Analysis
-
max time kernel
2s -
max time network
91s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
02-01-2024 15:47
Static task
static1
Behavioral task
behavioral1
Sample
0131cfffda842b8b3da4ad14b00b1d4a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0131cfffda842b8b3da4ad14b00b1d4a.exe
Resource
win10v2004-20231222-en
General
-
Target
0131cfffda842b8b3da4ad14b00b1d4a.exe
-
Size
3.2MB
-
MD5
0131cfffda842b8b3da4ad14b00b1d4a
-
SHA1
99d6917f016a45a4deba595a5bc77bc87c14f54c
-
SHA256
1785f5f01c24a146f857a3b4a1b9e9cd0d23dea8b25f51c36186cdbeae50a0f2
-
SHA512
23fcdb269d5470491b23e558682eaecfefbcf9b728b764cfd4d859895aece566179c5a33924f0a5c2eea04d94f56ae0ce12a3dc767be5160d2f94166bd64c08d
-
SSDEEP
49152:bberQZbd2GerQZbd2GerQZbd2ZerQZbd2GerQZbd2GerQZbd2t:WrQZ8rQZ8rQZnrQZ8rQZ8rQZy
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" regedit.exe -
Blocks application from running via registry modification 17 IoCs
Adds application to list of disallowed applications.
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun = "1" regedit.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\2 = "RfwMain.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\6 = "RavMon.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\7 = "RavStub.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\10 = "rfwcfg.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\13 = "KAVPFW.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\3 = "Rfwsrv.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\11 = "KPFW32.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\14 = "KAV32.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\15 = "KAVStart.EXE" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\1 = "avp.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\4 = "RavMoD.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\5 = "CCenter.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\8 = "RavService.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\9 = "Rav.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\12 = "KPFW32X.EXE" regedit.exe -
Sets file execution options in registry 2 TTPs 20 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RfwMain.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMoD.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rfwsrv.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.EXE regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RfwMain.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rfwsrv.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.EXE\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMoD.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe\Debugger = "D:\\RECYCLER\\????8.exe" regedit.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Option.bat 0131cfffda842b8b3da4ad14b00b1d4a.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Help\HelpCat.exe 0131cfffda842b8b3da4ad14b00b1d4a.exe File created C:\Windows\Sysinf.bat 0131cfffda842b8b3da4ad14b00b1d4a.exe File created C:\Windows\regedt32.sys 0131cfffda842b8b3da4ad14b00b1d4a.exe File created C:\Windows\system\KavUpda.exe 0131cfffda842b8b3da4ad14b00b1d4a.exe File opened for modification C:\Windows\system\KavUpda.exe 0131cfffda842b8b3da4ad14b00b1d4a.exe File created C:\Windows\Help\HelpCat.exe 0131cfffda842b8b3da4ad14b00b1d4a.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3916 sc.exe 2572 sc.exe 408 sc.exe 3400 sc.exe 736 sc.exe 4116 sc.exe 3044 sc.exe 3792 sc.exe -
Runs net.exe
-
Runs regedit.exe 1 IoCs
pid Process 2188 regedit.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 3220 wrote to memory of 1180 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 24 PID 3220 wrote to memory of 1180 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 24 PID 3220 wrote to memory of 1180 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 24 PID 3220 wrote to memory of 1760 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 144 PID 3220 wrote to memory of 1760 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 144 PID 3220 wrote to memory of 1760 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 144 PID 1760 wrote to memory of 800 1760 Conhost.exe 21 PID 1760 wrote to memory of 800 1760 Conhost.exe 21 PID 1760 wrote to memory of 800 1760 Conhost.exe 21 PID 3220 wrote to memory of 1376 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 99 PID 3220 wrote to memory of 1376 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 99 PID 3220 wrote to memory of 1376 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 99 PID 3220 wrote to memory of 1852 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 98 PID 3220 wrote to memory of 1852 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 98 PID 3220 wrote to memory of 1852 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 98 PID 3220 wrote to memory of 4316 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 96 PID 3220 wrote to memory of 4316 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 96 PID 3220 wrote to memory of 4316 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 96 PID 3220 wrote to memory of 832 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 95 PID 3220 wrote to memory of 832 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 95 PID 3220 wrote to memory of 832 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 95 PID 3220 wrote to memory of 3940 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 130 PID 3220 wrote to memory of 3940 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 130 PID 3220 wrote to memory of 3940 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 130 PID 3220 wrote to memory of 2060 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 93 PID 3220 wrote to memory of 2060 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 93 PID 3220 wrote to memory of 2060 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 93 PID 3220 wrote to memory of 4952 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 90 PID 3220 wrote to memory of 4952 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 90 PID 3220 wrote to memory of 4952 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 90 PID 3220 wrote to memory of 3748 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 117 PID 3220 wrote to memory of 3748 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 117 PID 3220 wrote to memory of 3748 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 117 PID 3220 wrote to memory of 3916 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 235 PID 3220 wrote to memory of 3916 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 235 PID 3220 wrote to memory of 3916 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 235 PID 3220 wrote to memory of 3792 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 83 PID 3220 wrote to memory of 3792 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 83 PID 3220 wrote to memory of 3792 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 83 PID 3220 wrote to memory of 4116 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 59 PID 3220 wrote to memory of 4116 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 59 PID 3220 wrote to memory of 4116 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 59 PID 3220 wrote to memory of 3044 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 79 PID 3220 wrote to memory of 3044 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 79 PID 3220 wrote to memory of 3044 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 79 PID 3220 wrote to memory of 2188 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 60 PID 3220 wrote to memory of 2188 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 60 PID 3220 wrote to memory of 2188 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 60 PID 3940 wrote to memory of 4452 3940 Conhost.exe 131 PID 3940 wrote to memory of 4452 3940 Conhost.exe 131 PID 3940 wrote to memory of 4452 3940 Conhost.exe 131 PID 3220 wrote to memory of 4512 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 77 PID 3220 wrote to memory of 4512 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 77 PID 3220 wrote to memory of 4512 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 77 PID 3220 wrote to memory of 2204 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 154 PID 3220 wrote to memory of 2204 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 154 PID 3220 wrote to memory of 2204 3220 0131cfffda842b8b3da4ad14b00b1d4a.exe 154 PID 1852 wrote to memory of 1028 1852 attrib.exe 75 PID 1852 wrote to memory of 1028 1852 attrib.exe 75 PID 1852 wrote to memory of 1028 1852 attrib.exe 75 -
