Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
2s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 00:04
Static task
static1
Behavioral task
behavioral1
Sample
1b900832cb050639b6ad4d1a48d0ac17.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1b900832cb050639b6ad4d1a48d0ac17.exe
Resource
win10v2004-20231215-en
General
-
Target
1b900832cb050639b6ad4d1a48d0ac17.exe
-
Size
1.0MB
-
MD5
1b900832cb050639b6ad4d1a48d0ac17
-
SHA1
1e5e53ccbe4cf233618deef7a0a496a923ef80f4
-
SHA256
4a7bbcea52d8239acdd7bcfcbc86d38b80a9d38a564caad0355b8f9328f02a84
-
SHA512
f3c12de92fd8907046f176df4a1f9d8964690c401a2899d2c6a8bb040457ca87dd0364096b984911e3ed5a51dfbadfaadbcb9ca88645f88758c05a93e5ddd1ed
-
SSDEEP
12288:UZWtI6RkcuxerQZb+md4w1UaerQZb+md4w1U4ul:UuhaxerQZb+md4wmaerQZb+md4wmx
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" regedit.exe -
Blocks application from running via registry modification 17 IoCs
Adds application to list of disallowed applications.
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\2 = "RfwMain.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\4 = "RavMoD.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\9 = "Rav.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\14 = "KAV32.EXE" regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun = "1" regedit.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\5 = "CCenter.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\10 = "rfwcfg.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\11 = "KPFW32.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\13 = "KAVPFW.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\1 = "avp.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\3 = "Rfwsrv.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\6 = "RavMon.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\12 = "KPFW32X.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\15 = "KAVStart.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\7 = "RavStub.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\8 = "RavService.exe" regedit.exe -
Sets file execution options in registry 2 TTPs 20 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rfwsrv.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RfwMain.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMoD.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.EXE\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMoD.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.EXE regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RfwMain.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rfwsrv.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Option.bat 1b900832cb050639b6ad4d1a48d0ac17.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\system\KavUpda.exe 1b900832cb050639b6ad4d1a48d0ac17.exe File opened for modification C:\Windows\system\KavUpda.exe 1b900832cb050639b6ad4d1a48d0ac17.exe File created C:\Windows\Help\HelpCat.exe 1b900832cb050639b6ad4d1a48d0ac17.exe File opened for modification C:\Windows\Help\HelpCat.exe 1b900832cb050639b6ad4d1a48d0ac17.exe File created C:\Windows\Sysinf.bat 1b900832cb050639b6ad4d1a48d0ac17.exe File created C:\Windows\regedt32.sys 1b900832cb050639b6ad4d1a48d0ac17.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1368 sc.exe 1916 sc.exe 4720 sc.exe 2172 sc.exe 4784 sc.exe 5044 sc.exe 1708 sc.exe 3320 sc.exe -
Runs net.exe
-
Runs regedit.exe 1 IoCs
pid Process 744 regedit.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3488 1b900832cb050639b6ad4d1a48d0ac17.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 3488 wrote to memory of 3392 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 23 PID 3488 wrote to memory of 3392 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 23 PID 3488 wrote to memory of 3392 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 23 PID 3488 wrote to memory of 1912 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 21 PID 3488 wrote to memory of 1912 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 21 PID 3488 wrote to memory of 1912 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 21 PID 1912 wrote to memory of 4796 1912 net.exe 138 PID 1912 wrote to memory of 4796 1912 net.exe 138 PID 1912 wrote to memory of 4796 1912 net.exe 138 PID 3488 wrote to memory of 4780 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 98 PID 3488 wrote to memory of 4780 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 98 PID 3488 wrote to memory of 4780 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 98 PID 3488 wrote to memory of 3108 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 97 PID 3488 wrote to memory of 3108 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 97 PID 3488 wrote to memory of 3108 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 97 PID 3488 wrote to memory of 4496 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 96 PID 3488 wrote to memory of 4496 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 96 PID 3488 wrote to memory of 4496 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 96 PID 3488 wrote to memory of 3980 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 94 PID 3488 wrote to memory of 3980 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 94 PID 3488 wrote to memory of 3980 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 94 PID 3488 wrote to memory of 1788 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 100 PID 3488 wrote to memory of 1788 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 100 PID 3488 wrote to memory of 1788 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 100 PID 3488 wrote to memory of 4972 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 235 PID 3488 wrote to memory of 4972 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 235 PID 3488 wrote to memory of 4972 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 235 PID 3488 wrote to memory of 2244 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 207 PID 3488 wrote to memory of 2244 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 207 PID 3488 wrote to memory of 2244 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 207 PID 3488 wrote to memory of 4672 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 85 PID 3488 wrote to memory of 4672 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 85 PID 3488 wrote to memory of 4672 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 85 PID 3488 wrote to memory of 4720 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 208 PID 3488 wrote to memory of 4720 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 208 PID 3488 wrote to memory of 4720 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 208 PID 3488 wrote to memory of 1916 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 82 PID 3488 wrote to memory of 1916 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 82 PID 3488 wrote to memory of 1916 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 82 PID 3488 wrote to memory of 1368 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 80 PID 3488 wrote to memory of 1368 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 80 PID 3488 wrote to memory of 1368 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 80 PID 3488 wrote to memory of 3320 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 116 PID 3488 wrote to memory of 3320 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 116 PID 3488 wrote to memory of 3320 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 116 PID 3488 wrote to memory of 744 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 58 PID 3488 wrote to memory of 744 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 58 PID 3488 wrote to memory of 744 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 58 PID 3980 wrote to memory of 4552 3980 Process not Found 59 PID 3980 wrote to memory of 4552 3980 Process not Found 59 PID 3980 wrote to memory of 4552 3980 Process not Found 59 PID 3488 wrote to memory of 2392 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 211 PID 3488 wrote to memory of 2392 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 211 PID 3488 wrote to memory of 2392 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 211 PID 3488 wrote to memory of 3632 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 74 PID 3488 wrote to memory of 3632 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 74 PID 3488 wrote to memory of 3632 3488 1b900832cb050639b6ad4d1a48d0ac17.exe 74 -
