File details
File name: cmd.exe
Name: Windows Command Processor
Description: Microsoft® Windows® Operating System
Version: 6.1.7600.16385 (win7_rtm.090713-1255)
Product version: 6.1.7600.16385
Size: 294.5 KB
Original file name: Cmd.Exe.MUI
Windows file protection:
Yes
Resource utilization
 | CPU utilization averages |
Total CPU: 0.0176916459%
Privileged CPU:
0.0157040779%

User CPU:
0.00198756798592%

 | Memory utilization averages |
Min working set memory: 0 Bytes
Process details
Runs as (owner): User
Windows platform: 32-bit
Parent Process
Child Process
Process Commands
"C:\Windows\system32\cmd.exe"
cmd.exe /c ""C:\Any Video Converter\gnu\avc\mplayer.exe" -af volnorm -vf scale=480:-2,expand=:272:::,crop=480:272,harddup -ao pcC:file="\\.\pipe\wmvmplayerpcmdump" -format s16le -vo yuv4mpeC:file="\\.\pipe\wmvmplayeryuvdump" -nolirc -noframedrop "C:\STUDYM~1\Videos\SCIENC~1\INTROD~1.MP4""
Startup files (all users) run once details
Name: Del1203196625
Command: cmd.exe /Q /D /c del "C:\users\user\appdata\Local\Temp\0.del"
Startup files (user) run once details
Name: Uninstall C:\Users\Darlene\AppData\Local\Microsoft\SkyDrive\17.0.2003.1112
Command: C:\WINDOWS\system32\cmd.exe /q /c rmdir /s /q "C:\users\user\appdata\Local\Microsoft\SkyDrive\17.0.2003.1112"
Startup files (all users) run details
Name: Adobe Flash Player SU
Command: C:\Windows\System32\cmd.exe /k start httC://3zz.info/ && exit
Startup files (user) run details
Name: Bomgar_Cleanup_ZD12543155818005
Command: cmd.exe /C rd /S /Q "C:\ProgramData\bomgar-au" & reg delete HKCU\Software\Microsoft\Windows\ CurrentVersion\Run /v Bomgar_Cleanup_ZD12543155818005 /f
Scheduled task details
Name: BoostApp
Command: \BoostApp
Image hashes
MD5: 8ae6dd9a6d246004da047f704f0cc487
SHA-1: b1b941420333fd6f4220e98fa18c0471cac8a38b
SHA-256: 8deab32f7297bcbc22caa7baeb2ddb6bf36e73d9a7f68b6737c1e4c75e213cb9
PE image details
Subsystem: Windows Console
Langauge*: Microsoft Visual C++
File packed: No
Import Table
advapi32.dll

RevertToSelf
SaferRecordEventLogEntry
ImpersonateLoggedOnUser
SaferCloseLevel
SaferComputeTokenFromLevel
SaferIdentifyLevel
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegEnumKeyW
RegDeleteValueW
RegOpenKeyW
RegDeleteKeyW
RegSetValueW
CreateProcessAsUserW
RegSetValueExW
RegCreateKeyExW
LookupAccountSidW
GetSecurityDescriptorOwner
GetFileSecurityW
kernel32.dll

FlushConsoleInputBuffer
LoadLibraryA
InterlockedExchange
FreeLibrary
LocalAlloc
GetVDMCurrentDirectories
CmdBatNotification
GetModuleHandleA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetThreadLocale
GetDiskFreeSpaceExW
CompareFileTime
RemoveDirectoryW
GetCurrentDirectoryW
SetCurrentDirectoryW
TerminateProcess
WaitForSingleObject
GetExitCodeProcess
CopyFileW
SetFileAttributesW
DeleteFileW
SetFileTime
CreateDirectoryW
FillConsoleOutputAttribute
SetConsoleTextAttribute
ScrollConsoleScreenBufferW
FormatMessageW
DuplicateHandle
FlushFileBuffers
HeapReAlloc
HeapSize
GetFileAttributesExW
LocalFree
GetDriveTypeW
InitializeCriticalSection
SetConsoleCtrlHandler
GetWindowsDirectoryW
GetConsoleTitleW
GetModuleFileNameW
GetVersion
EnterCriticalSection
LeaveCriticalSection
ExpandEnvironmentStringsW
SearchPathW
WriteFile
GetVolumeInformationW
SetLastError
MoveFileW
SetConsoleTitleW
MoveFileExW
GetBinaryTypeW
GetFileAttributesW
GetCurrentThreadId
CreateProcessW
LoadLibraryW
ReadProcessMemory
SetErrorMode
GetConsoleMode
SetConsoleMode
VirtualAlloc
VirtualFree
SetEnvironmentVariableW
GetEnvironmentVariableW
GetCommandLineW
GetEnvironmentStringsW
GetLocalTime
GetTimeFormatW
FileTimeToLocalFileTime
GetDateFormatW
GetLastError
CloseHandle
SetThreadLocale
GetProcAddress
GetModuleHandleW
SetFilePointer
lstrcmpW
lstrcmpiW
HeapAlloc
GetProcessHeap
HeapFree
MultiByteToWideChar
ReadFile
WriteConsoleW
FillConsoleOutputCharacterW
SetConsoleCursorPosition
ReadConsoleW
GetConsoleScreenBufferInfo
GetStdHandle
GetFileType
VirtualQuery
RaiseException
GetCPInfo
GetConsoleOutputCP
WideCharToMultiByte
GetFileSize
CreateFileW
FindClose
FindNextFileW
FindFirstFileW
GetFullPathNameW
GetUserDefaultLCID
GetLocaleInfoW
SetLocalTime
SystemTimeToFileTime
GetSystemTime
FileTimeToSystemTime
FreeEnvironmentStringsW
SetEnvironmentStringsW
GetConsoleWindow
GetStartupInfoW
DeleteProcThreadAttributeList
UpdateProcThreadAttribute
InitializeProcThreadAttributeList
NeedCurrentDirectoryForExePathW
SetFilePointerEx
CancelSynchronousIo
HeapSetInformation
OpenThread
SetEndOfFile
FindNextStreamW
FindFirstStreamW
DeviceIoControl
ResumeThread
SetProcessAffinityMask
GetSystemInfo
GetVolumePathNameW
CreateSymbolicLinkW
CreateHardLinkW
InterlockedCompareExchange
Sleep
LoadLibraryExA
DelayLoadFailureHook
GetThreadGroupAffinity
GetNumaNodeProcessorMaskEx
FindFirstFileExW
GetACP
GlobalAlloc
GlobalFree
GetNumaHighestNodeNumber
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegDeleteValueW
RegDeleteKeyExW
QueryFullProcessImageNameW
RegSetValueExW
RegCreateKeyExW
msvcrt.dll
ntdll.dll

RtlDosPathNameToNtPathName_U
NtFsControlFile
RtlFreeHeap
NtQueryInformationProcess
NtSetInformationProcess
RtlNtStatusToDosError
NtQueryInformationToken
NtClose
NtOpenProcessToken
NtOpenThreadToken
RtlFindLeastSignificantBit
user32.dll

GetUserObjectInformationW
GetThreadDesktop
MessageBeep
GetProcessWindowStation
winbrand.dll
