Analysis
-
max time kernel
44s -
max time network
21s -
platform
windows10-2004_x64 -
resource
win10v2004-20240220-en -
resource tags
arch:x64arch:x86image:win10v2004-20240220-enlocale:en-usos:windows10-2004-x64system -
submitted
20/02/2024, 14:29
Static task
static1
Behavioral task
behavioral1
Sample
pptx.bat
Resource
win7-20231215-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
pptx.bat
Resource
win10v2004-20240220-en
5 signatures
150 seconds
General
-
Target
pptx.bat
-
Size
29B
-
MD5
03fa159eb8a21bd4b07e2996464bd515
-
SHA1
a553080552b1bd35c071c3ef2fe069f2d730080c
-
SHA256
f7f80dcadc4d2c966e6cc3ab2a11b35220e8416f40d5b61c5db45774d2d910a2
-
SHA512
8dc19517a427ae61ea4d9c9694ea5adfb320c8534ecca390caba239a109783daea6afa63c46cb4d55b3c581992138533f923cfa82f9c5fd71e929c5a963414a8
Score
1/10
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID dwm.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeCreateGlobalPrivilege 12320 dwm.exe Token: SeChangeNotifyPrivilege 12320 dwm.exe Token: 33 12320 dwm.exe Token: SeIncBasePriorityPrivilege 12320 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2496 wrote to memory of 4256 2496 cmd.exe 84 PID 2496 wrote to memory of 4256 2496 cmd.exe 84 PID 2496 wrote to memory of 3528 2496 cmd.exe 86 PID 2496 wrote to memory of 3528 2496 cmd.exe 86 PID 2496 wrote to memory of 1784 2496 cmd.exe 89 PID 2496 wrote to memory of 1784 2496 cmd.exe 89 PID 2496 wrote to memory of 984 2496 cmd.exe 248 PID 2496 wrote to memory of 984 2496 cmd.exe 248 PID 2496 wrote to memory of 936 2496 cmd.exe 247 PID 2496 wrote to memory of 936 2496 cmd.exe 247 PID 2496 wrote to memory of 1372 2496 cmd.exe 246 PID 2496 wrote to memory of 1372 2496 cmd.exe 246 PID 2496 wrote to memory of 2172 2496 cmd.exe 245 PID 2496 wrote to memory of 2172 2496 cmd.exe 245 PID 2496 wrote to memory of 464 2496 cmd.exe 244 PID 2496 wrote to memory of 464 2496 cmd.exe 244 PID 2496 wrote to memory of 3584 2496 cmd.exe 243 PID 2496 wrote to memory of 3584 2496 cmd.exe 243 PID 2496 wrote to memory of 2008 2496 cmd.exe 242 PID 2496 wrote to memory of 2008 2496 cmd.exe 242 PID 2496 wrote to memory of 3000 2496 cmd.exe 241 PID 2496 wrote to memory of 3000 2496 cmd.exe 241 PID 2496 wrote to memory of 2752 2496 cmd.exe 240 PID 2496 wrote to memory of 2752 2496 cmd.exe 240 PID 2496 wrote to memory of 5104 2496 cmd.exe 91 PID 2496 wrote to memory of 5104 2496 cmd.exe 91 PID 2496 wrote to memory of 4820 2496 cmd.exe 239 PID 2496 wrote to memory of 4820 2496 cmd.exe 239 PID 2496 wrote to memory of 2748 2496 cmd.exe 238 PID 2496 wrote to memory of 2748 2496 cmd.exe 238 PID 2496 wrote to memory of 1972 2496 cmd.exe 237 PID 2496 wrote to memory of 1972 2496 cmd.exe 237 PID 2496 wrote to memory of 2080 2496 cmd.exe 236 PID 2496 wrote to memory of 2080 2496 cmd.exe 236 PID 2496 wrote to memory of 3224 2496 cmd.exe 234 PID 2496 wrote to memory of 3224 2496 cmd.exe 234 PID 2496 wrote to memory of 1956 2496 cmd.exe 231 PID 2496 wrote to memory of 1956 2496 cmd.exe 231 PID 2496 wrote to memory of 5064 2496 cmd.exe 229 PID 2496 wrote to memory of 5064 2496 cmd.exe 229 PID 2496 wrote to memory of 1092 2496 cmd.exe 227 PID 2496 wrote to memory of 1092 2496 cmd.exe 227 PID 2496 wrote to memory of 3044 2496 cmd.exe 225 PID 2496 wrote to memory of 3044 2496 cmd.exe 225 PID 2496 wrote to memory of 3444 2496 cmd.exe 223 PID 2496 wrote to memory of 3444 2496 cmd.exe 223 PID 2496 wrote to memory of 3972 2496 cmd.exe 222 PID 2496 wrote to memory of 3972 2496 cmd.exe 222 PID 2496 wrote to memory of 1272 2496 cmd.exe 221 PID 2496 wrote to memory of 1272 2496 cmd.exe 221 PID 2496 wrote to memory of 2148 2496 cmd.exe 220 PID 2496 wrote to memory of 2148 2496 cmd.exe 220 PID 2496 wrote to memory of 4936 2496 cmd.exe 219 PID 2496 wrote to memory of 4936 2496 cmd.exe 219 PID 2496 wrote to memory of 2300 2496 cmd.exe 217 PID 2496 wrote to memory of 2300 2496 cmd.exe 217 PID 2496 wrote to memory of 1020 2496 cmd.exe 215 PID 2496 wrote to memory of 1020 2496 cmd.exe 215 PID 2496 wrote to memory of 4576 2496 cmd.exe 214 PID 2496 wrote to memory of 4576 2496 cmd.exe 214 PID 2496 wrote to memory of 4020 2496 cmd.exe 92 PID 2496 wrote to memory of 4020 2496 cmd.exe 92 PID 2496 wrote to memory of 428 2496 cmd.exe 213 PID 2496 wrote to memory of 428 2496 cmd.exe 213
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\pptx.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\system32\cmd.execmd.exe2⤵PID:4256
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3528
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1784
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5104
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4020
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5856
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5912
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5904
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5896
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5888
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5880
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5872
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4220
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2424
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5972
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3684
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2256
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:432
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3644
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2124
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1376
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3272
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5028
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:840
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2324
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3320
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4460
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2904
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:980
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4496
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4016
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:64
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4296
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4472
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4904
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4444
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2196
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4284
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1484
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3716
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1232
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3068
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2972
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2916
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3520
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3576
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3212
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:644
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:764
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4700
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1572
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1844
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3928
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4424
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3248
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4952
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:428
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4576
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1020
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2300
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4936
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2148
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1272
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3972
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3444
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3044
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1092
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5064
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1956
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3224
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2080
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1972
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2748
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4820
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2752
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3000
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2008
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3584
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:464
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2172
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1372
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:936
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:984
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4864
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4884
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5220
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2660
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6296
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6332
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6324
