Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
2s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 04:03
Static task
static1
Behavioral task
behavioral1
Sample
275d0d9ef04eb1f7bfebe1b49472728d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
275d0d9ef04eb1f7bfebe1b49472728d.exe
Resource
win10v2004-20231222-en
General
-
Target
275d0d9ef04eb1f7bfebe1b49472728d.exe
-
Size
885KB
-
MD5
275d0d9ef04eb1f7bfebe1b49472728d
-
SHA1
069628f3b8e68ff2d1a1604774f818ef92923955
-
SHA256
f850a12bab9b413b7fcad38e94304e3ed9b6a7a650714032a6e53b0410779896
-
SHA512
dc9e7d7fb5d18ded7eddfe7c86f17985ba05d98c68cdfcaf4a3dd29f8609c2389098a56cda631e735ac224fa54364c7b283b1732a15a0053de24d73f2107d5c3
-
SSDEEP
6144:UZfec9EbXDk6RkNKWnmy+g4IE2EorG1VVE+IRuHOJnmy+g4IE2EorG1VVE+I5uHz:UZWtI6Rkjaku9OJakudOZaku9OJaku5
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Option.bat 275d0d9ef04eb1f7bfebe1b49472728d.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\system\KavUpda.exe 275d0d9ef04eb1f7bfebe1b49472728d.exe File created C:\Windows\Help\HelpCat.exe 275d0d9ef04eb1f7bfebe1b49472728d.exe File opened for modification C:\Windows\Help\HelpCat.exe 275d0d9ef04eb1f7bfebe1b49472728d.exe File created C:\Windows\Sysinf.bat 275d0d9ef04eb1f7bfebe1b49472728d.exe File created C:\Windows\system\KavUpda.exe 275d0d9ef04eb1f7bfebe1b49472728d.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2980 sc.exe 1260 sc.exe 1820 sc.exe 1700 sc.exe 2176 sc.exe 1588 sc.exe 2664 sc.exe 2404 sc.exe -
Runs net.exe
-
Runs regedit.exe 1 IoCs
pid Process 1708 regedit.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2028 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 20 PID 3016 wrote to memory of 2028 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 20 PID 3016 wrote to memory of 2028 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 20 PID 3016 wrote to memory of 2028 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 20 PID 3016 wrote to memory of 2916 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 18 PID 3016 wrote to memory of 2916 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 18 PID 3016 wrote to memory of 2916 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 18 PID 3016 wrote to memory of 2916 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 18 PID 2916 wrote to memory of 2584 2916 net.exe 17 PID 2916 wrote to memory of 2584 2916 net.exe 17 PID 2916 wrote to memory of 2584 2916 net.exe 17 PID 2916 wrote to memory of 2584 2916 net.exe 17 PID 3016 wrote to memory of 2836 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 74 PID 3016 wrote to memory of 2836 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 74 PID 3016 wrote to memory of 2836 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 74 PID 3016 wrote to memory of 2836 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 74 PID 3016 wrote to memory of 2604 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 149 PID 3016 wrote to memory of 2604 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 149 PID 3016 wrote to memory of 2604 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 149 PID 3016 wrote to memory of 2604 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 149 PID 3016 wrote to memory of 2488 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 71 PID 3016 wrote to memory of 2488 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 71 PID 3016 wrote to memory of 2488 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 71 PID 3016 wrote to memory of 2488 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 71 PID 3016 wrote to memory of 2688 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 69 PID 3016 wrote to memory of 2688 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 69 PID 3016 wrote to memory of 2688 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 69 PID 3016 wrote to memory of 2688 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 69 PID 3016 wrote to memory of 2588 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 66 PID 3016 wrote to memory of 2588 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 66 PID 3016 wrote to memory of 2588 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 66 PID 3016 wrote to memory of 2588 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 66 PID 2688 wrote to memory of 3044 2688 net.exe 63 PID 2688 wrote to memory of 3044 2688 net.exe 63 PID 2688 wrote to memory of 3044 2688 net.exe 63 PID 2688 wrote to memory of 3044 2688 net.exe 63 PID 3016 wrote to memory of 2988 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 64 PID 3016 wrote to memory of 2988 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 64 PID 3016 wrote to memory of 2988 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 64 PID 3016 wrote to memory of 2988 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 64 PID 2604 wrote to memory of 2648 2604 cmd.exe 33 PID 2604 wrote to memory of 2648 2604 cmd.exe 33 PID 2604 wrote to memory of 2648 2604 cmd.exe 33 PID 2604 wrote to memory of 2648 2604 cmd.exe 33 PID 3016 wrote to memory of 2344 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 62 PID 3016 wrote to memory of 2344 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 62 PID 3016 wrote to memory of 2344 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 62 PID 3016 wrote to memory of 2344 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 62 PID 2488 wrote to memory of 3000 2488 cmd.exe 146 PID 2488 wrote to memory of 3000 2488 cmd.exe 146 PID 2488 wrote to memory of 3000 2488 cmd.exe 146 PID 2488 wrote to memory of 3000 2488 cmd.exe 146 PID 3016 wrote to memory of 1880 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 58 PID 3016 wrote to memory of 1880 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 58 PID 3016 wrote to memory of 1880 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 58 PID 3016 wrote to memory of 1880 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 58 PID 3016 wrote to memory of 2980 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 57 PID 3016 wrote to memory of 2980 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 57 PID 3016 wrote to memory of 2980 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 57 PID 3016 wrote to memory of 2980 3016 275d0d9ef04eb1f7bfebe1b49472728d.exe 57 PID 2588 wrote to memory of 3008 2588 net.exe 137 PID 2588 wrote to memory of 3008 2588 net.exe 137 PID 2588 wrote to memory of 3008 2588 net.exe 137 PID 2588 wrote to memory of 3008 2588 net.exe 137 -
Views/modifies file attributes 1 TTPs 16 IoCs
pid Process 2996 attrib.exe 2832 attrib.exe 1964 attrib.exe 856 attrib.exe 2328 attrib.exe 2756 attrib.exe 1364 attrib.exe 1232 attrib.exe 2408 attrib.exe 2756 attrib.exe 2800 attrib.exe 2412 attrib.exe 2832 attrib.exe 2452 attrib.exe 268 attrib.exe 1588 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\275d0d9ef04eb1f7bfebe1b49472728d.exe"C:\Users\Admin\AppData\Local\Temp\275d0d9ef04eb1f7bfebe1b49472728d.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\net.exenet.exe start schedule /y2⤵
- Suspicious use of WriteProcessMemory
PID:2916
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Option.bat2⤵PID:2028
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:1816
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:1924
