Overview
overview
9Static
static
9Monotone-H...ox.bat
windows7-x64
1Monotone-H...ox.bat
windows10-2004-x64
1Monotone-H...on.bat
windows7-x64
1Monotone-H...on.bat
windows10-2004-x64
1Monotone-H...rs.exe
windows7-x64
1Monotone-H...rs.exe
windows10-2004-x64
1Monotone-H...s2.exe
windows7-x64
1Monotone-H...s2.exe
windows10-2004-x64
1Monotone-H...ew.exe
windows7-x64
3Monotone-H...ew.exe
windows10-2004-x64
3Monotone-H...ck.exe
windows7-x64
5Monotone-H...ck.exe
windows10-2004-x64
7Monotone-H...te.vbs
windows7-x64
1Monotone-H...te.vbs
windows10-2004-x64
1Monotone-H...ss.bat
windows7-x64
5Monotone-H...ss.bat
windows10-2004-x64
5Monotone-H...er.sys
windows10-2004-x64
1Monotone-H...ut.exe
windows7-x64
1Monotone-H...ut.exe
windows10-2004-x64
3Monotone-H...en.bat
windows7-x64
1Monotone-H...en.bat
windows10-2004-x64
1Monotone-H...ne.exe
windows7-x64
3Monotone-H...ne.exe
windows10-2004-x64
7Monotone-H...64.exe
windows7-x64
1Monotone-H...64.exe
windows10-2004-x64
Monotone-H...ox.exe
windows7-x64
1Monotone-H...ox.exe
windows10-2004-x64
3Monotone-H...64.exe
windows7-x64
1Monotone-H...64.exe
windows10-2004-x64
1Monotone-H...id.ps1
windows7-x64
3Monotone-H...id.ps1
windows10-2004-x64
3Analysis
-
max time kernel
77s -
max time network
64s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-08-2024 02:03
Static task
static1
Behavioral task
behavioral1
Sample
Monotone-HWID-Spoofer-0.0.1/Box.bat
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Monotone-HWID-Spoofer-0.0.1/Box.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Monotone-HWID-Spoofer-0.0.1/Button.bat
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Monotone-HWID-Spoofer-0.0.1/Button.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Monotone-HWID-Spoofer-0.0.1/Commands/Hidden/Adapters.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
Monotone-HWID-Spoofer-0.0.1/Commands/Hidden/Adapters.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Monotone-HWID-Spoofer-0.0.1/Commands/Hidden/Adapters2.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
Monotone-HWID-Spoofer-0.0.1/Commands/Hidden/Adapters2.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Monotone-HWID-Spoofer-0.0.1/Commands/Hidden/AlternateStreamView.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
Monotone-HWID-Spoofer-0.0.1/Commands/Hidden/AlternateStreamView.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Monotone-HWID-Spoofer-0.0.1/Commands/Hidden/Block.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
Monotone-HWID-Spoofer-0.0.1/Commands/Hidden/Block.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Monotone-HWID-Spoofer-0.0.1/Commands/Hidden/UnbanComplete.vbs
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
Monotone-HWID-Spoofer-0.0.1/Commands/Hidden/UnbanComplete.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Monotone-HWID-Spoofer-0.0.1/Commands/Hidden/process.bat
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
Monotone-HWID-Spoofer-0.0.1/Commands/Hidden/process.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Monotone-HWID-Spoofer-0.0.1/Commands/Hidden/spoofer.sys
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
Monotone-HWID-Spoofer-0.0.1/GetInput.exe
Resource
win7-20240704-en
Behavioral task
behavioral19
Sample
Monotone-HWID-Spoofer-0.0.1/GetInput.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral20
Sample
Monotone-HWID-Spoofer-0.0.1/Getlen.bat
Resource
win7-20240705-en
Behavioral task
behavioral21
Sample
Monotone-HWID-Spoofer-0.0.1/Getlen.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral22
Sample
Monotone-HWID-Spoofer-0.0.1/Monotone.exe
Resource
win7-20240705-en
Behavioral task
behavioral23
Sample
Monotone-HWID-Spoofer-0.0.1/Monotone.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral24
Sample
Monotone-HWID-Spoofer-0.0.1/Volumeid64.exe
Resource
win7-20240705-en
Behavioral task
behavioral25
Sample
Monotone-HWID-Spoofer-0.0.1/Volumeid64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral26
Sample
Monotone-HWID-Spoofer-0.0.1/batbox.exe
Resource
win7-20240704-en
Behavioral task
behavioral27
Sample
Monotone-HWID-Spoofer-0.0.1/batbox.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral28
Sample
Monotone-HWID-Spoofer-0.0.1/colorecho-vc10-x86_64.exe
Resource
win7-20240704-en
Behavioral task
behavioral29
Sample
Monotone-HWID-Spoofer-0.0.1/colorecho-vc10-x86_64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral30
Sample
Monotone-HWID-Spoofer-0.0.1/hwid.ps1
Resource
win7-20240704-en
Behavioral task
behavioral31
Sample
Monotone-HWID-Spoofer-0.0.1/hwid.ps1
Resource
win10v2004-20240802-en
General
-
Target
Monotone-HWID-Spoofer-0.0.1/Monotone.exe
-
Size
160KB
-
MD5
cd6cddac2686df01814705f21e6da343
-
SHA1
f29ad4efdc160ffba5cb63e01349ec9b84123e30
-
SHA256
0f7f86530b7fa2e693a2a3a5bf69957e61c2f45d39418d077285a1ea6f4bb992
-
SHA512
a673d521f316d3e0fa87a99effa33c5dc4fde315e72b7f6cbb828a94ffe8ebeed4bf9ca6fe858b3c69327aa4ce05ae02b37e2a392abb7cc728c4bbe2ab9a6de4
-
SSDEEP
3072:yuo1MlSEqhqJhJy0WTHW69B9VjMdxPedN9ug0/9TBfsdZK0:y5oaqJhJMHW69B9VjMdxPedN9ug0/9Tk
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates processes with tasklist 1 TTPs 17 IoCs
