Analysis
-
max time kernel
134s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
05-07-2024 20:37
Static task
static1
Behavioral task
behavioral1
Sample
ForkBomb.bat
Resource
win7-20240705-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
ForkBomb.bat
Resource
win10v2004-20240508-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
ForkBomb.bat
-
Size
32B
-
MD5
534dd941a1ed7483a08096b994a964b1
-
SHA1
6ffc7ddd05b6911259f29ae62db2a1cbea1d2cbf
-
SHA256
f01bbdd2bad9915331a43aeb3c06850c09fc2deae29ca2ecedc8dd56a75e2804
-
SHA512
342deba7a374d0ffb30a6932563050c654fcf8b425e588a2efb261b0fc188b2b0e4f779c0637e67398c1817e143e4279dc21be826bbe1818ce06815cc6ed3435
Score
1/10
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID dwm.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeCreateGlobalPrivilege 12968 dwm.exe Token: SeChangeNotifyPrivilege 12968 dwm.exe Token: 33 12968 dwm.exe Token: SeIncBasePriorityPrivilege 12968 dwm.exe Token: SeShutdownPrivilege 12968 dwm.exe Token: SeCreatePagefilePrivilege 12968 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4864 wrote to memory of 2008 4864 cmd.exe 81 PID 4864 wrote to memory of 2008 4864 cmd.exe 81 PID 4864 wrote to memory of 2208 4864 cmd.exe 83 PID 4864 wrote to memory of 2208 4864 cmd.exe 83 PID 4864 wrote to memory of 3640 4864 cmd.exe 85 PID 4864 wrote to memory of 3640 4864 cmd.exe 85 PID 4864 wrote to memory of 1800 4864 cmd.exe 86 PID 4864 wrote to memory of 1800 4864 cmd.exe 86 PID 4864 wrote to memory of 2636 4864 cmd.exe 87 PID 4864 wrote to memory of 2636 4864 cmd.exe 87 PID 4864 wrote to memory of 2224 4864 cmd.exe 88 PID 4864 wrote to memory of 2224 4864 cmd.exe 88 PID 4864 wrote to memory of 4364 4864 cmd.exe 93 PID 4864 wrote to memory of 4364 4864 cmd.exe 93 PID 4864 wrote to memory of 2060 4864 cmd.exe 94 PID 4864 wrote to memory of 2060 4864 cmd.exe 94 PID 4864 wrote to memory of 4412 4864 cmd.exe 95 PID 4864 wrote to memory of 4412 4864 cmd.exe 95 PID 4864 wrote to memory of 1652 4864 cmd.exe 98 PID 4864 wrote to memory of 1652 4864 cmd.exe 98 PID 4864 wrote to memory of 1460 4864 cmd.exe 99 PID 4864 wrote to memory of 1460 4864 cmd.exe 99 PID 4864 wrote to memory of 1468 4864 cmd.exe 101 PID 4864 wrote to memory of 1468 4864 cmd.exe 101 PID 4864 wrote to memory of 4776 4864 cmd.exe 103 PID 4864 wrote to memory of 4776 4864 cmd.exe 103 PID 4864 wrote to memory of 3116 4864 cmd.exe 105 PID 4864 wrote to memory of 3116 4864 cmd.exe 105 PID 4864 wrote to memory of 4720 4864 cmd.exe 107 PID 4864 wrote to memory of 4720 4864 cmd.exe 107 PID 4864 wrote to memory of 216 4864 cmd.exe 108 PID 4864 wrote to memory of 216 4864 cmd.exe 108 PID 4864 wrote to memory of 4400 4864 cmd.exe 111 PID 4864 wrote to memory of 4400 4864 cmd.exe 111 PID 4864 wrote to memory of 1696 4864 cmd.exe 115 PID 4864 wrote to memory of 1696 4864 cmd.exe 115 PID 4864 wrote to memory of 4052 4864 cmd.exe 117 PID 4864 wrote to memory of 4052 4864 cmd.exe 117 PID 4864 wrote to memory of 4124 4864 cmd.exe 119 PID 4864 wrote to memory of 4124 4864 cmd.exe 119 PID 4864 wrote to memory of 844 4864 cmd.exe 120 PID 4864 wrote to memory of 844 4864 cmd.exe 120 PID 4864 wrote to memory of 4480 4864 cmd.exe 122 PID 4864 wrote to memory of 4480 4864 cmd.exe 122 PID 4864 wrote to memory of 4516 4864 cmd.exe 125 PID 4864 wrote to memory of 4516 4864 cmd.exe 125 PID 4864 wrote to memory of 900 4864 cmd.exe 126 PID 4864 wrote to memory of 900 4864 cmd.exe 126 PID 4864 wrote to memory of 4580 4864 cmd.exe 128 PID 4864 wrote to memory of 4580 4864 cmd.exe 128 PID 4864 wrote to memory of 2112 4864 cmd.exe 131 PID 4864 wrote to memory of 2112 4864 cmd.exe 131 PID 4864 wrote to memory of 4120 4864 cmd.exe 133 PID 4864 wrote to memory of 4120 4864 cmd.exe 133 PID 4864 wrote to memory of 64 4864 cmd.exe 135 PID 4864 wrote to memory of 64 4864 cmd.exe 135 PID 4864 wrote to memory of 2056 4864 cmd.exe 137 PID 4864 wrote to memory of 2056 4864 cmd.exe 137 PID 4864 wrote to memory of 4172 4864 cmd.exe 138 PID 4864 wrote to memory of 4172 4864 cmd.exe 138 PID 4864 wrote to memory of 2512 4864 cmd.exe 141 PID 4864 wrote to memory of 2512 4864 cmd.exe 141 PID 4864 wrote to memory of 3384 4864 cmd.exe 142 PID 4864 wrote to memory of 3384 4864 cmd.exe 142
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ForkBomb.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\system32\cmd.execmd.exe2⤵PID:2008
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2208
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3640
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1800
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2636
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2224
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4364
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2060
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4412
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1652
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1460
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1468
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4776
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3116
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4720
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:216
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4400
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1696
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4052
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4124
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:844
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4480
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4516
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:900
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4580
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2112
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4120
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:64
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2056
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4172
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2512
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:3384
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2816
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1276
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2980
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4732
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2228
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2780
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4904
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4916
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1112
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:608
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4244
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:624
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1980
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1876
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4696
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5148
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5172
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5184
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5208
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5260
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5292
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5412
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5420
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5436
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5520
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5544
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5624
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5644
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5664
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5684
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5720
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5748
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5896
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5904
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5940
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5956
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5964
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5984
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6000
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6020
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6052
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6064
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6072
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6080
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6088
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6096
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6116
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6128
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1636
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5252
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5448
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5760
