Resubmissions
15-06-2024 16:17
240615-trpk3szhrk 115-06-2024 16:14
240615-tpvpbawgre 115-06-2024 16:11
240615-tmyceswgmc 315-06-2024 16:07
240615-tk2l3awfrh 1Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 16:07
Static task
static1
Behavioral task
behavioral1
Sample
Ghost.bat
Resource
win10v2004-20240508-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
Ghost.bat
-
Size
28B
-
MD5
0aea348c791992cc0a5124925ebcb4f5
-
SHA1
cd2c331b3f72c8a681b76f59dfe09b825f36caf4
-
SHA256
63c4bb88c34923db9788828192dade8d7850736d9a681c3dc9f6a90ae05c2d3f
-
SHA512
bb08ce72a106e1cbc90b148a64826f0a9c502197f1fe0cbc250eb7f5e0b7f118d964fadcf44e2d408f584343a417890a75d8813662006f265a816ce793bad64e
Score
1/10
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 11816 taskmgr.exe Token: SeSystemProfilePrivilege 11816 taskmgr.exe Token: SeCreateGlobalPrivilege 11816 taskmgr.exe Token: 33 11816 taskmgr.exe Token: SeIncBasePriorityPrivilege 11816 taskmgr.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe -
Suspicious use of SendNotifyMessage 37 IoCs
pid Process 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe 11816 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 364 wrote to memory of 864 364 cmd.exe 90 PID 364 wrote to memory of 864 364 cmd.exe 90 PID 364 wrote to memory of 3212 364 cmd.exe 92 PID 364 wrote to memory of 3212 364 cmd.exe 92 PID 364 wrote to memory of 4592 364 cmd.exe 94 PID 364 wrote to memory of 4592 364 cmd.exe 94 PID 364 wrote to memory of 1700 364 cmd.exe 96 PID 364 wrote to memory of 1700 364 cmd.exe 96 PID 364 wrote to memory of 660 364 cmd.exe 97 PID 364 wrote to memory of 660 364 cmd.exe 97 PID 364 wrote to memory of 2160 364 cmd.exe 98 PID 364 wrote to memory of 2160 364 cmd.exe 98 PID 364 wrote to memory of 4984 364 cmd.exe 101 PID 364 wrote to memory of 4984 364 cmd.exe 101 PID 364 wrote to memory of 4528 364 cmd.exe 102 PID 364 wrote to memory of 4528 364 cmd.exe 102 PID 364 wrote to memory of 3204 364 cmd.exe 103 PID 364 wrote to memory of 3204 364 cmd.exe 103 PID 364 wrote to memory of 736 364 cmd.exe 104 PID 364 wrote to memory of 736 364 cmd.exe 104 PID 364 wrote to memory of 4572 364 cmd.exe 105 PID 364 wrote to memory of 4572 364 cmd.exe 105 PID 364 wrote to memory of 528 364 cmd.exe 107 PID 364 wrote to memory of 528 364 cmd.exe 107 PID 364 wrote to memory of 1692 364 cmd.exe 108 PID 364 wrote to memory of 1692 364 cmd.exe 108 PID 364 wrote to memory of 872 364 cmd.exe 109 PID 364 wrote to memory of 872 364 cmd.exe 109 PID 364 wrote to memory of 1004 364 cmd.exe 111 PID 364 wrote to memory of 1004 364 cmd.exe 111 PID 364 wrote to memory of 2228 364 cmd.exe 112 PID 364 wrote to memory of 2228 364 cmd.exe 112 PID 364 wrote to memory of 388 364 cmd.exe 115 PID 364 wrote to memory of 388 364 cmd.exe 115 PID 364 wrote to memory of 1212 364 cmd.exe 120 PID 364 wrote to memory of 1212 364 cmd.exe 120 PID 364 wrote to memory of 4536 364 cmd.exe 121 PID 364 wrote to memory of 4536 364 cmd.exe 121 PID 364 wrote to memory of 1512 364 cmd.exe 122 PID 364 wrote to memory of 1512 364 cmd.exe 122 PID 364 wrote to memory of 2284 364 cmd.exe 124 PID 364 wrote to memory of 2284 364 cmd.exe 124 PID 364 wrote to memory of 3720 364 cmd.exe 127 PID 364 wrote to memory of 3720 364 cmd.exe 127 PID 364 wrote to memory of 3416 364 cmd.exe 129 PID 364 wrote to memory of 3416 364 cmd.exe 129 PID 364 wrote to memory of 3468 364 cmd.exe 136 PID 364 wrote to memory of 3468 364 cmd.exe 136 PID 364 wrote to memory of 1008 364 cmd.exe 138 PID 364 wrote to memory of 1008 364 cmd.exe 138 PID 364 wrote to memory of 4612 364 cmd.exe 140 PID 364 wrote to memory of 4612 364 cmd.exe 140 PID 364 wrote to memory of 4120 364 cmd.exe 142 PID 364 wrote to memory of 4120 364 cmd.exe 142 PID 364 wrote to memory of 460 364 cmd.exe 144 PID 364 wrote to memory of 460 364 cmd.exe 144 PID 364 wrote to memory of 1852 364 cmd.exe 146 PID 364 wrote to memory of 1852 364 cmd.exe 146 PID 364 wrote to memory of 2844 364 cmd.exe 148 PID 364 wrote to memory of 2844 364 cmd.exe 148 PID 364 wrote to memory of 3312 364 cmd.exe 150 PID 364 wrote to memory of 3312 364 cmd.exe 150 PID 364 wrote to memory of 428 364 cmd.exe 152 PID 364 wrote to memory of 428 364 cmd.exe 152
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Ghost.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Windows\system32\cmd.execmd.exe2⤵PID:864
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3212
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4592
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1700
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:660
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2160
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4984
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4528
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3204
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:736
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4572
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:528
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1692
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:872
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1004
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2228
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:388
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1212
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4536
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1512
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2284
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3720
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3416
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3468
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1008
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4612
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4120
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:460
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1852
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2844
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3312
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:428
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5148
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5164
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5192
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5264
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5288
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5368
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5388
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5416
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5492
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5520
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5596
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5612
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5676
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5684
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5764
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5812
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5840
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5876
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5900
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5932
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6028
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6080
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6100
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6128
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5232
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5312
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5412
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6216
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6224
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6336
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6344
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6384
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6400
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6496
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6504
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6616
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6716
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6736
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6760
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6836
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6852
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6924
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6976
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7016
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7032
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7056
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7164
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6236
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6448
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4920
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7176
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7336
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7352
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7388
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7428
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7616
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7636
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7660
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7676
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7784
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7800
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7880
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7900
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7940
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7968
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8064
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8080
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8088
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8104
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8136
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8152
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7276
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8248
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8256
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8364
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8484
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8500
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8508
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8516
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8524
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8532
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8700
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8716
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8740
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8748
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8756
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8764
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8772
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8972
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9120
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9148
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9156
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9188
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9196
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8568
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8560
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8584
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8736
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8792
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8816
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8988
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9144
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9220
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9228
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9236
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9244
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9252
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9260
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9268
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9276
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9284
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9292
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9300
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9308
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9316
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9324
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9332
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9340
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9392
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9716
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10236
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9428
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9872
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10252
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10664
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10680
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10688
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10696
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10704
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10712
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10720
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10728
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10736
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10744
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10752
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10760
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10768
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10776
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10784
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10792
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10800
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10808
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10816
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10824
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10896
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4180,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=4072 /prefetch:81⤵PID:6608
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:11816
-
C:\Windows\System32\NOTEPAD.EXE"C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\Desktop\totally not a virus.bat1⤵PID:8800