pid Process 4840 tasklist.exe 2076 tasklist.exe 3544 tasklist.exe 2324 tasklist.exe 1668 tasklist.exe 4232 tasklist.exe 3036 tasklist.exe 3148 tasklist.exe 5016 tasklist.exe 704 tasklist.exe 2324 tasklist.exe 4384 tasklist.exe 2964 tasklist.exe 1864 tasklist.exe 344 tasklist.exe 3544 tasklist.exe 1076 tasklist.exe -
pid Process 2124 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language batbox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GetInput.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 17 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1080 PING.EXE 644 PING.EXE 660 PING.EXE 4716 PING.EXE 1508 PING.EXE 4688 PING.EXE 3116 PING.EXE 2176 PING.EXE 3240 PING.EXE 2688 PING.EXE 3352 PING.EXE 4464 PING.EXE 1248 PING.EXE 2268 PING.EXE 4444 PING.EXE 1144 PING.EXE 4812 PING.EXE -
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 Adapters.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom Adapters.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 Adapters.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom Adapters.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings cmd.exe -
Runs ping.exe 1 TTPs 17 IoCs
pid Process 1248 PING.EXE 3352 PING.EXE 1080 PING.EXE 4716 PING.EXE 1508 PING.EXE 644 PING.EXE 4444 PING.EXE 4464 PING.EXE 2268 PING.EXE 2176 PING.EXE 3240 PING.EXE 660 PING.EXE 4688 PING.EXE 3116 PING.EXE 2688 PING.EXE 1144 PING.EXE 4812 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2124 powershell.exe 2124 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1668 tasklist.exe Token: SeIncreaseQuotaPrivilege 4772 WMIC.exe Token: SeSecurityPrivilege 4772 WMIC.exe Token: SeTakeOwnershipPrivilege 4772 WMIC.exe Token: SeLoadDriverPrivilege 4772 WMIC.exe Token: SeSystemProfilePrivilege 4772 WMIC.exe Token: SeSystemtimePrivilege 4772 WMIC.exe Token: SeProfSingleProcessPrivilege 4772 WMIC.exe Token: SeIncBasePriorityPrivilege 4772 WMIC.exe Token: SeCreatePagefilePrivilege 4772 WMIC.exe Token: SeBackupPrivilege 4772 WMIC.exe Token: SeRestorePrivilege 4772 WMIC.exe Token: SeShutdownPrivilege 4772 WMIC.exe Token: SeDebugPrivilege 4772 WMIC.exe Token: SeSystemEnvironmentPrivilege 4772 WMIC.exe Token: SeRemoteShutdownPrivilege 4772 WMIC.exe Token: SeUndockPrivilege 4772 WMIC.exe Token: SeManageVolumePrivilege 4772 WMIC.exe Token: 33 4772 WMIC.exe Token: 34 4772 WMIC.exe Token: 35 4772 WMIC.exe Token: 36 4772 WMIC.exe Token: SeIncreaseQuotaPrivilege 4772 WMIC.exe Token: SeSecurityPrivilege 4772 WMIC.exe Token: SeTakeOwnershipPrivilege 4772 WMIC.exe Token: SeLoadDriverPrivilege 4772 WMIC.exe Token: SeSystemProfilePrivilege 4772 WMIC.exe Token: SeSystemtimePrivilege 4772 WMIC.exe Token: SeProfSingleProcessPrivilege 4772 WMIC.exe Token: SeIncBasePriorityPrivilege 4772 WMIC.exe Token: SeCreatePagefilePrivilege 4772 WMIC.exe Token: SeBackupPrivilege 4772 WMIC.exe Token: SeRestorePrivilege 4772 WMIC.exe Token: SeShutdownPrivilege 4772 WMIC.exe Token: SeDebugPrivilege 4772 WMIC.exe Token: SeSystemEnvironmentPrivilege 4772 WMIC.exe Token: SeRemoteShutdownPrivilege 4772 WMIC.exe Token: SeUndockPrivilege 4772 WMIC.exe Token: SeManageVolumePrivilege 4772 WMIC.exe Token: 33 4772 WMIC.exe Token: 34 4772 WMIC.exe Token: 35 4772 WMIC.exe Token: 36 4772 WMIC.exe Token: SeDebugPrivilege 2124 powershell.exe Token: SeDebugPrivilege 4232 tasklist.exe Token: SeIncreaseQuotaPrivilege 4868 WMIC.exe Token: SeSecurityPrivilege 4868 WMIC.exe Token: SeTakeOwnershipPrivilege 4868 WMIC.exe Token: SeLoadDriverPrivilege 4868 WMIC.exe Token: SeSystemProfilePrivilege 4868 WMIC.exe Token: SeSystemtimePrivilege 4868 WMIC.exe Token: SeProfSingleProcessPrivilege 4868 WMIC.exe Token: SeIncBasePriorityPrivilege 4868 WMIC.exe Token: SeCreatePagefilePrivilege 4868 WMIC.exe Token: SeBackupPrivilege 4868 WMIC.exe Token: SeRestorePrivilege 4868 WMIC.exe Token: SeShutdownPrivilege 4868 WMIC.exe Token: SeDebugPrivilege 4868 WMIC.exe Token: SeSystemEnvironmentPrivilege 4868 WMIC.exe Token: SeRemoteShutdownPrivilege 4868 WMIC.exe Token: SeUndockPrivilege 4868 WMIC.exe Token: SeManageVolumePrivilege 4868 WMIC.exe Token: 33 4868 WMIC.exe Token: 34 4868 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3704 wrote to memory of 4576 3704 Monotone.exe 82 PID 3704 wrote to memory of 4576 3704 Monotone.exe 82 PID 4576 wrote to memory of 3256 4576 cmd.exe 84 PID 4576 wrote to memory of 3256 4576 cmd.exe 84 PID 4576 wrote to memory of 1080 4576 cmd.exe 85 PID 4576 wrote to memory of 1080 4576 cmd.exe 85 PID 4576 wrote to memory of 2044 4576 cmd.exe 88 PID 4576 wrote to memory of 2044 4576 cmd.exe 88 PID 4576 wrote to memory of 4756 4576 cmd.exe 89 PID 4576 wrote to memory of 4756 4576 cmd.exe 89 PID 4576 wrote to memory of 4756 4576 cmd.exe 89 PID 4576 wrote to memory of 3528 4576 cmd.exe 90 PID 4576 wrote to memory of 3528 4576 cmd.exe 90 PID 4576 wrote to memory of 3528 4576 cmd.exe 90 PID 4576 wrote to memory of 2492 4576 cmd.exe 91 PID 4576 wrote to memory of 2492 4576 cmd.exe 91 PID 4576 wrote to memory of 2492 4576 cmd.exe 91 PID 4576 wrote to memory of 1668 4576 cmd.exe 93 PID 4576 wrote to memory of 1668 4576 cmd.exe 93 PID 4576 wrote to memory of 2268 4576 cmd.exe 94 PID 4576 wrote to memory of 2268 4576 cmd.exe 94 PID 4576 wrote to memory of 2096 4576 cmd.exe 96 PID 4576 wrote to memory of 2096 4576 cmd.exe 96 PID 