Views/modifies file attributes 1 TTPs 16 IoCs
pid Process 2356 attrib.exe 4584 attrib.exe 4616 attrib.exe 2204 attrib.exe 2276 attrib.exe 1584 attrib.exe 408 attrib.exe 2068 attrib.exe 2328 attrib.exe 4616 attrib.exe 1544 attrib.exe 1852 attrib.exe 3128 attrib.exe 624 attrib.exe 3408 attrib.exe 3296 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0131cfffda842b8b3da4ad14b00b1d4a.exe"C:\Users\Admin\AppData\Local\Temp\0131cfffda842b8b3da4ad14b00b1d4a.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Windows\SysWOW64\net.exenet.exe start schedule /y2⤵PID:1760
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Option.bat2⤵PID:1180
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled2⤵
- Launches sc.exe
PID:4116
-
-
C:\Windows\SysWOW64\regedit.exeregedit.exe /s C:\Windows\regedt32.sys2⤵
- Modifies visibility of file extensions in Explorer
- Blocks application from running via registry modification
- Sets file execution options in registry
- Runs regedit.exe
PID:2188
-
-
C:\Windows\system\KavUpda.exeC:\Windows\system\KavUpda.exe2⤵PID:808
-
C:\Windows\SysWOW64\net.exenet.exe start schedule /y3⤵PID:2316
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Option.bat3⤵PID:2784
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:2864
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2184
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:3608
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f3⤵PID:1944
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:2572
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled3⤵
- Launches sc.exe
PID:408
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:3400
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled3⤵
- Launches sc.exe
PID:736
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y3⤵PID:1496
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y3⤵PID:948
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:4588
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:1488
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y3⤵PID:3148
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:2068
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y3⤵PID:1468
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y3⤵PID:4608
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 3:54:16 PM C:\Windows\Sysinf.bat3⤵PID:4460
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 3:51:16 PM C:\Windows\Sysinf.bat3⤵PID:4440
-
-
C:\Windows\SysWOW64\At.exeAt.exe 3:52:14 PM C:\Windows\Help\HelpCat.exe3⤵PID:4824
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:4956
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:3204
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:3324
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:2356
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d4⤵
- Views/modifies file attributes
PID:2276
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:400
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:464
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:1528
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:748
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:2352
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:4320
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:3668
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:3808
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:680
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:2356
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:3856
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:5068
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:4588
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1644
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:3484
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:3740
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:4548
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:1680
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:4260
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:800
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q3⤵PID:744
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d3⤵PID:4880
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir C:\Autorun.inf /s /q3⤵PID:3356
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d3⤵PID:3148
-
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:2204
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f2⤵PID:4512
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:3044
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled2⤵
- Launches sc.exe
PID:3792
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled2⤵
- Launches sc.exe
PID:3916
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:3748
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵PID:4952
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵PID:2060
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵PID:3940
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵PID:832
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 3:54:13 PM C:\Windows\Sysinf.bat2⤵PID:4316
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 3:51:13 PM C:\Windows\Sysinf.bat2⤵PID:1852
-
-
C:\Windows\SysWOW64\At.exeAt.exe 3:52:11 PM C:\Windows\Help\HelpCat.exe2⤵PID:1376
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y2⤵PID:1608
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y3⤵PID:2744
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y2⤵PID:2052
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y2⤵PID:2708
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y2⤵PID:2200
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y2⤵PID:1528
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:800
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d2⤵
- Views/modifies file attributes
PID:408
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:4452
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:2184
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:1316
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:3120
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y1⤵PID:1540
-
C:\Windows\SysWOW64\at.exeat 3:54:13 PM C:\Windows\Sysinf.bat1⤵PID:2036
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:2724
-
C:\Windows\SysWOW64\at.exeat 3:51:13 PM C:\Windows\Sysinf.bat1⤵PID:1028
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:1544
-
C:\Windows\SysWOW64\at.exeat 3:54:16 PM C:\Windows\Sysinf.bat1⤵PID:2364
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2356 -
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d2⤵
- Views/modifies file attributes
PID:4616
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:3112
-
C:\Windows\SysWOW64\at.exeat 3:51:16 PM C:\Windows\Sysinf.bat1⤵PID:4544
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y1⤵PID:2020
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:432
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:4652
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y1⤵PID:3748
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y1⤵PID:3768
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y1⤵PID:680
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y1⤵PID:3092
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Suspicious use of WriteProcessMemory
PID:3940
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4452
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Suspicious use of WriteProcessMemory
PID:1760
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2204
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:2328
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1544
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4584
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:624
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Suspicious use of WriteProcessMemory
- Views/modifies file attributes
PID:1852
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:3916
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:3408
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:3296
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:1584
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:4616
-
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r F:\Autorun.inf\*.* /s /d1⤵
- Views/modifies file attributes
PID:3128