Analysis
-
max time kernel
152s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 09:29
Behavioral task
behavioral1
Sample
5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe
Resource
win10v2004-20220812-en
General
-
Target
5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe
-
Size
2.0MB
-
MD5
308ba50b58f386adfc787ca380002cd1
-
SHA1
1172a6183ae0a119cb7c0aa0bd910b24dde15a2f
-
SHA256
5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a
-
SHA512
7158d0e5f562a5f5fe1eef8e12b95222f1b08c962311aa73f81fca8ca1621e84711891584859b47b44fbadf1e95e3c1b0b9644d13592b100f26df727e4d90e29
-
SSDEEP
49152:f4EheAoP8dmPTRuITqGMbZ22tDR0YeHjJzrteTqAQ7vKwHSO:fDOdMbZ2id0YYJzrBv
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3016-132-0x00000000009E0000-0x0000000000DF8000-memory.dmp vmprotect behavioral2/memory/3016-133-0x00000000009E0000-0x0000000000DF8000-memory.dmp vmprotect behavioral2/memory/3016-136-0x00000000009E0000-0x0000000000DF8000-memory.dmp vmprotect behavioral2/memory/3016-143-0x00000000009E0000-0x0000000000DF8000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exepid process 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exepid process 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exedescription pid process target process PID 3016 wrote to memory of 4924 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 4924 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 4924 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 2732 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 2732 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 2732 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 3048 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 3048 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 3048 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 4484 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 4484 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 4484 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 1588 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 1588 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 1588 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 3844 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 3844 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 3844 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 3208 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 3208 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 3208 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 2644 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 2644 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 2644 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 3688 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 3688 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 3688 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 5040 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 5040 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 5040 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 2748 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 2748 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 2748 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 5028 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 5028 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 5028 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 228 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 228 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 228 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 116 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 116 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 116 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 2684 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 2684 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 2684 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 3644 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 3644 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 3644 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 872 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 872 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 872 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 4180 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 4180 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 4180 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 5084 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 5084 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 5084 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 3360 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 3360 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 3360 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 5012 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 5012 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 5012 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe PID 3016 wrote to memory of 4556 3016 5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe"C:\Users\Admin\AppData\Local\Temp\5d8cd7711e8df82f888e96eb8f08548431120f9a2edcfc51127a8331bb4d218a.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/116-151-0x0000000000000000-mapping.dmp
-
memory/228-150-0x0000000000000000-mapping.dmp
-
memory/524-199-0x0000000000000000-mapping.dmp
-
memory/692-172-0x0000000000000000-mapping.dmp
-
memory/872-154-0x0000000000000000-mapping.dmp
-
memory/1420-173-0x0000000000000000-mapping.dmp
-
memory/1432-185-0x0000000000000000-mapping.dmp
-
memory/1556-168-0x0000000000000000-mapping.dmp
-
memory/1584-169-0x0000000000000000-mapping.dmp
-
memory/1588-141-0x0000000000000000-mapping.dmp
-
memory/1632-187-0x0000000000000000-mapping.dmp
-
memory/1656-167-0x0000000000000000-mapping.dmp
-
memory/1780-160-0x0000000000000000-mapping.dmp
-
memory/1812-161-0x0000000000000000-mapping.dmp
-
memory/1908-198-0x0000000000000000-mapping.dmp
-
memory/1996-189-0x0000000000000000-mapping.dmp
-
memory/2104-171-0x0000000000000000-mapping.dmp
-
memory/2192-201-0x0000000000000000-mapping.dmp
-
memory/2340-193-0x0000000000000000-mapping.dmp
-
memory/2572-195-0x0000000000000000-mapping.dmp
-
memory/2592-181-0x0000000000000000-mapping.dmp
-
memory/2632-182-0x0000000000000000-mapping.dmp
-
memory/2644-145-0x0000000000000000-mapping.dmp
-
memory/2664-191-0x0000000000000000-mapping.dmp
-
memory/2684-152-0x0000000000000000-mapping.dmp
-
memory/2696-196-0x0000000000000000-mapping.dmp
-
memory/2732-138-0x0000000000000000-mapping.dmp
-
memory/2748-148-0x0000000000000000-mapping.dmp
-
memory/2964-180-0x0000000000000000-mapping.dmp
-
memory/2972-194-0x0000000000000000-mapping.dmp
-
memory/3016-143-0x00000000009E0000-0x0000000000DF8000-memory.dmpFilesize
4.1MB
-
memory/3016-136-0x00000000009E0000-0x0000000000DF8000-memory.dmpFilesize
4.1MB
-
memory/3016-133-0x00000000009E0000-0x0000000000DF8000-memory.dmpFilesize
4.1MB
-
memory/3016-132-0x00000000009E0000-0x0000000000DF8000-memory.dmpFilesize
4.1MB
-
memory/3048-139-0x0000000000000000-mapping.dmp
-
memory/3208-144-0x0000000000000000-mapping.dmp
-
memory/3248-179-0x0000000000000000-mapping.dmp
-
memory/3252-166-0x0000000000000000-mapping.dmp
-
memory/3308-163-0x0000000000000000-mapping.dmp
-
memory/3360-157-0x0000000000000000-mapping.dmp
-
memory/3396-165-0x0000000000000000-mapping.dmp
-
memory/3460-190-0x0000000000000000-mapping.dmp
-
memory/3512-176-0x0000000000000000-mapping.dmp
-
memory/3644-153-0x0000000000000000-mapping.dmp
-
memory/3688-146-0x0000000000000000-mapping.dmp
-
memory/3844-142-0x0000000000000000-mapping.dmp
-
memory/3928-197-0x0000000000000000-mapping.dmp
-
memory/4068-175-0x0000000000000000-mapping.dmp
-
memory/4120-174-0x0000000000000000-mapping.dmp
-
memory/4180-155-0x0000000000000000-mapping.dmp
-
memory/4192-170-0x0000000000000000-mapping.dmp
-
memory/4228-184-0x0000000000000000-mapping.dmp
-
memory/4324-162-0x0000000000000000-mapping.dmp
-
memory/4428-164-0x0000000000000000-mapping.dmp
-
memory/4484-140-0x0000000000000000-mapping.dmp
-
memory/4556-159-0x0000000000000000-mapping.dmp
-
memory/4704-177-0x0000000000000000-mapping.dmp
-
memory/4788-178-0x0000000000000000-mapping.dmp
-
memory/4800-183-0x0000000000000000-mapping.dmp
-
memory/4864-186-0x0000000000000000-mapping.dmp
-
memory/4888-200-0x0000000000000000-mapping.dmp
-
memory/4924-137-0x0000000000000000-mapping.dmp
-
memory/4960-188-0x0000000000000000-mapping.dmp
-
memory/4996-192-0x0000000000000000-mapping.dmp
-
memory/5012-158-0x0000000000000000-mapping.dmp
-
memory/5028-149-0x0000000000000000-mapping.dmp
-
memory/5040-147-0x0000000000000000-mapping.dmp
-
memory/5084-156-0x0000000000000000-mapping.dmp