4576 wrote to memory of 4500 4576 cmd.exe 97 PID 4576 wrote to memory of 4500 4576 cmd.exe 97 PID 4500 wrote to memory of 4772 4500 cmd.exe 98 PID 4500 wrote to memory of 4772 4500 cmd.exe 98 PID 4576 wrote to memory of 2396 4576 cmd.exe 99 PID 4576 wrote to memory of 2396 4576 cmd.exe 99 PID 2396 wrote to memory of 2752 2396 cmd.exe 100 PID 2396 wrote to memory of 2752 2396 cmd.exe 100 PID 4576 wrote to memory of 3508 4576 cmd.exe 101 PID 4576 wrote to memory of 3508 4576 cmd.exe 101 PID 3508 wrote to memory of 2028 3508 cmd.exe 102 PID 3508 wrote to memory of 2028 3508 cmd.exe 102 PID 4576 wrote to memory of 2212 4576 cmd.exe 103 PID 4576 wrote to memory of 2212 4576 cmd.exe 103 PID 2212 wrote to memory of 2584 2212 cmd.exe 104 PID 2212 wrote to memory of 2584 2212 cmd.exe 104 PID 4576 wrote to memory of 1608 4576 cmd.exe 105 PID 4576 wrote to memory of 1608 4576 cmd.exe 105 PID 1608 wrote to memory of 4952 1608 cmd.exe 106 PID 1608 wrote to memory of 4952 1608 cmd.exe 106 PID 4576 wrote to memory of 4612 4576 cmd.exe 107 PID 4576 wrote to memory of 4612 4576 cmd.exe 107 PID 4612 wrote to memory of 1496 4612 cmd.exe 108 PID 4612 wrote to memory of 1496 4612 cmd.exe 108 PID 4576 wrote to memory of 1312 4576 cmd.exe 109 PID 4576 wrote to memory of 1312 4576 cmd.exe 109 PID 1312 wrote to memory of 2508 1312 cmd.exe 110 PID 1312 wrote to memory of 2508 1312 cmd.exe 110 PID 4576 wrote to memory of 2992 4576 cmd.exe 111 PID 4576 wrote to memory of 2992 4576 cmd.exe 111 PID 2992 wrote to memory of 1072 2992 cmd.exe 112 PID 2992 wrote to memory of 1072 2992 cmd.exe 112 PID 4576 wrote to memory of 4312 4576 cmd.exe 113 PID 4576 wrote to memory of 4312 4576 cmd.exe 113 PID 4312 wrote to memory of 632 4312 cmd.exe 114 PID 4312 wrote to memory of 632 4312 cmd.exe 114 PID 4576 wrote to memory of 3032 4576 cmd.exe 115 PID 4576 wrote to memory of 3032 4576 cmd.exe 115 PID 4576 wrote to memory of 3032 4576 cmd.exe 115 PID 4576 wrote to memory of 5096 4576 cmd.exe 116 PID 4576 wrote to memory of 5096 4576 cmd.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\Monotone.exe"C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\Monotone.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd" /c "C:\Users\Admin\AppData\Local\Temp\96A2.tmp\96A3.tmp\96A4.bat C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\Monotone.exe"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\system32\mode.commode 80,203⤵PID:3256
-
-
C:\Windows\system32\PING.EXEping localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1080
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\colorecho-vc10-x86_64.execolorecho-vc10-x86_64.exe " Monotone" 13⤵PID:2044
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exebatbox /c 0xf0 /g 21 17 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /g 21 16 /a 32 /d " " /a 32 /g 21 15 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /c 0x073⤵
- System Location Discovery: System Language Discovery
PID:4756
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exeBatbox /g 23 16 /c 0xf0 /d " Enter " /c 0x073⤵PID:3528
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\GetInput.exeGetInput /M 21 15 39 17 /H 70 703⤵
- System Location Discovery: System Language Discovery
PID:2492
-
-
C:\Windows\system32\tasklist.exetasklist /NH /FI "imagename eq Block.exe"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1668
-
-
C:\Windows\system32\find.exefind /i "Block.exe"3⤵PID:2268
-
-
C:\Windows\system32\mode.commode 80,203⤵PID:2096
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic diskdrive get serialnumber3⤵
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\System32\Wbem\WMIC.exewmic diskdrive get serialnumber4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4772
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg.exe query "HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\IDConfigDB\Hardware Profiles\0001" /v "HwProfileGuid"3⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\system32\reg.exereg.exe query "HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\IDConfigDB\Hardware Profiles\0001" /v "HwProfileGuid"4⤵PID:2752
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography" /v "MachineGuid"3⤵
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\system32\reg.exereg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography" /v "MachineGuid"4⤵PID:2028
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg.exe query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Tcpip\Parameters" /v "Hostname"3⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\system32\reg.exereg.exe query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Tcpip\Parameters" /v "Hostname"4⤵PID:2584
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg.exe query "HKLM\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002BE10318}\0007" /v "NetworkAddress"3⤵
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\system32\reg.exereg.exe query "HKLM\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002BE10318}\0007" /v "NetworkAddress"4⤵PID:4952
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg.exe query "HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e965-e325-11ce-bfc1-08002be10318}\Configuration\Variables\BusDeviceDesc" /v "PropertyGuid"3⤵