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6316
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6968
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6992
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7076
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7152
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7160
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6360
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7292
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7284
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7276
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7268
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7260
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7252
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7244
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7236
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7228
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7220
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7212
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7204
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7196
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7188
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7180
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7172
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7792
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7824
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7948
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7940
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7932
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7924
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7916
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7908
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7900
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7380
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7844
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7816
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8388
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8404
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8488
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8496
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8480
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8472
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8464
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8456
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8448
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8440
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8432
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8788
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8844
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8836
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8828
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8820
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8812
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8804
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9104
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8508
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8528
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8548
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8880
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9424
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9416
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9408
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9400
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9392
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9384
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9376
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9368
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9360
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9352
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9344
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9336
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9328
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9320
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9312
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9304
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9296
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9288
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9280
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9272
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9264
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9256
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9248
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9240
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9232
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10416
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10472
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10964
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10408
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10400
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10392
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10384
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10376
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10368
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10360
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10352
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10344
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10336
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10328
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10320
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10312
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10304
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10296
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10288
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10280
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10272
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10264
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10256
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10248
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9744
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9864
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9680
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9696
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9656
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9640
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9616
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9520
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9648
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9492
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9476
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9460
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9444
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8608
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11620
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11956
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11948
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11940
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11932
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11924
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11916
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11908
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11900
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11892
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11884
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11876
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11868
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11860
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11852
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11844
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11836
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11828
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11820
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11812
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11804
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11796
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11788
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11780
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11772
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11764
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11756
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11748
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11740
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11732
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11724
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11716
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11708
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11700
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11692
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11684
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12552
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12560
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12564
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12780
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9908
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11032
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11148
-
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:12320