Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 21:25
Static task
static1
Behavioral task
behavioral1
Sample
LetalPeligro.bat
Resource
win7-20240508-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
LetalPeligro.bat
Resource
win10v2004-20240508-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
LetalPeligro.bat
-
Size
1KB
-
MD5
a87379fdfbe8715783c8b6a4f9bd301f
-
SHA1
471a1adc49ec2f4c5ba4c50dafb39acc59401064
-
SHA256
31a4a4132a9a69f8257a7bab342a975d456da7cdeaf59d29abec75196038719a
-
SHA512
73b46464b3f856321dfe7ec10251e36acba466ac9cd61fb57ac7e4f619396bddb144fb6f79549e501c9e2e02c52ba397cfdd783256d759aa84db6a6124f8be01
Score
1/10
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
dwm.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID dwm.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
dwm.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 18 IoCs
Processes:
dwm.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
dwm.exedescription pid process Token: SeCreateGlobalPrivilege 116 dwm.exe Token: SeChangeNotifyPrivilege 116 dwm.exe Token: 33 116 dwm.exe Token: SeIncBasePriorityPrivilege 116 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.exedescription pid process target process PID 2484 wrote to memory of 2996 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 2996 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 2516 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 2516 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 4544 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 4544 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 4200 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 4200 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 3912 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 3912 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 2364 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 2364 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 2024 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 2024 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 2116 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 2116 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 4352 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 4352 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 4860 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 4860 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 1928 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 1928 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 4400 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 4400 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 3292 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 3292 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 3732 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 3732 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 3936 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 3936 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 4088 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 4088 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 2304 