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\system32\reg.exereg.exe query "HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e965-e325-11ce-bfc1-08002be10318}\Configuration\Variables\BusDeviceDesc" /v "PropertyGuid"4⤵PID:1496
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg.exe query "HKEY_CURRENT_USER\Monetone" /v "VolumeID"3⤵
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\system32\reg.exereg.exe query "HKEY_CURRENT_USER\Monetone" /v "VolumeID"4⤵PID:2508
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v "ProductID"3⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\system32\reg.exereg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v "ProductID"4⤵PID:1072
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkCards\3" /v "ServiceName"3⤵
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\system32\reg.exereg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkCards\3" /v "ServiceName"4⤵PID:632
-
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exebatbox /c 0x0f /g 0 2 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /g 0 1 /a 32 /d " " /a 32 /g 0 0 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /c 0x073⤵PID:3032
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exebatbox /c 0x0f /g 67 6 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /g 67 5 /a 32 /d " " /a 32 /g 67 4 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /c 0x073⤵PID:5096
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exebatbox /c 0x0f /g 2 18 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /g 2 17 /a 32 /d " " /a 32 /g 2 16 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /c 0x073⤵PID:3584
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exebatbox /c 0x0f /g 42 18 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /g 42 17 /a 32 /d " " /a 32 /g 42 16 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /c 0x073⤵PID:4744
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exeBatbox /g 2 1 /c 0x0f /d " Clean " /g 69 5 /c 0x0f /d "Refresh" /g 4 17 /c 0x0f /d " Unban " /g 44 17 /c 0x0f /d " Easy Anti Cheat " /c 0x073⤵PID:2520
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\GetInput.exeGetInput /M 0 0 79 2 67 4 77 6 2 16 38 18 42 16 77 18 /H 07 07 073⤵PID:3972
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c type "mac.txt"|find /c /v ""3⤵PID:3908
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" type "mac.txt""4⤵PID:3040
-
-
C:\Windows\system32\find.exefind /c /v ""4⤵PID:3688
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c TYPE mac.txt3⤵PID:5048
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c type "host.txt"|find /c /v ""3⤵PID:2116
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" type "host.txt""4⤵PID:3748
-
-
C:\Windows\system32\find.exefind /c /v ""4⤵PID:4712
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c TYPE host.txt3⤵PID:1384
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c type "C:\antiOS\host.txt"|find /c /v ""3⤵PID:3152
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" type "C:\antiOS\host.txt""4⤵PID:704
-
-
C:\Windows\system32\find.exefind /c /v ""4⤵PID:760
-
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\Volumeid64.exeVolumeid64.exe C: 16C0-FFC63⤵PID:2736
-
-
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\Monetone" /v VolumeID /t REG_SZ /d 16C0-FFC6 /f3⤵PID:1664
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell.exe -nologo -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\hwid.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2124
-
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Tcpip\Parameters" /v "NV Hostname" /t REG_SZ /d Desktop-FEF5A /f3⤵PID:1536
-
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Tcpip\Parameters" /v Hostname /t REG_SZ /d Desktop-FEF5A /f3⤵PID:4084
-
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ComputerName\ComputerName" /v ComputerName /t REG_SZ /d Desktop-FEF5A /f3⤵PID:3356
-
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ComputerName\ActiveComputerName" /v ComputerName /t REG_SZ /d Desktop-FEF5A /f3⤵PID:4668
-
-
C:\Windows\system32\reg.exeREG DELETE "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v RegisteredOwner /f3⤵PID:544
-
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v RegisteredOwner /t REG_SZ /d /f3⤵PID:3692
-
-
C:\Windows\system32\netsh.exenetsh interface set interface name="Wi-Fi" admin=disabled3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3764
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002BE10318}\0007" /v NetworkAddress /d 024EFB38196A /f3⤵PID:2336
-
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0002" /v NetworkAddress /d 024EFB38196A /f3⤵PID:1076
-
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0002" /v NetworkAddress /d 024EFB38196A /f3⤵PID:2368
-
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0002" /v NetworkAddress /d 024EFB38196A /f3⤵PID:3576
-
-
C:\Windows\system32\netsh.exenetsh interface set interface name="Wi-Fi" admin=enabled3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2784
-
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e965-e325-11ce-bfc1-08002be10318}\Configuration\Variables\BusDeviceDesc" /v PropertyGuid /t REG_SZ /d {FA61BCA7-A7DB-20AF-A7DB-6a974E16C33E} /f3⤵PID:3188