-
-
C:\Windows\SysWOW64\regedit.exeregedit.exe /s C:\Windows\regedt32.sys2⤵
- Runs regedit.exe
PID:1708
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:1588
-
-
C:\Windows\system\KavUpda.exeC:\Windows\system\KavUpda.exe2⤵PID:1456
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y3⤵PID:852
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y4⤵PID:876
-
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:856
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2944
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1308
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:2112
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:2192
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:1260
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled3⤵
- Launches sc.exe
PID:1820
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:1700
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:2176
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y3⤵PID:1000
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y3⤵PID:700
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y3⤵PID:2092
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y3⤵PID:2932
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 11:23:01 AM C:\Windows\Sysinf.bat3⤵PID:1864
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 11:20:01 AM C:\Windows\Sysinf.bat3⤵PID:1868
-
-
C:\Windows\SysWOW64\At.exeAt.exe 11:20:59 AM C:\Windows\Help\HelpCat.exe3⤵PID:2280
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2124
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2716
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2616
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2876
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1660
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:288
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2740
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵
- Suspicious use of WriteProcessMemory
PID:2604
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2196
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1528
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2452
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:796
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1160
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1808
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1116
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:852
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2116
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2532
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2840
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2720
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1636
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2632
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:1536
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1800
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2648
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1568
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2960
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2928
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:2060
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1496
-
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled2⤵
- Launches sc.exe
PID:2664
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled2⤵
- Launches sc.exe
PID:2404
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:2980
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:1880
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵PID:2344
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵PID:2988
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵
- Suspicious use of WriteProcessMemory
PID:2588
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵
- Suspicious use of WriteProcessMemory
PID:2688
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 11:22:58 AM C:\Windows\Sysinf.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2488
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 11:19:58 AM C:\Windows\Sysinf.bat2⤵PID:2604
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵
- Views/modifies file attributes
PID:2832
-
-
-
C:\Windows\SysWOW64\At.exeAt.exe 11:20:56 AM C:\Windows\Help\HelpCat.exe2⤵PID:2836
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵PID:2560
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y3⤵PID:2096
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:556
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y3⤵PID:108
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵PID:2128
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵PID:2924
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵PID:268
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:2584
-
C:\Windows\SysWOW64\at.exeat 11:19:58 AM C:\Windows\Sysinf.bat1⤵PID:2648
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Option.bat1⤵PID:1332
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:2248
-
C:\Windows\SysWOW64\net.exenet.exe start schedule /y1⤵PID:2040
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:1684
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:1468
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:2316
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:3008
-
C:\Windows\SysWOW64\at.exeat 11:22:58 AM C:\Windows\Sysinf.bat1⤵PID:3000
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:3044
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1232
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:1500
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:1620
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:2548
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:1968
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:2336
-
C:\Windows\SysWOW64\at.exeat 11:23:01 AM C:\Windows\Sysinf.bat1⤵PID:1004
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:2060
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:1228
-
C:\Windows\SysWOW64\at.exeat 11:20:01 AM C:\Windows\Sysinf.bat1⤵PID:704
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2756
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2996
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "607865743-20668390321204603548-17752174911344687013-1086675862222005050698038933"1⤵PID:3008
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1588
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "3452859321884048307-144002769712267927501028436005-18276446049859561271788054927"1⤵PID:3000
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1964
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2412
-
C:\Windows\system32\taskeng.exetaskeng.exe {9ECA887C-09F1-4546-9393-DF99D1122DE5} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:1020
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2408
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2328
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2756
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2800
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1364
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2832
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2452
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:268