Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
2s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 18:36
Static task
static1
Behavioral task
behavioral1
Sample
34f3ed7b9a9c520f558d9a22e3994521.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
34f3ed7b9a9c520f558d9a22e3994521.exe
Resource
win10v2004-20231215-en
General
-
Target
34f3ed7b9a9c520f558d9a22e3994521.exe
-
Size
2.0MB
-
MD5
34f3ed7b9a9c520f558d9a22e3994521
-
SHA1
dde0d0672a16456fd6f0905034c43e6e2182eb37
-
SHA256
e6ea9a4f102ba876cd208092e784f5af3fad5812df9ee50323b10b5447bc6d8f
-
SHA512
9cee950c1f7903ea5bc94319bc2cd1149f431f79329fbd188b9a54020ba386cf1802909a5b77b02c18cc391491de7c2f5ef77c5dc7f1c5cdba9721d3153db4a2
-
SSDEEP
49152:bQerQZbd2terQZbd2uerQZbd2terQZbd2H8r:VrQZjrQZYrQZjrQZr
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Option.bat 34f3ed7b9a9c520f558d9a22e3994521.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\system\KavUpda.exe 34f3ed7b9a9c520f558d9a22e3994521.exe File opened for modification C:\Windows\system\KavUpda.exe 34f3ed7b9a9c520f558d9a22e3994521.exe File created C:\Windows\Help\HelpCat.exe 34f3ed7b9a9c520f558d9a22e3994521.exe File opened for modification C:\Windows\Help\HelpCat.exe 34f3ed7b9a9c520f558d9a22e3994521.exe File created C:\Windows\Sysinf.bat 34f3ed7b9a9c520f558d9a22e3994521.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1548 sc.exe 1092 sc.exe 1088 sc.exe 852 sc.exe 1964 sc.exe 2420 sc.exe 2884 sc.exe 2404 sc.exe -
Runs net.exe
-
Runs regedit.exe 1 IoCs
pid Process 764 regedit.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2540 34f3ed7b9a9c520f558d9a22e3994521.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2024 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 20 PID 2540 wrote to memory of 2024 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 20 PID 2540 wrote to memory of 2024 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 20 PID 2540 wrote to memory of 2024 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 20 PID 2540 wrote to memory of 2900 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 19 PID 2540 wrote to memory of 2900 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 19 PID 2540 wrote to memory of 2900 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 19 PID 2540 wrote to memory of 2900 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 19 PID 2900 wrote to memory of 2012 2900 net.exe 18 PID 2900 wrote to memory of 2012 2900 net.exe 18 PID 2900 wrote to memory of 2012 2900 net.exe 18 PID 2900 wrote to memory of 2012 2900 net.exe 18 PID 2540 wrote to memory of 2644 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 129 PID 2540 wrote to memory of 2644 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 129 PID 2540 wrote to memory of 2644 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 129 PID 2540 wrote to memory of 2644 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 129 PID 2540 wrote to memory of 2656 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 73 PID 2540 wrote to memory of 2656 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 73 PID 2540 wrote to memory of 2656 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 73 PID 2540 wrote to memory of 2656 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 73 PID 2540 wrote to memory of 2684 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 71 PID 2540 wrote to memory of 2684 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 71 PID 2540 wrote to memory of 2684 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 71 PID 2540 wrote to memory of 2684 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 71 PID 2540 wrote to memory of 2608 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 69 PID 2540 wrote to memory of 2608 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 69 PID 2540 wrote to memory of 2608 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 69 PID 2540 wrote to memory of 2608 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 69 PID 2540 wrote to memory of 2572 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 66 PID 2540 wrote to memory of 2572 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 66 PID 2540 wrote to memory of 2572 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 66 PID 2540 wrote to memory of 2572 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 66 PID 2540 wrote to memory of 2724 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 64 PID 2540 wrote to memory of 2724 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 64 PID 2540 wrote to memory of 2724 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 64 PID 2540 wrote to memory of 2724 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 64 PID 2540 wrote to memory of 2764 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 62 PID 2540 wrote to memory of 2764 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 62 PID 2540 wrote to memory of 2764 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 62 PID 2540 wrote to memory of 2764 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 62 PID 2608 wrote to memory of 2592 2608 net.exe 61 PID 2608 wrote to memory of 2592 2608 net.exe 61 PID 2608 wrote to memory of 2592 2608 net.exe 61 PID 2608 wrote to memory of 2592 2608 net.exe 61 PID 2684 wrote to memory of 2568 2684 cmd.exe 33 PID 2684 wrote to memory of 2568 2684 cmd.exe 33 PID 2684 wrote to memory of 2568 2684 cmd.exe 33 PID 2684 wrote to memory of 2568 2684 cmd.exe 33 PID 2656 wrote to memory of 2720 2656 cmd.exe 60 PID 2656 wrote to memory of 2720 2656 cmd.exe 60 PID 2656 wrote to memory of 2720 2656 cmd.exe 60 PID 2656 wrote to memory of 2720 2656 cmd.exe 60 PID 2572 wrote to memory of 2508 2572 net.exe 59 PID 2572 wrote to memory of 2508 2572 net.exe 59 PID 2572 wrote to memory of 2508 2572 net.exe 59 PID 2572 wrote to memory of 2508 2572 net.exe 59 PID 2724 wrote to memory of 2628 2724 net.exe 57 PID 2724 wrote to memory of 2628 2724 net.exe 57 PID 2724 wrote to memory of 2628 2724 net.exe 57 PID 2724 wrote to memory of 2628 2724 net.exe 57 PID 2540 wrote to memory of 2500 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 56 PID 2540 wrote to memory of 2500 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 56 PID 2540 wrote to memory of 2500 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 56 PID 2540 wrote to memory of 2500 2540 34f3ed7b9a9c520f558d9a22e3994521.exe 56 -
Views/modifies file attributes 1 TTPs 16 IoCs
pid Process 860 attrib.exe 940 attrib.exe 2284 attrib.exe 2548 attrib.exe 2504 attrib.exe 1736 attrib.exe 2832 attrib.exe 1632 attrib.exe 1072 attrib.exe 1984 attrib.exe 336 attrib.exe 1456 attrib.exe 2548 attrib.exe 888 attrib.exe 1508 attrib.exe 1656 attrib.exe
Processes
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:2012
-
C:\Windows\SysWOW64\net.exenet.exe start schedule /y1⤵
- Suspicious use of WriteProcessMemory
PID:2900