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 2304 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 3304 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 3304 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 3564 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 3564 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 4020 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 4020 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 5108 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 5108 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 4316 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 4316 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 624 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 624 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 1588 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 1588 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 1548 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 1548 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 3796 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 3796 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 2924 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 2924 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 1484 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 1484 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 3748 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 3748 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 4208 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 4208 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 956 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 956 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 3088 2484 cmd.exe cmd.exe PID 2484 wrote to memory of 3088 2484 cmd.exe cmd.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\LetalPeligro.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\system32\cmd.execmd2⤵PID:2996
-
-
C:\Windows\system32\cmd.execmd2⤵PID:2516
-
-
C:\Windows\system32\cmd.execmd2⤵PID:4544
-
-
C:\Windows\system32\cmd.execmd2⤵PID:4200
-
-
C:\Windows\system32\cmd.execmd2⤵PID:3912
-
-
C:\Windows\system32\cmd.execmd2⤵PID:2364
-
-
C:\Windows\system32\cmd.execmd2⤵PID:2024
-
-
C:\Windows\system32\cmd.execmd2⤵PID:2116
-
-
C:\Windows\system32\cmd.execmd2⤵PID:4352
-
-
C:\Windows\system32\cmd.execmd2⤵PID:4860
-
-
C:\Windows\system32\cmd.execmd2⤵PID:1928
-
-
C:\Windows\system32\cmd.execmd2⤵PID:4400
-
-
C:\Windows\system32\cmd.execmd2⤵PID:3292
-
-
C:\Windows\system32\cmd.execmd2⤵PID:3732
-
-
C:\Windows\system32\cmd.execmd2⤵PID:3936
-
-
C:\Windows\system32\cmd.execmd2⤵PID:4088
-
-
C:\Windows\system32\cmd.execmd2⤵PID:2304
-
-
C:\Windows\system32\cmd.execmd2⤵PID:3304
-
-
C:\Windows\system32\cmd.execmd2⤵PID:3564
-
-
C:\Windows\system32\cmd.execmd2⤵PID:4020
-
-
C:\Windows\system32\cmd.execmd2⤵PID:5108
-
-
C:\Windows\system32\cmd.execmd2⤵PID:4316
-
-
C:\Windows\system32\cmd.execmd2⤵PID:624
-
-
C:\Windows\system32\cmd.execmd2⤵PID:1588
-
-
C:\Windows\system32\cmd.execmd2⤵PID:1548
-
-
C:\Windows\system32\cmd.execmd2⤵PID:3796
-
-
C:\Windows\system32\cmd.execmd2⤵PID:2924
-
-
C:\Windows\system32\cmd.execmd2⤵PID:1484
