Analysis
-
max time kernel
2s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 08:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
616fa7bdafeaa4893603b99989c715f7.exe
Resource
win7-20231215-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
616fa7bdafeaa4893603b99989c715f7.exe
Resource
win10v2004-20231215-en
0 signatures
150 seconds
General
-
Target
616fa7bdafeaa4893603b99989c715f7.exe
-
Size
795KB
-
MD5
616fa7bdafeaa4893603b99989c715f7
-
SHA1
2898fd3fbfbe8d07c6d5e19ef1a2bc5552e73449
-
SHA256
5d7c8c59e1ec5a3470b4635fe52ea77fc124cd71f3a179a0599c8f4e0ba6c9a3
-
SHA512
6665112602d213d56763d964e819ba2832b11ccd742baf7cec1b8e2601e70cbede5013619911da4cbb54a9e2ecd27429d2ebfb174d007c281e179735d04226a0
-
SSDEEP
12288:UZWtI6Rk7XeZJys73dOvXDpNjNe8ferQZb+md4w1U4ut:Uuha7XeZJ8NI8ferQZb+md4wmB
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Option.bat 616fa7bdafeaa4893603b99989c715f7.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\Help\HelpCat.exe 616fa7bdafeaa4893603b99989c715f7.exe File opened for modification C:\Windows\Help\HelpCat.exe 616fa7bdafeaa4893603b99989c715f7.exe File created C:\Windows\Sysinf.bat 616fa7bdafeaa4893603b99989c715f7.exe File created C:\Windows\system\KavUpda.exe 616fa7bdafeaa4893603b99989c715f7.exe File opened for modification C:\Windows\system\KavUpda.exe 616fa7bdafeaa4893603b99989c715f7.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2508 sc.exe 2296 sc.exe 3056 sc.exe 2928 sc.exe 2920 sc.exe 1820 sc.exe 1380 sc.exe 1692 sc.exe -
Runs net.exe
-
Runs regedit.exe 1 IoCs
pid Process 2868 regedit.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1268 616fa7bdafeaa4893603b99989c715f7.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1268 wrote to memory of 2240 1268 616fa7bdafeaa4893603b99989c715f7.exe 20 PID 1268 wrote to memory of 2240 1268 616fa7bdafeaa4893603b99989c715f7.exe 20 PID 1268 wrote to memory of 2240 1268 616fa7bdafeaa4893603b99989c715f7.exe 20 PID 1268 wrote to memory of 2240 1268 616fa7bdafeaa4893603b99989c715f7.exe 20 PID 1268 wrote to memory of 2740 1268 616fa7bdafeaa4893603b99989c715f7.exe 131 PID 1268 wrote to memory of 2740 1268 616fa7bdafeaa4893603b99989c715f7.exe 131 PID 1268 wrote to memory of 2740 1268 616fa7bdafeaa4893603b99989c715f7.exe 131 PID 1268 wrote to memory of 2740 1268 616fa7bdafeaa4893603b99989c715f7.exe 131 PID 2740 wrote to memory of 2228 2740 attrib.exe 16 PID 2740 wrote to memory of 2228 2740 attrib.exe 16 PID 2740 wrote to memory of 2228 2740 attrib.exe 16 PID 2740 wrote to memory of 2228 2740 attrib.exe 16 PID 1268 wrote to memory of 2748 1268 616fa7bdafeaa4893603b99989c715f7.exe 74 PID 1268 wrote to memory of 2748 1268 616fa7bdafeaa4893603b99989c715f7.exe 74 PID 1268 wrote to memory of 2748 1268 616fa7bdafeaa4893603b99989c715f7.exe 74 PID 1268 wrote to memory of 2748 1268 616fa7bdafeaa4893603b99989c715f7.exe 74 PID 1268 wrote to memory of 2696 1268 616fa7bdafeaa4893603b99989c715f7.exe 73 PID 1268 wrote to memory of 2696 1268 616fa7bdafeaa4893603b99989c715f7.exe 73 PID 1268 wrote to memory of 2696 1268 616fa7bdafeaa4893603b99989c715f7.exe 73 PID 1268 wrote to memory of 2696 1268 616fa7bdafeaa4893603b99989c715f7.exe 73 PID 1268 wrote to memory of 2652 1268 616fa7bdafeaa4893603b99989c715f7.exe 72 PID 1268 wrote to memory of 2652 1268 616fa7bdafeaa4893603b99989c715f7.exe 72 PID 1268 wrote to memory of 2652 1268 616fa7bdafeaa4893603b99989c715f7.exe 72 PID 1268 wrote to memory of 2652 1268 616fa7bdafeaa4893603b99989c715f7.exe 72 PID 1268 wrote to memory of 2804 1268 616fa7bdafeaa4893603b99989c715f7.exe 69 PID 1268 wrote to memory of 2804 1268 616fa7bdafeaa4893603b99989c715f7.exe 69 PID 1268 wrote to memory of 2804 1268 616fa7bdafeaa4893603b99989c715f7.exe 69 PID 1268 wrote to memory of 2804 1268 616fa7bdafeaa4893603b99989c715f7.exe 69 PID 1268 wrote to memory of 2680 1268 616fa7bdafeaa4893603b99989c715f7.exe 68 PID 1268 wrote to memory of 2680 1268 616fa7bdafeaa4893603b99989c715f7.exe 68 PID 1268 wrote to memory of 2680 1268 616fa7bdafeaa4893603b99989c715f7.exe 68 PID 1268 wrote to memory of 2680 1268 616fa7bdafeaa4893603b99989c715f7.exe 68 PID 1268 wrote to memory of 2948 1268 616fa7bdafeaa4893603b99989c715f7.exe 139 PID 1268 wrote to memory of 2948 1268 616fa7bdafeaa4893603b99989c715f7.exe 139 PID 1268 wrote to memory of 2948 1268 616fa7bdafeaa4893603b99989c715f7.exe 139 PID 1268 wrote to memory of 2948 1268 616fa7bdafeaa4893603b99989c715f7.exe 139 PID 2680 wrote to memory of 1660 2680 net.exe 62 PID 2680 wrote to memory of 1660 2680 net.exe 62 PID 2680 wrote to memory of 1660 2680 net.exe 62 PID 2680 wrote to memory of 1660 2680 net.exe 62 PID 2696 wrote to memory of 2572 2696 cmd.exe 64 