Analysis
-
max time kernel
7s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 11:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1725b9ad74fb3f994b5a7392d4f756aa.exe
Resource
win7-20231215-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
1725b9ad74fb3f994b5a7392d4f756aa.exe
Resource
win10v2004-20231215-en
11 signatures
150 seconds
General
-
Target
1725b9ad74fb3f994b5a7392d4f756aa.exe
-
Size
956KB
-
MD5
1725b9ad74fb3f994b5a7392d4f756aa
-
SHA1
9feb89894f98e8bacd3cadfa99b4f316d5ab39d4
-
SHA256
572298b4b8514f4250651e1205995b8a00ea33ea3be9bcf98b8be4796d85f981
-
SHA512
8b71ef8d3e66aa5b8468ae64f2f93428dfddab8f8f8842db4b792930e27a0eb20323840ad0cd4ab2b7391a4e128f525438d905e09027fc8de41f5fedef4ab8c8
-
SSDEEP
12288:UZWtI6Rk2erQZb+md4w1U4unupOB0JuPs/og4:Uuha2erQZb+md4wmaODOL4
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Option.bat 1725b9ad74fb3f994b5a7392d4f756aa.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\system\KavUpda.exe 1725b9ad74fb3f994b5a7392d4f756aa.exe File opened for modification C:\Windows\system\KavUpda.exe 1725b9ad74fb3f994b5a7392d4f756aa.exe File created C:\Windows\Help\HelpCat.exe 1725b9ad74fb3f994b5a7392d4f756aa.exe File opened for modification C:\Windows\Help\HelpCat.exe 1725b9ad74fb3f994b5a7392d4f756aa.exe File created C:\Windows\Sysinf.bat 1725b9ad74fb3f994b5a7392d4f756aa.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2372 sc.exe 1020 sc.exe 640 sc.exe 1108 sc.exe 1012 sc.exe 676 sc.exe 928 sc.exe 1752 sc.exe -
Runs net.exe
-
Runs regedit.exe 1 IoCs
pid Process 2600 regedit.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1196 wrote to memory of 2700 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 29 PID 1196 wrote to memory of 2700 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 29 PID 1196 wrote to memory of 2700 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 29 PID 1196 wrote to memory of 2700 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 29 PID 1196 wrote to memory of 2708 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 31 PID 1196 wrote to memory of 2708 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 31 PID 1196 wrote to memory of 2708 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 31 PID 1196 wrote to memory of 2708 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 31 PID 2708 wrote to memory of 2668 2708 net.exe 32 PID 2708 wrote to memory of 2668 2708 net.exe 32 PID 2708 wrote to memory of 2668 2708 net.exe 32 PID 2708 wrote to memory of 2668 2708 net.exe 32 PID 1196 wrote to memory of 1892 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 33 PID 1196 wrote to memory of 1892 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 33 PID 1196 wrote to memory of 1892 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 33 PID 1196 wrote to memory of 1892 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 33 PID 1196 wrote to memory of 2676 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 34 PID 1196 wrote to memory of 2676 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 34 PID 1196 wrote to memory of 2676 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 34 PID 1196 wrote to memory of 2676 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 34 PID 1196 wrote to memory of 2964 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 35 PID 1196 wrote to memory of 2964 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 35 PID 1196 wrote to memory of 2964 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 35 PID 1196 wrote to memory of 2964 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 35 PID 1196 wrote to memory of 2156 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 73 PID 1196 wrote to memory of 2156 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 73 PID 1196 wrote to memory of 2156 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 73 PID 1196 wrote to memory of 2156 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 73 PID 1196 wrote to memory of 2616 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 70 PID 1196 wrote to memory of 2616 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 70 PID 1196 wrote to memory of 2616 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 70 PID 1196 wrote to memory of 2616 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 70 PID 1196 wrote to memory of 2560 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 69 PID 1196 wrote to memory of 2560 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 69 PID 1196 wrote to memory of 2560 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 69 PID 1196 wrote to memory of 2560 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 69 PID 1196 wrote to memory of 2624 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 68 PID 1196 wrote to memory of 2624 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 68 PID 1196 wrote to memory of 2624 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 68 PID 1196 wrote to memory of 2624 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 68 PID 1196 wrote to memory of 2604 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 64 PID 1196 wrote to memory of 2604 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 64 PID 1196 wrote to memory of 2604 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 64 PID 1196 wrote to memory of 2604 1196 1725b9ad74fb3f994b5a7392d4f756aa.exe 64 PID 2156 wrote to memory of 1192 2156 net.exe 65 PID 2156 wrote to memory of 1192 2156 net.exe 65 PID 2156 wrote to memory of 1192 2156 net.exe 65 PID 2156 wrote to memory of 1192 2156 net.exe 65 PID 2964 wrote to memory of 2176 2964 cmd.exe 62 PID 2964 wrote to memory of 2176 2964 cmd.exe 62 PID 2964 wrote to memory of 2176 2964 cmd.exe 62 PID 2964 wrote to memory of 2176 2964 cmd.exe 62 PID 2616 wrote to memory of 2472 2616 net.exe 38 PID 2616 wrote to memory of 2472 2616 net.exe 38 PID 2616 wrote to memory of 2472 2616 net.exe 38 PID 2616 wrote to memory of 2472 2616 net.exe 38 PID 2676 wrote to memory of 2764 2676 cmd.exe 55 PID 2676 wrote to memory of 2764 2676 cmd.exe 55 PID 2676 wrote to memory of 2764 2676 cmd.exe 55 PID 2676 wrote to memory of 2764 2676 cmd.exe 55 PID 2560 wrote to memory of 600 2560 net.exe 140 PID 2560 wrote to memory of 600 2560 net.exe 140 PID 2560 wrote to memory of 600 2560 net.exe 140 PID 2560 wrote to memory of 600 2560 net.exe 140 -
Views/modifies file attributes 1 TTPs 16 IoCs
pid Process 2816 attrib.exe 2896 attrib.exe 1152 attrib.exe 2420 attrib.exe 2796 attrib.exe 1616 attrib.exe 1776 attrib.exe 2968 attrib.exe 1088 attrib.exe 2044 attrib.exe 2012 attrib.exe 2824 attrib.exe 2964 attrib.exe 2180 attrib.exe 2108 attrib.exe 1000 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1725b9ad74fb3f994b5a7392d4f756aa.exe"C:\Users\Admin\AppData\Local\Temp\1725b9ad74fb3f994b5a7392d4f756aa.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Option.bat2⤵PID:2700
-
-