-
-
C:\Windows\system32\cmd.execmd2⤵PID:3748
-
-
C:\Windows\system32\cmd.execmd2⤵PID:4208
-
-
C:\Windows\system32\cmd.execmd2⤵PID:956
-
-
C:\Windows\system32\cmd.execmd2⤵PID:3088
-
-
C:\Windows\system32\cmd.execmd2⤵PID:2320
-
-
C:\Windows\system32\cmd.execmd2⤵PID:3504
-
-
C:\Windows\system32\cmd.execmd2⤵PID:3596
-
-
C:\Windows\system32\cmd.execmd2⤵PID:1676
-
-
C:\Windows\system32\cmd.execmd2⤵PID:5144
-
-
C:\Windows\system32\cmd.execmd2⤵PID:5160
-
-
C:\Windows\system32\cmd.execmd2⤵PID:5188
-
-
C:\Windows\system32\cmd.execmd2⤵PID:5300
-
-
C:\Windows\system32\cmd.execmd2⤵PID:5368
-
-
C:\Windows\system32\cmd.execmd2⤵PID:5384
-
-
C:\Windows\system32\cmd.execmd2⤵PID:5408
-
-
C:\Windows\system32\cmd.execmd2⤵PID:5424
-
-
C:\Windows\system32\cmd.execmd2⤵PID:5456
-
-
C:\Windows\system32\cmd.execmd2⤵PID:5504
-
-
C:\Windows\system32\cmd.execmd2⤵PID:5536
-
-
C:\Windows\system32\cmd.execmd2⤵PID:5648
-
-
C:\Windows\system32\cmd.execmd2⤵PID:5664
-
-
C:\Windows\system32\cmd.execmd2⤵PID:5752
-
-
C:\Windows\system32\cmd.execmd2⤵PID:5776
-
-
C:\Windows\system32\cmd.execmd2⤵PID:5804
-
-
C:\Windows\system32\cmd.execmd2⤵PID:5836
-
-
C:\Windows\system32\cmd.execmd2⤵PID:5952
-
-
C:\Windows\system32\cmd.execmd2⤵PID:5972
-
-
C:\Windows\system32\cmd.execmd2⤵PID:6044
-
-
C:\Windows\system32\cmd.execmd2⤵PID:6064
-
-
C:\Windows\system32\cmd.execmd2⤵PID:6072
-
-
C:\Windows\system32\cmd.execmd2⤵PID:6100
-
-
C:\Windows\system32\cmd.execmd2⤵PID:5400
-
-
C:\Windows\system32\cmd.execmd2⤵PID:6112
-
-
C:\Windows\system32\cmd.execmd2⤵PID:5524
-
-
C:\Windows\system32\cmd.execmd2⤵PID:6168
-
-
C:\Windows\system32\cmd.execmd2⤵PID:6188
-
-
C:\Windows\system32\cmd.execmd2⤵PID:6224
-
-
C:\Windows\system32\cmd.execmd2⤵PID:6336
-
-
C:\Windows\system32\cmd.execmd2⤵PID:6396
-
-
C:\Windows\system32\cmd.execmd2⤵PID:6420
-
-
C:\Windows\system32\cmd.execmd2⤵PID:6436
-
-
C:\Windows\system32\cmd.execmd2⤵PID:6472
-
-
C:\Windows\system32\cmd.execmd2⤵PID:6512
-
-
C:\Windows\system32\cmd.execmd2⤵PID:6608
-
-
C:\Windows\system32\cmd.execmd2⤵PID:6632
-
-
C:\Windows\system32\cmd.execmd2⤵PID:6660
-
-
C:\Windows\system32\cmd.execmd2⤵PID:6700
-
-
C:\Windows\system32\cmd.execmd2⤵PID:6724
-
-
C:\Windows\system32\cmd.execmd2⤵PID:6760
-
-
C:\Windows\system32\cmd.execmd2⤵PID:6884
-
-
C:\Windows\system32\cmd.execmd2⤵PID:6908
-
-
C:\Windows\system32\cmd.execmd2⤵PID:6932
-
-
C:\Windows\system32\cmd.execmd2⤵PID:6964
-
-
C:\Windows\system32\cmd.execmd2⤵PID:6996
-
-
C:\Windows\system32\cmd.execmd2⤵PID:7080
-
-
C:\Windows\system32\cmd.execmd2⤵PID:7164
-
-
C:\Windows\system32\cmd.execmd2⤵PID:6220
-
-
C:\Windows\system32\cmd.execmd2⤵PID:6432
-
-
C:\Windows\system32\cmd.execmd2⤵PID:6772
-
-
C:\Windows\system32\cmd.execmd2⤵PID:6976
-
-
C:\Windows\system32\cmd.execmd2⤵PID:6644
-
-
C:\Windows\system32\cmd.execmd2⤵PID:7276
-
-
C:\Windows\system32\cmd.execmd2⤵PID:7292
-
-
C:\Windows\system32\cmd.execmd2⤵PID:7416
-
-
C:\Windows\system32\cmd.execmd2⤵PID:7432
-
-
C:\Windows\system32\cmd.execmd2⤵PID:7500
-
-
C:\Windows\system32\cmd.execmd2⤵PID:7544
-
-
C:\Windows\system32\cmd.execmd2⤵PID:7568
-
-
C:\Windows\system32\cmd.execmd2⤵PID:7632
-
-
C:\Windows\system32\cmd.execmd2⤵PID:7640
-
-