PID 2696 wrote to memory of 2572 2696 cmd.exe 64 PID 2696 wrote to memory of 2572 2696 cmd.exe 64 PID 2696 wrote to memory of 2572 2696 cmd.exe 64 PID 2652 wrote to memory of 2564 2652 cmd.exe 61 PID 2652 wrote to memory of 2564 2652 cmd.exe 61 PID 2652 wrote to memory of 2564 2652 cmd.exe 61 PID 2652 wrote to memory of 2564 2652 cmd.exe 61 PID 2948 wrote to memory of 2600 2948 cmd.exe 59 PID 2948 wrote to memory of 2600 2948 cmd.exe 59 PID 2948 wrote to memory of 2600 2948 cmd.exe 59 PID 2948 wrote to memory of 2600 2948 cmd.exe 59 PID 2804 wrote to memory of 2544 2804 net.exe 137 PID 2804 wrote to memory of 2544 2804 net.exe 137 PID 2804 wrote to memory of 2544 2804 net.exe 137 PID 2804 wrote to memory of 2544 2804 net.exe 137 PID 1268 wrote to memory of 2588 1268 616fa7bdafeaa4893603b99989c715f7.exe 58 PID 1268 wrote to memory of 2588 1268 616fa7bdafeaa4893603b99989c715f7.exe 58 PID 1268 wrote to memory of 2588 1268 616fa7bdafeaa4893603b99989c715f7.exe 58 PID 1268 wrote to memory of 2588 1268 616fa7bdafeaa4893603b99989c715f7.exe 58 PID 2588 wrote to memory of 284 2588 net.exe 55 PID 2588 wrote to memory of 284 2588 net.exe 55 PID 2588 wrote to memory of 284 2588 net.exe 55 PID 2588 wrote to memory of 284 2588 net.exe 55 -
Views/modifies file attributes 1 TTPs 16 IoCs
pid Process 2412 attrib.exe 2972 attrib.exe 2964 attrib.exe 1784 attrib.exe 2740 attrib.exe 2780 attrib.exe 1780 attrib.exe 2684 attrib.exe 2492 attrib.exe 1096 attrib.exe 2060 attrib.exe 1644 attrib.exe 2628 attrib.exe 2092 attrib.exe 1512 attrib.exe 2828 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\616fa7bdafeaa4893603b99989c715f7.exe"C:\Users\Admin\AppData\Local\Temp\616fa7bdafeaa4893603b99989c715f7.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\net.exenet.exe start schedule /y2⤵PID:2740
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Option.bat2⤵PID:2240
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:1512
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:1640
-
-
C:\Windows\SysWOW64\regedit.exeregedit.exe /s C:\Windows\regedt32.sys2⤵
- Runs regedit.exe
PID:2868
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:2296 -
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵
- Views/modifies file attributes
PID:1512
-
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled2⤵
- Launches sc.exe
PID:3056
-
-
C:\Windows\system\KavUpda.exeC:\Windows\system\KavUpda.exe2⤵PID:2736
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1364
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:580
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:3032
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:2524
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:1820
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled3⤵
- Launches sc.exe
PID:1380
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:1692
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:2508
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y3⤵PID:2400
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y3⤵PID:676
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y3⤵PID:2728
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y3⤵PID:2644
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y3⤵PID:2216
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 7:16:33 AM C:\Windows\Sysinf.bat3⤵PID:2024
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 7:13:33 AM C:\Windows\Sysinf.bat3⤵PID:1344
-
-
C:\Windows\SysWOW64\At.exeAt.exe 7:14:31 AM C:\Windows\Help\HelpCat.exe3⤵PID:1184
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1716
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1592
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2716
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵
- Suspicious use of WriteProcessMemory
PID:2948
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2140
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2636
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2664
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2832
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2880
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1420
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1132
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:636
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1328
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2076
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2424
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2224
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1672
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2332
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1772