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6164
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6644
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6804
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6820
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6844
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6872
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6904
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7032
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7052
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7076
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7084
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7136
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7164
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:6592
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7188
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7200
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7216
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7276
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7288
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7324
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7332
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7464
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7564
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7616
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7624
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7640
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7664
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7684
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7692
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7748
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7876
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7912
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:7932
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8068
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8096
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8104
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8112
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8120
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8128
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8228
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8244
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8252
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8260
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8268
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8284
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8292
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8300
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8308
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8316
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8324
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8340
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8348
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8356
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8364
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8372
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8380
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8396
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8432
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8440
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8448
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8456
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8464
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8472
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8552
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8560
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8568
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8576
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8584
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8596
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8616
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8636
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8664
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8696
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8736
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8752
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8760
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8768
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8792
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8820
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8844
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8852
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8868
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8892
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8920
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8940
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8964
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:8984
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9924
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9952
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9960
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9968
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9992
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10024
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10032
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10040
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10052
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10072
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10092
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10112
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10144
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10160
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10184
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10204
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10228
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9016
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9352
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:9420
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10008
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10064
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10268
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10296
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10328
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10352
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10372
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:10400
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11404
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11460
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11476
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11484
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11492
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11508
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11540
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11564
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11580
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11608
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11636
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11648
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11676
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11708
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11740
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11748
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11756
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11764
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11772
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11780
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11788
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11796
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11828
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11836
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11860
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11876
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11884
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11892
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11900
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11908
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11916
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11924
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:11932
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12388
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12752
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12768
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12820
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12844
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12868
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12892
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12916
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:12948
-
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:12968