C:\Windows\system32\cmd.execmd2⤵PID:7728
-
-
C:\Windows\system32\cmd.execmd2⤵PID:7744
-
-
C:\Windows\system32\cmd.execmd2⤵PID:7752
-
-
C:\Windows\system32\cmd.execmd2⤵PID:7760
-
-
C:\Windows\system32\cmd.execmd2⤵PID:7768
-
-
C:\Windows\system32\cmd.execmd2⤵PID:7776
-
-
C:\Windows\system32\cmd.execmd2⤵PID:7844
-
-
C:\Windows\system32\cmd.execmd2⤵PID:7852
-
-
C:\Windows\system32\cmd.execmd2⤵PID:7860
-
-
C:\Windows\system32\cmd.execmd2⤵PID:7868
-
-
C:\Windows\system32\cmd.execmd2⤵PID:7876
-
-
C:\Windows\system32\cmd.execmd2⤵PID:7884
-
-
C:\Windows\system32\cmd.execmd2⤵PID:7892
-
-
C:\Windows\system32\cmd.execmd2⤵PID:7900
-
-
C:\Windows\system32\cmd.execmd2⤵PID:7908
-
-
C:\Windows\system32\cmd.execmd2⤵PID:7980
-
-
C:\Windows\system32\cmd.execmd2⤵PID:8212
-
-
C:\Windows\system32\cmd.execmd2⤵PID:8228
-
-
C:\Windows\system32\cmd.execmd2⤵PID:8236
-
-
C:\Windows\system32\cmd.execmd2⤵PID:8244
-
-
C:\Windows\system32\cmd.execmd2⤵PID:8252
-
-
C:\Windows\system32\cmd.execmd2⤵PID:8260
-
-
C:\Windows\system32\cmd.execmd2⤵PID:8356
-
-
C:\Windows\system32\cmd.execmd2⤵PID:8496
-
-
C:\Windows\system32\cmd.execmd2⤵PID:8528
-
-
C:\Windows\system32\cmd.execmd2⤵PID:8548
-
-
C:\Windows\system32\cmd.execmd2⤵PID:8556
-
-
C:\Windows\system32\cmd.execmd2⤵PID:8876
-
-
C:\Windows\system32\cmd.execmd2⤵PID:8900
-
-
C:\Windows\system32\cmd.execmd2⤵PID:8912
-
-
C:\Windows\system32\cmd.execmd2⤵PID:8920
-
-
C:\Windows\system32\cmd.execmd2⤵PID:8928
-
-
C:\Windows\system32\cmd.execmd2⤵PID:8936
-
-
C:\Windows\system32\cmd.execmd2⤵PID:8944
-
-
C:\Windows\system32\cmd.execmd2⤵PID:8952
-
-
C:\Windows\system32\cmd.execmd2⤵PID:8960
-
-
C:\Windows\system32\cmd.execmd2⤵PID:8972
-
-
C:\Windows\system32\cmd.execmd2⤵PID:8980
-
-
C:\Windows\system32\cmd.execmd2⤵PID:8988
-
-
C:\Windows\system32\cmd.execmd2⤵PID:9012
-
-
C:\Windows\system32\cmd.execmd2⤵PID:9288
-
-
C:\Windows\system32\cmd.execmd2⤵PID:9304
-
-
C:\Windows\system32\cmd.execmd2⤵PID:9312
-
-
C:\Windows\system32\cmd.execmd2⤵PID:9536
-
-
C:\Windows\system32\cmd.execmd2⤵PID:9556
-
-
C:\Windows\system32\cmd.execmd2⤵PID:9564
-
-
C:\Windows\system32\cmd.execmd2⤵PID:9572
-
-
C:\Windows\system32\cmd.execmd2⤵PID:9580
-
-
C:\Windows\system32\cmd.execmd2⤵PID:9588
-
-
C:\Windows\system32\cmd.execmd2⤵PID:9596
-
-
C:\Windows\system32\cmd.execmd2⤵PID:9604
-
-
C:\Windows\system32\cmd.execmd2⤵PID:9612
-
-
C:\Windows\system32\cmd.execmd2⤵PID:9620
-
-
C:\Windows\system32\cmd.execmd2⤵PID:9628
-
-
C:\Windows\system32\cmd.execmd2⤵PID:9636
-
-
C:\Windows\system32\cmd.execmd2⤵PID:9644
-
-
C:\Windows\system32\cmd.execmd2⤵PID:9652
-
-
C:\Windows\system32\cmd.execmd2⤵PID:9660
-
-
C:\Windows\system32\cmd.execmd2⤵PID:9668
-
-
C:\Windows\system32\cmd.execmd2⤵PID:9676
-
-
C:\Windows\system32\cmd.execmd2⤵PID:9736
-
-
C:\Windows\system32\cmd.execmd2⤵PID:9732
-
-
C:\Windows\system32\cmd.execmd2⤵PID:10244
-
-
C:\Windows\system32\cmd.execmd2⤵PID:10252
-
-
C:\Windows\system32\cmd.execmd2⤵PID:10260
-
-
C:\Windows\system32\cmd.execmd2⤵PID:10268
-
-
C:\Windows\system32\cmd.execmd2⤵PID:10276
-
-
C:\Windows\system32\cmd.execmd2⤵PID:10284
-
-
C:\Windows\system32\cmd.execmd2⤵PID:10292
-
-
C:\Windows\system32\cmd.execmd2⤵PID:10300
-
-
