Resubmissions
30-12-2023 05:44
231230-gfj51affcj 4Analysis
-
max time kernel
19s -
max time network
91s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
30-12-2023 05:44
Static task
static1
Behavioral task
behavioral1
Sample
Injector PB V3 Hard & Check Serial.exe
Resource
win11-20231215-en
General
-
Target
Injector PB V3 Hard & Check Serial.exe
-
Size
1.1MB
-
MD5
0530164d1f7f9decde03a12c5c76b568
-
SHA1
437cd9036e9dfa29ceb5a274f46d4ee8f2565d35
-
SHA256
21636b77a50e6a1e638fe9c437cc7e2eadb6d89d1e5e35ce542cedafb4ed0c60
-
SHA512
a3b635f1d4e884f9f54c0299de0af14c648552ade1741616ad9c80a3249ea208fefd5063ef41fb2916c007f68fcaaf9cf99ca259720d0e0fcb39596f6512eecb
-
SSDEEP
24576:de4SAjbEVE3SeFbUxxY6bhjJgXByYc2i83jx8EFC0:7XEaCeFb+xzsXByY7i8F1F
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\CB.exe Injector PB V3 Hard & Check Serial.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2568 wrote to memory of 2456 2568 Injector PB V3 Hard & Check Serial.exe 22 PID 2568 wrote to memory of 2456 2568 Injector PB V3 Hard & Check Serial.exe 22 PID 2568 wrote to memory of 2456 2568 Injector PB V3 Hard & Check Serial.exe 22 PID 2456 wrote to memory of 3820 2456 cmd.exe 20 PID 2456 wrote to memory of 3820 2456 cmd.exe 20 PID 2456 wrote to memory of 3820 2456 cmd.exe 20 PID 2568 wrote to memory of 2956 2568 Injector PB V3 Hard & Check Serial.exe 197 PID 2568 wrote to memory of 2956 2568 Injector PB V3 Hard & Check Serial.exe 197 PID 2568 wrote to memory of 2956 2568 Injector PB V3 Hard & Check Serial.exe 197 PID 2568 wrote to memory of 3800 2568 Injector PB V3 Hard & Check Serial.exe 196 PID 2568 wrote to memory of 3800 2568 Injector PB V3 Hard & Check Serial.exe 196 PID 2568 wrote to memory of 3800 2568 Injector PB V3 Hard & Check Serial.exe 196 PID 2568 wrote to memory of 1692 2568 Injector PB V3 Hard & Check Serial.exe 195 PID 2568 wrote to memory of 1692 2568 Injector PB V3 Hard & Check Serial.exe 195 PID 2568 wrote to memory of 1692 2568 Injector PB V3 Hard & Check Serial.exe 195 PID 2568 wrote to memory of 2088 2568 Injector PB V3 Hard & Check Serial.exe 194 PID 2568 wrote to memory of 2088 2568 Injector PB V3 Hard & Check Serial.exe 194 PID 2568 wrote to memory of 2088 2568 Injector PB V3 Hard & Check Serial.exe 194 PID 2568 wrote to memory of 740 2568 Injector PB V3 Hard & Check Serial.exe 88 PID 2568 wrote to memory of 740 2568 Injector PB V3 Hard & Check Serial.exe 88 PID 2568 wrote to memory of 740 2568 Injector PB V3 Hard & Check Serial.exe 88 PID 2568 wrote to memory of 496 2568 Injector PB V3 Hard & Check Serial.exe 87 PID 2568 wrote to memory of 496 2568 Injector PB V3 Hard & Check Serial.exe 87 PID 2568 wrote to memory of 496 2568 Injector PB V3 Hard & Check Serial.exe 87 PID 2568 wrote to memory of 4860 2568 Injector PB V3 Hard & Check Serial.exe 90 PID 2568 wrote to memory of 4860 2568 Injector PB V3 Hard & Check Serial.exe 90 PID 2568 wrote to memory of 4860 2568 Injector PB V3 Hard & Check Serial.exe 90 PID 2568 wrote to memory of 228 2568 Injector PB V3 Hard & Check Serial.exe 89 PID 2568 wrote to memory of 228 2568 Injector PB V3 Hard & Check Serial.exe 89 PID 2568 wrote to memory of 228 2568 Injector PB V3 Hard & Check Serial.exe 89 PID 2568 wrote to memory of 232 2568 Injector PB V3 Hard & Check Serial.exe 92 PID 2568 wrote to memory of 232 2568 Injector PB V3 Hard & Check Serial.exe 92 PID 2568 wrote to memory of 232 2568 Injector PB V3 Hard & Check Serial.exe 92 PID 2568 wrote to memory of 4896 2568 Injector PB V3 Hard & Check Serial.exe 91 PID 2568 wrote to memory of 4896 2568 Injector PB V3 Hard & Check Serial.exe 91 PID 2568 wrote to memory of 4896 2568 Injector PB V3 Hard & Check Serial.exe 91 PID 2568 wrote to memory of 1112 2568 Injector PB V3 Hard & Check Serial.exe 93 PID 2568 wrote to memory of 1112 2568 Injector PB V3 Hard & Check Serial.exe 93 PID 2568 wrote to memory of 1112 2568 Injector PB V3 Hard & Check Serial.exe 93 PID 2568 wrote to memory of 2552 2568 Injector PB V3 Hard & Check Serial.exe 94 PID 2568 wrote to memory of 2552 2568 Injector PB V3 Hard & Check Serial.exe 94 PID 2568 wrote to memory of 2552 2568 Injector PB V3 Hard & Check Serial.exe 94 PID 2568 wrote to memory of 1056 2568 Injector PB V3 Hard & Check Serial.exe 96 PID 2568 wrote to memory of 1056 2568 Injector PB V3 Hard & Check Serial.exe 96 PID 2568 wrote to memory of 1056 2568 Injector PB V3 Hard & Check Serial.exe 96 PID 2568 wrote to memory of 2260 2568 Injector PB V3 Hard & Check Serial.exe 95 PID 2568 wrote to memory of 2260 2568 Injector PB V3 Hard & Check Serial.exe 95 PID 2568 wrote to memory of 2260 2568 Injector PB V3 Hard & Check Serial.exe 95 PID 2568 wrote to memory of 2828 2568 Injector PB V3 Hard & Check Serial.exe 98 PID 2568 wrote to memory of 2828 2568 Injector PB V3 Hard & Check Serial.exe 98 PID 2568 wrote to memory of 2828 2568 Injector PB V3 Hard & Check Serial.exe 98 PID 2568 wrote to memory of 3276 2568 Injector PB V3 Hard & Check Serial.exe 97 PID 2568 wrote to memory of 3276 2568 Injector PB V3 Hard & Check Serial.exe 97 PID 2568 wrote to memory of 3276 2568 Injector PB V3 Hard & Check Serial.exe 97 PID 2568 wrote to memory of 2768 2568 Injector PB V3 Hard & Check Serial.exe 100 PID 2568 wrote to memory of 2768 2568 Injector PB V3 Hard & Check Serial.exe 100 PID 2568 wrote to memory of 2768 2568 Injector PB V3 Hard & Check Serial.exe 100 PID 2568 wrote to memory of 1592 2568 Injector PB V3 Hard & Check Serial.exe 99 PID 2568 wrote to memory of 1592 2568 Injector PB V3 Hard & Check Serial.exe 99 PID 2568 wrote to memory of 1592 2568 Injector PB V3 Hard & Check Serial.exe 99 PID 2568 wrote to memory of 2216 2568 Injector PB V3 Hard & Check Serial.exe 102 PID 2568 wrote to memory of 2216 2568 Injector PB V3 Hard & Check Serial.exe 102 PID 2568 wrote to memory of 2216 2568 Injector PB V3 Hard & Check Serial.exe 102 PID 2568 wrote to memory of 3736 2568 Injector PB V3 Hard & Check Serial.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\Injector PB V3 Hard & Check Serial.exe"C:\Users\Admin\AppData\Local\Temp\Injector PB V3 Hard & Check Serial.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c MODE CON COLS=19 LINES=22⤵