-
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e967-e325-11ce-bfc1-08002be10318}\Configuration\Variables\BusDeviceDesc" /v PropertyGuid /t REG_SZ /d {FA61BCA7-A7DB-20AF-A7DB-6a974E16C33E} /f3⤵PID:5076
-
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v ProductId /t REG_SZ /d 00331-10401-00001-AFFC6 /f3⤵PID:4392
-
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v DigitalProductId /t REG_BINARY /d A4000000000003030312D3836382D303030303030372D383535353700AA0000005831352D3333000000000000000C3AABF20AFBA18B8878E89D20AF000000000000396CC459BD0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000A7DB6736 /f3⤵PID:2888
-
-
C:\Windows\system32\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v DigitalProductId4 /t REG_BINARY /d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f3⤵PID:3248
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\Commands\Hidden\Block.exeBlock.exe3⤵PID:3256
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9BF.tmp\9C0.tmp\9C1.bat C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\Commands\Hidden\Block.exe"4⤵PID:3760
-
C:\Windows\system32\PING.EXEping localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:660
-
-
C:\Windows\system32\tasklist.exetasklist /NH /FI "imagename eq Monotone.exe"5⤵
- Enumerates processes with tasklist
PID:3036
-
-
C:\Windows\system32\find.exefind /i "Monotone.exe"5⤵PID:4312
-
-
C:\Windows\system32\PING.EXEping localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4716
-
-
C:\Windows\system32\tasklist.exetasklist /NH /FI "imagename eq Monotone.exe"5⤵
- Enumerates processes with tasklist
PID:3544
-
-
C:\Windows\system32\find.exefind /i "Monotone.exe"5⤵PID:3748
-
-
C:\Windows\system32\PING.EXEping localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1508
-
-
C:\Windows\system32\tasklist.exetasklist /NH /FI "imagename eq Monotone.exe"5⤵
- Enumerates processes with tasklist
PID:704
-
-
C:\Windows\system32\find.exefind /i "Monotone.exe"5⤵PID:1012
-
-
C:\Windows\system32\PING.EXEping localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1248
-
-
C:\Windows\system32\tasklist.exetasklist /NH /FI "imagename eq Monotone.exe"5⤵
- Enumerates processes with tasklist
PID:2324
-
-
C:\Windows\system32\find.exefind /i "Monotone.exe"5⤵PID:2284
-
-
C:\Windows\system32\PING.EXEping localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4688
-
-
C:\Windows\system32\tasklist.exetasklist /NH /FI "imagename eq Monotone.exe"5⤵
- Enumerates processes with tasklist
PID:4384
-
-
C:\Windows\system32\find.exefind /i "Monotone.exe"5⤵PID:1264
-
-
C:\Windows\system32\PING.EXEping localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3116
-
-
C:\Windows\system32\tasklist.exetasklist /NH /FI "imagename eq Monotone.exe"5⤵
- Enumerates processes with tasklist
PID:3148
-
-
C:\Windows\system32\find.exefind /i "Monotone.exe"5⤵PID:5116
-
-
C:\Windows\system32\PING.EXEping localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2268
-
-
C:\Windows\system32\tasklist.exetasklist /NH /FI "imagename eq Monotone.exe"5⤵
- Enumerates processes with tasklist
PID:1864
-
-
C:\Windows\system32\find.exefind /i "Monotone.exe"5⤵PID:2584
-
-
C:\Windows\system32\PING.EXEping localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:644
-
-
C:\Windows\system32\tasklist.exetasklist /NH /FI "imagename eq Monotone.exe"5⤵
- Enumerates processes with tasklist
PID:4840
-
-
C:\Windows\system32\find.exefind /i "Monotone.exe"5⤵PID:1420
-
-
C:\Windows\system32\PING.EXEping localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2688
-
-
C:\Windows\system32\tasklist.exetasklist /NH /FI "imagename eq Monotone.exe"5⤵
- Enumerates processes with tasklist
PID:2076
-
-
C:\Windows\system32\find.exefind /i "Monotone.exe"5⤵PID:1684
-
-
C:\Windows\system32\PING.EXEping localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4444
-
-
C:\Windows\system32\tasklist.exetasklist /NH /FI "imagename eq Monotone.exe"5⤵
- Enumerates processes with tasklist
PID:3544
-
-
C:\Windows\system32\find.exefind /i "Monotone.exe"5⤵PID:3748
-
-
C:\Windows\system32\PING.EXEping localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1144
-
-
C:\Windows\system32\tasklist.exetasklist /NH /FI "imagename eq Monotone.exe"5⤵
- Enumerates processes with tasklist
PID:2324
-
-
C:\Windows\system32\find.exefind /i "Monotone.exe"5⤵PID:3776
-
-
C:\Windows\system32\PING.EXEping localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2176
-
-
C:\Windows\system32\tasklist.exetasklist /NH /FI "imagename eq Monotone.exe"5⤵
- Enumerates processes with tasklist
PID:344
-
-
C:\Windows\system32\find.exefind /i "Monotone.exe"5⤵PID:5060
-
-
C:\Windows\system32\PING.EXEping localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3352
-
-
C:\Windows\system32\tasklist.exetasklist /NH /FI "imagename eq Monotone.exe"5⤵
- Enumerates processes with tasklist
PID:1076
-
-
C:\Windows\system32\find.exefind /i "Monotone.exe"5⤵PID:4220
-
-
C:\Windows\system32\PING.EXEping localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3240
-
-
C:\Windows\system32\tasklist.exetasklist /NH /FI "imagename eq Monotone.exe"5⤵
- Enumerates processes with tasklist
PID:5016
-
-