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2408
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2324
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1596
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2944
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2860
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2096
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2296
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2136
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:848
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1848
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1624
-
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled2⤵
- Launches sc.exe
PID:2928
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:2920
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:1300
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵
- Suspicious use of WriteProcessMemory
PID:2588
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵PID:2948
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵
- Views/modifies file attributes
PID:2684
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵
- Suspicious use of WriteProcessMemory
PID:2680
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵
- Suspicious use of WriteProcessMemory
PID:2804
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 7:16:30 AM C:\Windows\Sysinf.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2652
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 7:13:30 AM C:\Windows\Sysinf.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2696
-
-
C:\Windows\SysWOW64\At.exeAt.exe 7:14:28 AM C:\Windows\Help\HelpCat.exe2⤵PID:2748
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:2260
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y3⤵PID:1856
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵PID:652
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵PID:1648
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵PID:2084
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵PID:2836
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:2228
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:1420
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d2⤵
- Views/modifies file attributes
PID:2492
-
-
C:\Windows\SysWOW64\net.exenet.exe start schedule /y1⤵PID:2888
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Option.bat1⤵PID:2904
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:2916
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:284
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:2600
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:2544
-
C:\Windows\SysWOW64\at.exeat 7:16:30 AM C:\Windows\Sysinf.bat1⤵PID:2564
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:1660
-
C:\Windows\SysWOW64\at.exeat 7:13:30 AM C:\Windows\Sysinf.bat1⤵PID:2572
-
C:\Windows\SysWOW64\at.exeat 7:16:33 AM C:\Windows\Sysinf.bat1⤵PID:480
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2828
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:312
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:960
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:1968
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:1388
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:2412
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:692
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:1848
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:3012
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:1096
-
C:\Windows\SysWOW64\at.exeat 7:13:33 AM C:\Windows\Sysinf.bat1⤵PID:2068
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Suspicious use of WriteProcessMemory
- Views/modifies file attributes
PID:2740
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "983685850562359310-1745647972-1596782620-1208673352-828834920-905389190-1173042861"1⤵PID:2544
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1644
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2780
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1096
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2412
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2628
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1780
-
C:\Windows\system32\taskeng.exetaskeng.exe {5B34AC6A-2FC3-4BC5-8EAB-7474C97CA86B} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:556
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2972
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2964
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2092
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1784
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2060