- Suspicious use of WriteProcessMemory
PID:2456
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:3800
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:2956
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:2088
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:1692
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:496
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:740
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:228
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:4860
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:4896
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:232
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:1112
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:2552
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:2260
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:1056
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:3276
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:2828
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:1592
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:2768
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:3736
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:2216
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:2024
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:1896
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:4884
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:2304
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:3120
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:3840
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:1660
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:4288
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:3684
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:244
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:3004
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:452
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:3280
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:3704
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:2020
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:3132
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:4732
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:4772
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:2924
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:236
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:888
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:3284
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:4524
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:2304
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:4028
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:3812
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:3004
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:244
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:940
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:3548
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:3000
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:772
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:3704
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:2844
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:792
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:3280
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:4000
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:1892
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:452
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:3916
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:4004
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:2616
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:1912
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:3624
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:3836
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:4464
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:1324
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:736
-
-
C:\Windows\CB.exe"C:\Windows\CB.exe"2⤵PID:2192
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:3436
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:1172
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:704
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:2776
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:3340
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:4856
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:2072
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:1660
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:5108
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:1548
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:2432
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:3712
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:5048
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:924
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:3696
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:4664
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:3840
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:2268
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:2140
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:3120
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:1076
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:948
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:4884
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:1896
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:3568
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:1168
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:1132