C:\Windows\system32\find.exefind /i "Monotone.exe"5⤵PID:4400
-
-
C:\Windows\system32\PING.EXEping localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4464
-
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\Commands\Hidden\UnbanComplete.vbs"3⤵PID:2872
-
-
C:\Windows\system32\tasklist.exetasklist /NH /FI "imagename eq Block.exe"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4232
-
-
C:\Windows\system32\find.exefind /i "Block.exe"3⤵PID:880
-
-
C:\Windows\system32\mode.commode 80,203⤵PID:208
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic diskdrive get serialnumber3⤵PID:3528
-
C:\Windows\System32\Wbem\WMIC.exewmic diskdrive get serialnumber4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4868
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg.exe query "HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\IDConfigDB\Hardware Profiles\0001" /v "HwProfileGuid"3⤵PID:4960
-
C:\Windows\system32\reg.exereg.exe query "HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\IDConfigDB\Hardware Profiles\0001" /v "HwProfileGuid"4⤵PID:4180
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography" /v "MachineGuid"3⤵PID:5116
-
C:\Windows\system32\reg.exereg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography" /v "MachineGuid"4⤵PID:3148
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg.exe query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Tcpip\Parameters" /v "Hostname"3⤵PID:2268
-
C:\Windows\system32\reg.exereg.exe query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Tcpip\Parameters" /v "Hostname"4⤵PID:2096
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg.exe query "HKLM\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002BE10318}\0007" /v "NetworkAddress"3⤵PID:4048
-
C:\Windows\system32\reg.exereg.exe query "HKLM\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002BE10318}\0007" /v "NetworkAddress"4⤵PID:4856
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg.exe query "HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e965-e325-11ce-bfc1-08002be10318}\Configuration\Variables\BusDeviceDesc" /v "PropertyGuid"3⤵PID:4772
-
C:\Windows\system32\reg.exereg.exe query "HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e965-e325-11ce-bfc1-08002be10318}\Configuration\Variables\BusDeviceDesc" /v "PropertyGuid"4⤵PID:4016
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg.exe query "HKEY_CURRENT_USER\Monetone" /v "VolumeID"3⤵PID:1792
-
C:\Windows\system32\reg.exereg.exe query "HKEY_CURRENT_USER\Monetone" /v "VolumeID"4⤵PID:1688
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v "ProductID"3⤵PID:2752
-
C:\Windows\system32\reg.exereg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v "ProductID"4⤵PID:4844
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkCards\3" /v "ServiceName"3⤵PID:2212
-
C:\Windows\system32\reg.exereg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkCards\3" /v "ServiceName"4⤵PID:2944
-
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exebatbox /c 0x0f /g 0 2 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /g 0 1 /a 32 /d " " /a 32 /g 0 0 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /c 0x073⤵PID:1608
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exebatbox /c 0x0f /g 67 6 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /g 67 5 /a 32 /d " " /a 32 /g 67 4 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /c 0x073⤵PID:1952
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exebatbox /c 0x0f /g 2 18 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /g 2 17 /a 32 /d " " /a 32 /g 2 16 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /c 0x073⤵PID:1272
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exebatbox /c 0x0f /g 42 18 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /g 42 17 /a 32 /d " " /a 32 /g 42 16 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /c 0x073⤵PID:3084
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exeBatbox /g 2 1 /c 0x0f /d " Clean " /g 69 5 /c 0x0f /d "Refresh" /g 4 17 /c 0x0f /d " Unban " /g 44 17 /c 0x0f /d " Easy Anti Cheat " /c 0x073⤵PID:1420
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\GetInput.exeGetInput /M 0 0 79 2 67 4 77 6 2 16 38 18 42 16 77 18 /H 07 07 073⤵PID:3660
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Epic Games\Unreal Engine" /f3⤵PID:4680
-
-
C:\Windows\system32\tasklist.exetasklist /NH /FI "imagename eq Block.exe"3⤵
- Enumerates processes with tasklist
PID:2964
-
-
C:\Windows\system32\find.exefind /i "Block.exe"3⤵PID:3700
-
-
C:\Windows\system32\mode.commode 80,203⤵PID:3136
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic diskdrive get serialnumber3⤵PID:4892
-
C:\Windows\System32\Wbem\WMIC.exewmic diskdrive get serialnumber4⤵PID:3780
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg.exe query "HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\IDConfigDB\Hardware Profiles\0001" /v "HwProfileGuid"3⤵PID:4668
-
C:\Windows\system32\reg.exereg.exe query "HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\IDConfigDB\Hardware Profiles\0001" /v "HwProfileGuid"4⤵PID:544
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography" /v "MachineGuid"3⤵PID:3692
-