C:\Windows\system32\cmd.execmd2⤵PID:10308
-
-
C:\Windows\system32\cmd.execmd2⤵PID:10320
-
-
C:\Windows\system32\cmd.execmd2⤵PID:10384
-
-
C:\Windows\system32\cmd.execmd2⤵PID:10776
-
-
C:\Windows\system32\cmd.execmd2⤵PID:10916
-
-
C:\Windows\system32\cmd.execmd2⤵PID:10940
-
-
C:\Windows\system32\cmd.execmd2⤵PID:10956
-
-
C:\Windows\system32\cmd.execmd2⤵PID:10980
-
-
C:\Windows\system32\cmd.execmd2⤵PID:11156
-
-
C:\Windows\system32\cmd.execmd2⤵PID:11196
-
-
C:\Windows\system32\cmd.execmd2⤵PID:11220
-
-
C:\Windows\system32\cmd.execmd2⤵PID:11228
-
-
C:\Windows\system32\cmd.execmd2⤵PID:11252
-
-
C:\Windows\system32\cmd.execmd2⤵PID:11260
-
-
C:\Windows\system32\cmd.execmd2⤵PID:10404
-
-
C:\Windows\system32\cmd.execmd2⤵PID:10456
-
-
C:\Windows\system32\cmd.execmd2⤵PID:10376
-
-
C:\Windows\system32\cmd.execmd2⤵PID:10448
-
-
C:\Windows\system32\cmd.execmd2⤵PID:10480
-
-
C:\Windows\system32\cmd.execmd2⤵PID:10396
-
-
C:\Windows\system32\cmd.execmd2⤵PID:1184
-
-
C:\Windows\system32\cmd.execmd2⤵PID:10968
-
-
C:\Windows\system32\cmd.execmd2⤵PID:10996
-
-
C:\Windows\system32\cmd.execmd2⤵PID:11172
-
-
C:\Windows\system32\cmd.execmd2⤵PID:11272
-
-
C:\Windows\system32\cmd.execmd2⤵PID:11280
-
-
C:\Windows\system32\cmd.execmd2⤵PID:11288
-
-
C:\Windows\system32\cmd.execmd2⤵PID:11296
-
-
C:\Windows\system32\cmd.execmd2⤵PID:11304
-
-
C:\Windows\system32\cmd.execmd2⤵PID:11312
-
-
C:\Windows\system32\cmd.execmd2⤵PID:11320
-
-
C:\Windows\system32\cmd.execmd2⤵PID:11328
-
-
C:\Windows\system32\cmd.execmd2⤵PID:11336
-
-
C:\Windows\system32\cmd.execmd2⤵PID:11344
-
-
C:\Windows\system32\cmd.execmd2⤵PID:11352
-
-
C:\Windows\system32\cmd.execmd2⤵PID:11360
-
-
C:\Windows\system32\cmd.execmd2⤵PID:11368
-
-
C:\Windows\system32\cmd.execmd2⤵PID:11376
-
-
C:\Windows\system32\cmd.execmd2⤵PID:11384
-
-
C:\Windows\system32\cmd.execmd2⤵PID:11392
-
-
C:\Windows\system32\cmd.execmd2⤵PID:11400
-
-
C:\Windows\system32\cmd.execmd2⤵PID:11408
-
-
C:\Windows\system32\cmd.execmd2⤵PID:11416
-
-
C:\Windows\system32\cmd.execmd2⤵PID:11424
-
-
C:\Windows\system32\cmd.execmd2⤵PID:11432
-
-
C:\Windows\system32\cmd.execmd2⤵PID:11440
-
-
C:\Windows\system32\cmd.execmd2⤵PID:11448
-
-
C:\Windows\system32\cmd.execmd2⤵PID:11456
-
-
C:\Windows\system32\cmd.execmd2⤵PID:11464
-
-
C:\Windows\system32\cmd.execmd2⤵PID:12348
-
-
C:\Windows\system32\cmd.execmd2⤵PID:12380
-
-
C:\Windows\system32\cmd.execmd2⤵PID:12388
-
-
C:\Windows\system32\cmd.execmd2⤵PID:12396
-
-
C:\Windows\system32\cmd.execmd2⤵PID:12404
-
-
C:\Windows\system32\cmd.execmd2⤵PID:12412
-
-
C:\Windows\system32\cmd.execmd2⤵PID:12420
-
-
C:\Windows\system32\cmd.execmd2⤵PID:12428
-
-
C:\Windows\system32\cmd.execmd2⤵PID:12436
-
-
C:\Windows\system32\cmd.execmd2⤵PID:12444
-
-
C:\Windows\system32\cmd.execmd2⤵PID:12452
-
-
C:\Windows\system32\cmd.execmd2⤵PID:12460
-
-
C:\Windows\system32\cmd.execmd2⤵PID:12468
-
-
C:\Windows\system32\cmd.execmd2⤵PID:12476
-
-
C:\Windows\system32\cmd.execmd2⤵PID:12484
-
-
C:\Windows\system32\cmd.execmd2⤵PID:12492
-
-
C:\Windows\system32\cmd.execmd2⤵PID:12500
-
-
C:\Windows\system32\cmd.execmd2⤵PID:2748
-
-
C:\Windows\system32\cmd.execmd2⤵PID:13120
-
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:116