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:2024
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:2264
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:4304
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:1344
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:1500
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:3080
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:4164
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:492
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:2596
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:2412
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:1664
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:280
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:2068
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:1816
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:2620
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:2088
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:1692
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:3800
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:2956
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:4644
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:1492
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:2288
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:2576
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:3108
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:4760
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:4064
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:664
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:1648
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:4440
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:4508
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:4616
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:4820
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:4720
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:912
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:4156
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:2836
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:2340
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:2200
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:3064
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:1188
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:3852
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:4624
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:3076
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:1176
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:772
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:2844
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:792
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:3000
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:4000
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:1892
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:3916
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:4004
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:3548
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:2616
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:1912
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:3624
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:3836
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:940
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:4464
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:336
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:4588
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:4852
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:1740
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:4648
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:2776
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:1320
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:4856
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:5108
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:1548
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:2432
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:3712
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:5048
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:924
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:3696
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:4664
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:4028
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:2268
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:2140
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:1076
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:948
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:3568
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Color A2⤵PID:1168
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c CLS2⤵PID:1132
-
-
C:\Windows\SysWOW64\mode.comMODE CON COLS=19 LINES=21⤵PID:3820
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD5d13ffd95af7ded0efa6a0fde9dbbd245
SHA199fa1fd7426e1cf56331731f9f044a2c0de75324
SHA25617d1354e01d71c6eb563cf244ad5d50908f88ca77aedf343c599256981db0dcc
SHA5126445ebc7afab8b5c4a78023ecb3d378d9a80b468cd9e5cc885b114efcef9628b0ebb4d42b22881972e385bed4bb72170503cd37a1d3fc5a60495872bd36a4991
-
Filesize
385KB
MD5469fb39a7c65ab01ed0200d4f070f8fc
SHA13b7e9c7ce8c0738d244f45d0af75b83792eb45ae
SHA2561bccdddbfeb60edbc0faa0c0dfccfc833c16173ffbbb31570ebab5f1f346afa7
SHA51280262e58d5638e8e5abf4d9a85b5af6e4ea418579d0957624cb6c79c36bca20e72bf3363669333d29b152b47e93a11a8cd04b51e9e9ca4191f579dcac8f8e0ad
-
Filesize
894KB
MD5c9cc2d702c38d37055d2322871045f0d
SHA1d9252a52821616f8ae7bdfe3e6756cf224339140
SHA256691132410e173c00572ad1754eca20b33c969bdb531820b5d6325fc29f83c131
SHA5127d350eb000e3f65c7dcd0376dc712edc8bf13f8ba90f6d687fb3ea40c5c8f227e01a33dd8f498f9f09cd898ca3cff8a6f86008bce9d4862a64dde981ac8a3f2f