C:\Windows\system32\reg.exereg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography" /v "MachineGuid"4⤵PID:4268
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg.exe query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Tcpip\Parameters" /v "Hostname"3⤵PID:3984
-
C:\Windows\system32\reg.exereg.exe query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Tcpip\Parameters" /v "Hostname"4⤵PID:2420
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg.exe query "HKLM\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002BE10318}\0007" /v "NetworkAddress"3⤵PID:1660
-
C:\Windows\system32\reg.exereg.exe query "HKLM\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002BE10318}\0007" /v "NetworkAddress"4⤵PID:4484
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg.exe query "HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e965-e325-11ce-bfc1-08002be10318}\Configuration\Variables\BusDeviceDesc" /v "PropertyGuid"3⤵PID:5024
-
C:\Windows\system32\reg.exereg.exe query "HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e965-e325-11ce-bfc1-08002be10318}\Configuration\Variables\BusDeviceDesc" /v "PropertyGuid"4⤵PID:220
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg.exe query "HKEY_CURRENT_USER\Monetone" /v "VolumeID"3⤵PID:4152
-
C:\Windows\system32\reg.exereg.exe query "HKEY_CURRENT_USER\Monetone" /v "VolumeID"4⤵PID:4144
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v "ProductID"3⤵PID:920
-
C:\Windows\system32\reg.exereg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v "ProductID"4⤵PID:4392
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkCards\3" /v "ServiceName"3⤵PID:4948
-
C:\Windows\system32\reg.exereg.exe query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkCards\3" /v "ServiceName"4⤵PID:3616
-
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exebatbox /c 0x0f /g 0 2 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /g 0 1 /a 32 /d " " /a 32 /g 0 0 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /c 0x073⤵PID:4980
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exebatbox /c 0x0f /g 67 6 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /g 67 5 /a 32 /d " " /a 32 /g 67 4 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /c 0x073⤵PID:4000
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exebatbox /c 0x0f /g 2 18 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /g 2 17 /a 32 /d " " /a 32 /g 2 16 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /c 0x073⤵PID:212
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exebatbox /c 0x0f /g 42 18 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /g 42 17 /a 32 /d " " /a 32 /g 42 16 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /c 0x073⤵PID:4488
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exeBatbox /g 2 1 /c 0x0f /d " Clean " /g 69 5 /c 0x0f /d "Refresh" /g 4 17 /c 0x0f /d " Unban " /g 44 17 /c 0x0f /d " Easy Anti Cheat " /c 0x073⤵PID:1704
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\GetInput.exeGetInput /M 0 0 79 2 67 4 77 6 2 16 38 18 42 16 77 18 /H 07 07 073⤵PID:3244
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exebatbox /c 0xf0 /g 0 2 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /g 0 1 /a 32 /d " " /a 32 /g 0 0 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /c 0x073⤵PID:4856
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exebatbox /c 0xf0 /g 2 18 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /g 2 17 /a 32 /d " " /a 32 /g 2 16 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /c 0x073⤵PID:3028
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exebatbox /c 0xf0 /g 42 18 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /g 42 17 /a 32 /d " " /a 32 /g 42 16 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /c 0x073⤵PID:3796
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exeBatbox /g 2 1 /c 0xf0 /d " Spoofer " /g 4 17 /c 0xf0 /d " Clean " /g 44 17 /c 0xf0 /d " Manual Options " /c 0x073⤵PID:1316
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\GetInput.exeGetInput /M 0 0 79 2 2 16 38 18 42 16 77 18 /H f83⤵PID:1268
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exebatbox /c 0xf0 /g 0 2 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /g 0 1 /a 32 /d " " /a 32 /g 0 0 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /c 0x073⤵PID:2652
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exebatbox /c 0xf0 /g 47 8 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /g 47 7 /a 32 /d " " /a 32 /g 47 6 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /c 0x073⤵PID:1432
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exebatbox /c 0xf0 /g 47 12 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /g 47 11 /a 32 /d " " /a 32 /g 47 10 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /c 0x073⤵PID:556
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exebatbox /c 0xf0 /g 47 16 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /g 47 15 /a 32 /d " " /a 32 /g 47 14 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /c 0x073⤵PID:3344
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exeBatbox /g 2 1 /c 0xf0 /d " Back " /g 49 7 /c 0xf0 /d " Launch " /g 49 11 /c 0xf0 /d " Launch " /g 49 15 /c 0xf0 /d " Launch " /c 0x073⤵PID:4276