Views/modifies file attributes 1 TTPs 16 IoCs
pid Process 1128 attrib.exe 4740 attrib.exe 1896 attrib.exe 4336 attrib.exe 2032 attrib.exe 4904 attrib.exe 3584 attrib.exe 4568 attrib.exe 2572 attrib.exe 2124 attrib.exe 4920 attrib.exe 3964 attrib.exe 3552 attrib.exe 3916 attrib.exe 4988 attrib.exe 2816 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b900832cb050639b6ad4d1a48d0ac17.exe"C:\Users\Admin\AppData\Local\Temp\1b900832cb050639b6ad4d1a48d0ac17.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\SysWOW64\net.exenet.exe start schedule /y2⤵
- Suspicious use of WriteProcessMemory
PID:1912
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Option.bat2⤵PID:3392
-
-
C:\Windows\SysWOW64\regedit.exeregedit.exe /s C:\Windows\regedt32.sys2⤵
- Modifies visibility of file extensions in Explorer
- Blocks application from running via registry modification
- Sets file execution options in registry
- Runs regedit.exe
PID:744
-
-
C:\Windows\system\KavUpda.exeC:\Windows\system\KavUpda.exe2⤵PID:2784
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:3320
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:4056
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:2336
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:2976
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:2172
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled3⤵
- Launches sc.exe
PID:4784
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:5044
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:1708
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y3⤵PID:2916
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y3⤵PID:1356
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y3⤵PID:2896
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y3⤵PID:1828
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y3⤵PID:4604
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2232
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:4204
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 7:56:28 AM C:\Windows\Sysinf.bat3⤵PID:4448
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 7:53:28 AM C:\Windows\Sysinf.bat3⤵PID:3120
-
-
C:\Windows\SysWOW64\At.exeAt.exe 7:54:26 AM C:\Windows\Help\HelpCat.exe3⤵PID:564
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:4720
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:3524
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:940
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:3384
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:4440
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:4288
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:3964
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2744
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2296
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:4604
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:4972
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2180
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:4576
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1776
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1904
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:4780
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2572
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:3952
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:3076
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:3768
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:5116
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:4704
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:4128
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:2572
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:4856
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:4224
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:3952
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1396
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:4632
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2980
-
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:3632
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:2392
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:3320
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled2⤵
- Launches sc.exe
PID:1368
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled2⤵
- Launches sc.exe
PID:1916
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:4720
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:4672
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵PID:2244
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵PID:4972
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵
- Views/modifies file attributes
PID:3584
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵PID:1788
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵PID:3980
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 7:56:25 AM C:\Windows\Sysinf.bat2⤵PID:4496
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 7:53:25 AM C:\Windows\Sysinf.bat2⤵PID:3108
-
-
C:\Windows\SysWOW64\At.exeAt.exe 7:54:23 AM C:\Windows\Help\HelpCat.exe2⤵PID:4780
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:3940
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵PID:5112
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵PID:2744
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵PID:2720
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵PID:4468
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:4796
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:4552
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:2552
-
C:\Windows\SysWOW64\at.exeat 7:53:25 AM C:\Windows\Sysinf.bat1⤵PID:4084
-
C:\Windows\SysWOW64\at.exeat 7:56:25 AM C:\Windows\Sysinf.bat1⤵PID:4216
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:3148
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:3960
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:4568
-
C:\Windows\SysWOW64\net.exenet.exe start schedule /y1⤵PID:2240
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Option.bat1⤵PID:5024
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:4488
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:1788
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:468
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:2708
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:796
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:4740
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4920
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:3924
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:2240
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:3416
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:3492
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:3836
-
C:\Windows\SysWOW64\at.exeat 7:53:28 AM C:\Windows\Sysinf.bat1⤵PID:3368
-
C:\Windows\SysWOW64\at.exeat 7:56:28 AM C:\Windows\Sysinf.bat1⤵PID:1756
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:3600
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4796
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4904
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4740
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:2244
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵PID:2392
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2816
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1896
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:3552
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4568
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:3916
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4336
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4988
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2124
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2032
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1128