C:\Windows\SysWOW64\net.exenet.exe start schedule /y2⤵
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y3⤵PID:2668
-
-
-
C:\Windows\SysWOW64\At.exeAt.exe 6:26:01 PM C:\Windows\Help\HelpCat.exe2⤵PID:1892
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 6:25:05 PM C:\Windows\Sysinf.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\at.exeat 6:25:05 PM C:\Windows\Sysinf.bat3⤵PID:2764
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 6:28:05 PM C:\Windows\Sysinf.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\at.exeat 6:28:05 PM C:\Windows\Sysinf.bat3⤵PID:2176
-
-
-
C:\Windows\SysWOW64\regedit.exeregedit.exe /s C:\Windows\regedt32.sys2⤵
- Runs regedit.exe
PID:2600
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:640
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled2⤵
- Launches sc.exe
PID:1108
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:1652
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:2548
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled2⤵
- Launches sc.exe
PID:1012
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:676
-
-
C:\Windows\system\KavUpda.exeC:\Windows\system\KavUpda.exe2⤵PID:2868
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2324
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1548
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:1664
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:2936
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:928
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled3⤵
- Launches sc.exe
PID:1752
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:2372
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:1020
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y3⤵PID:1944
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y3⤵PID:2400
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y3⤵PID:1492
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y3⤵PID:2240
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y3⤵PID:1100
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 6:28:09 PM C:\Windows\Sysinf.bat3⤵PID:1348
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 6:25:09 PM C:\Windows\Sysinf.bat3⤵PID:1876
-
-
C:\Windows\SysWOW64\At.exeAt.exe 6:26:07 PM C:\Windows\Help\HelpCat.exe3⤵PID:1796
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1864
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2876
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:600
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1732
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:3024
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1424
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:596
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2584
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1428
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1764
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2136
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1960
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2480
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2932
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1076
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2432
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1720
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1684
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1888
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2500
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:952
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:1616
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2300
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2996
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1580
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:292
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1084
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2152
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:2964
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2460
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:856
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2036
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:2604
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵PID:2624
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵
- Suspicious use of WriteProcessMemory
PID:2560
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵
- Suspicious use of WriteProcessMemory
PID:2616
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵
- Suspicious use of WriteProcessMemory
PID:2156
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:1996
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵PID:1716
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵PID:2112
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵PID:1720
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵PID:2264
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:2472
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:524
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:480
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:600
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:828
-
C:\Windows\SysWOW64\net.exenet.exe start schedule /y1⤵PID:2916
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Option.bat1⤵PID:2852
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:1192
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:1816
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1776
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:768
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:1632
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:948
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:664
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:328
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:2932
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d2⤵
- Views/modifies file attributes
PID:2420
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:1808
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:1924
-
C:\Windows\SysWOW64\at.exeat 6:28:09 PM C:\Windows\Sysinf.bat1⤵PID:1952
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:1980
-
C:\Windows\SysWOW64\at.exeat 6:25:09 PM C:\Windows\Sysinf.bat1⤵PID:3068
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2816
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2044
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2012
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2968
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2896
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1152
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2108
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2796
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1088
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1000
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2824
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2180