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Option.bat1⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\34f3ed7b9a9c520f558d9a22e3994521.exe"C:\Users\Admin\AppData\Local\Temp\34f3ed7b9a9c520f558d9a22e3994521.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled2⤵
- Launches sc.exe
PID:1964
-
-
C:\Windows\SysWOW64\regedit.exeregedit.exe /s C:\Windows\regedt32.sys2⤵
- Runs regedit.exe
PID:764
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:1956
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:1624
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:2420
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled2⤵
- Launches sc.exe
PID:2884
-
-
C:\Windows\system\KavUpda.exeC:\Windows\system\KavUpda.exe2⤵PID:944
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y3⤵PID:452
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y4⤵PID:1364
-
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:1548
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2380
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2032
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:2144
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:1416
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:1092
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled3⤵
- Launches sc.exe
PID:1088
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:852
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y3⤵PID:380
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y3⤵PID:2068
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y3⤵PID:2284
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y3⤵PID:1720
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 4:17:46 PM C:\Windows\Sysinf.bat3⤵PID:2780
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 4:14:46 PM C:\Windows\Sysinf.bat3⤵PID:3052
-
-
C:\Windows\SysWOW64\At.exeAt.exe 4:15:44 PM C:\Windows\Help\HelpCat.exe3⤵PID:1232
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2928
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2220
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:3036
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2532
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1752
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:320
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2812
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2952
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2372
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2352
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2124
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2084
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1156
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2276
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1548
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:1456
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:404
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1688
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1220
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2340
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1264
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2852
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2648
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2672
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2172
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2684
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2228
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2068
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2076
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1720
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:1508
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1360
-
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:2404
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:2500
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵PID:2764
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵
- Suspicious use of WriteProcessMemory
PID:2724
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵
- Suspicious use of WriteProcessMemory
PID:2572
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵
- Suspicious use of WriteProcessMemory
PID:2608
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 4:17:43 PM C:\Windows\Sysinf.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2684
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 4:14:43 PM C:\Windows\Sysinf.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2656
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:2668
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵PID:1200
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵PID:2276
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵
- Views/modifies file attributes
PID:2284
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵PID:600
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵PID:1740
-
-
C:\Windows\SysWOW64\At.exeAt.exe 4:15:41 PM C:\Windows\Help\HelpCat.exe2⤵PID:2644
-
-
C:\Windows\SysWOW64\at.exeat 4:17:43 PM C:\Windows\Sysinf.bat1⤵PID:2568
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:1692
-
C:\Windows\SysWOW64\net.exenet.exe start schedule /y1⤵PID:1564
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Option.bat1⤵PID:1528
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:3036
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:3004
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:2628
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:2508
-
C:\Windows\SysWOW64\at.exeat 4:14:43 PM C:\Windows\Sysinf.bat1⤵PID:2720
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:2592
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2832
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:784
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:1324
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:2828
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:2432
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:1516
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:1156
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:644
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:2112
-
C:\Windows\SysWOW64\at.exeat 4:14:46 PM C:\Windows\Sysinf.bat1⤵PID:1500
-
C:\Windows\SysWOW64\at.exeat 4:17:46 PM C:\Windows\Sysinf.bat1⤵PID:592
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:780
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2548
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1984
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2504
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1632
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1656
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:336
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1736
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2548
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:888
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:860
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:940
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1072