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\GetInput.exeGetInput /M 0 0 79 2 47 6 60 8 47 10 60 12 47 14 60 16 /H f83⤵PID:3520
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\Commands\Hidden\AlternateStreamView.exeAlternateStreamView.exe3⤵PID:4944
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exebatbox /c 0xf0 /g 0 2 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /g 0 1 /a 32 /d " " /a 32 /g 0 0 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /c 0x073⤵PID:2044
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exebatbox /c 0xf0 /g 47 8 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /g 47 7 /a 32 /d " " /a 32 /g 47 6 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /c 0x073⤵PID:1008
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exebatbox /c 0xf0 /g 47 12 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /g 47 11 /a 32 /d " " /a 32 /g 47 10 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /c 0x073⤵PID:1188
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exebatbox /c 0xf0 /g 47 16 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /g 47 15 /a 32 /d " " /a 32 /g 47 14 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /c 0x073⤵PID:3032
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exeBatbox /g 2 1 /c 0xf0 /d " Back " /g 49 7 /c 0xf0 /d " Launch " /g 49 11 /c 0xf0 /d " Launch " /g 49 15 /c 0xf0 /d " Launch " /c 0x073⤵PID:4816
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\GetInput.exeGetInput /M 0 0 79 2 47 6 60 8 47 10 60 12 47 14 60 16 /H f83⤵PID:4492
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\Commands\Hidden\Adapters2.exeAdapters2.exe3⤵PID:3688
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c pause4⤵PID:2440
-
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exebatbox /c 0xf0 /g 0 2 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /g 0 1 /a 32 /d " " /a 32 /g 0 0 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /c 0x073⤵PID:4680
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exebatbox /c 0xf0 /g 47 8 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /g 47 7 /a 32 /d " " /a 32 /g 47 6 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /c 0x073⤵PID:4596
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exebatbox /c 0xf0 /g 47 12 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /g 47 11 /a 32 /d " " /a 32 /g 47 10 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /c 0x073⤵PID:1752
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exebatbox /c 0xf0 /g 47 16 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /g 47 15 /a 32 /d " " /a 32 /g 47 14 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /c 0x073⤵PID:1104
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exeBatbox /g 2 1 /c 0xf0 /d " Back " /g 49 7 /c 0xf0 /d " Launch " /g 49 11 /c 0xf0 /d " Launch " /g 49 15 /c 0xf0 /d " Launch " /c 0x073⤵PID:4788
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\GetInput.exeGetInput /M 0 0 79 2 47 6 60 8 47 10 60 12 47 14 60 16 /H f83⤵PID:5032
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exebatbox /c 0xf0 /g 0 2 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /g 0 1 /a 32 /d " " /a 32 /g 0 0 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /c 0x073⤵PID:756
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exebatbox /c 0xf0 /g 2 18 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /g 2 17 /a 32 /d " " /a 32 /g 2 16 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /c 0x073⤵PID:1888
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exebatbox /c 0xf0 /g 42 18 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /g 42 17 /a 32 /d " " /a 32 /g 42 16 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /a 32 /c 0x073⤵PID:4884
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\batbox.exeBatbox /g 2 1 /c 0xf0 /d " Spoofer " /g 4 17 /c 0xf0 /d " Clean " /g 44 17 /c 0xf0 /d " Manual Options " /c 0x073⤵PID:3984
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\GetInput.exeGetInput /M 0 0 79 2 2 16 38 18 42 16 77 18 /H f83⤵PID:3484
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Epic Games" /f3⤵PID:1376
-
-
C:\Windows\system32\PING.EXEping localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4812
-
-
C:\Users\Admin\AppData\Local\Temp\Monotone-HWID-Spoofer-0.0.1\Commands\Hidden\Adapters.exeCommands\Hidden\Adapters.exe3⤵
- Checks SCSI registry key(s)
PID:3144
-
-
Network
MITRE ATT&CK Enterprise v15
Discovery
Peripheral Device Discovery
1Process Discovery
1Query Registry
2Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD5c5b9f5f77bee19857e4331300d080e3b
SHA150f5d39311cf12636d9ebe58aa4464578995f112
SHA256a689ce9bdcdbc32ad39cbab6349453847a71a386cb4c4be4ffe2daff57fce52d
SHA512ecb86677eb5bb0c0dc8b7c1d351cd7409772699393ebce902fcaa05442d46da112cfe8ca2215794ae2308c573d56fd51fd8920c488ff20c7b1c96cd7fced1dd1
-
Filesize
234B
MD56bf25f359aa5fbd7e1dd035df781227c
SHA1f13a903548ba59fe28e1b6edca19bab5083b806d
SHA256db9b3975c87afa294cafdd40cac28ed305d39c6215aa170dc3cf6005e86f9e46
SHA512ea91c96d2d8a5c28e4d81af7ac0175b9dcd6757e97925609ac23ce4e1738698c10ffd05ce446610330d6f66b78f01336df1a997d1535ab8d0925eef2de9ae314
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82