4916 cmd.exe 162 PID 4916 wrote to memory of 548 4916 cmd.exe 162 PID 4916 wrote to memory of 3616 4916 cmd.exe 161 PID 4916 wrote to memory of 3616 4916 cmd.exe 161
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\funnyfunfunfunfunny.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\system32\shutdown.exeshutdown /r2⤵
- Suspicious use of AdjustPrivilegeToken
PID:464
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4912
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2744
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2340
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1012
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1908
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2360
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1384
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1976
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1916
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4272
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3748
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2040
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2828
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3100
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:212
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5056
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1284
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4520
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1400
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3912
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2488
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3264
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3172
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3416
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2172
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4896
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4492
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5416
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4836
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4572
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3076
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3960
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:464
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1476
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3616
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:548
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3608
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3784
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2492
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5564
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5712
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5856
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6684
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5848
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5840
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5832
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5824
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5816
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5808
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5800
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5792
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5784
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5776
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5768
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5756
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5748
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5740
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5704
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5692
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5684
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5676
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5668
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5660
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5652
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5644
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5636
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5628
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5620
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5612
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5604
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5596
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5588
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6976
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6964
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6956
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6948
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2216
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2204
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7076
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6776
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4700
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7256
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7272
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7368
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7388
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7416
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7452
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7488
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7612
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7632
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7660
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7688
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7708
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7808
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7824
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7848
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7880
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7936
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8064
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8088
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8116
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8144
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2616
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3280
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7752
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7964
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1964
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8260
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8244
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8236
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8228
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8220
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8572
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8588
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8612
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8640
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8772
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8808
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8780
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8840
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8872
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8984
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9004
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9028
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9168
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9196
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7484
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8608
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9252
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9280
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9308
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9228
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9428
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9488
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9528
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9560
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9544
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9660
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9676
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9700
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9756
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9748
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9740
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9732
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9912
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10024
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10040
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10064
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10100
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10204
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10236
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5028
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9800
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10260
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10276
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10300
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10328
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10368
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10416
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10492
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10540
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10568
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10692
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10676
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10708
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10736
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10780
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10816
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10956
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10972
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10988
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11012
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11040
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11132
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11148
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11176
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10536
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10720
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2484
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8488
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11196
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11292
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11316
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11332
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11360
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11500
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11520
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11544
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11572
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11596
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11612
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11692
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11916
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11932
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11948
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11972
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12004
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12108
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12140
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12176
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12200
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12216
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12236
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12260
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11288
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12256
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12584
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12576
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12568
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12560
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12552
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12544
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12536
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12528
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12520
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12512
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12504
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12496
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12488
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12480
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12472
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12464
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12456
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12448
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12440
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12432
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12424
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12416
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12408
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12400
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12392
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12384
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12376
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12368
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12360
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12352
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12344
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12336
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12328
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12320
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12312
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12304
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12296
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12196
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12212
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12032
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12172
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11984
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12136
-
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:13016
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa388d055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2696