Analysis
-
max time kernel
76s -
max time network
81s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
27-05-2021 14:10
Static task
static1
Behavioral task
behavioral1
Sample
24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe
-
Size
1.9MB
-
MD5
abd35d575a95891bac53ec57e8d33ccd
-
SHA1
78078d9d1c867fca632ccac4fec5bfc65230f1ab
-
SHA256
24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42
-
SHA512
6036f6ad53f5b525f7ff2f48d1924d63fcac520dcfd57bba8288317e7bdd8c75470a2f050b16483e62143ac5090a7250e56b0030e89d7279d9b1998122429bd3
Score
8/10
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1356 Tra.exe.com 1996 Tra.exe.com -
Loads dropped DLL 2 IoCs
pid Process 684 cmd.exe 1356 Tra.exe.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Tra.exe.com Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Tra.exe.com -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1572 PING.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 332 wrote to memory of 1392 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 29 PID 332 wrote to memory of 1392 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 29 PID 332 wrote to memory of 1392 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 29 PID 332 wrote to memory of 1392 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 29 PID 332 wrote to memory of 1336 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 31 PID 332 wrote to memory of 1336 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 31 PID 332 wrote to memory of 1336 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 31 PID 332 wrote to memory of 1336 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 31 PID 332 wrote to memory of 1852 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 33 PID 332 wrote to memory of 1852 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 33 PID 332 wrote to memory of 1852 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 33 PID 332 wrote to memory of 1852 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 33 PID 332 wrote to memory of 520 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 35 PID 332 wrote to memory of 520 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 35 PID 332 wrote to memory of 520 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 35 PID 332 wrote to memory of 520 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 35 PID 332 wrote to memory of 752 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 37 PID 332 wrote to memory of 752 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 37 PID 332 wrote to memory of 752 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 37 PID 332 wrote to memory of 752 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 37 PID 332 wrote to memory of 936 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 39 PID 332 wrote to memory of 936 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 39 PID 332 wrote to memory of 936 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 39 PID 332 wrote to memory of 936 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 39 PID 332 wrote to memory of 2044 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 41 PID 332 wrote to memory of 2044 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 41 PID 332 wrote to memory of 2044 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 41 PID 332 wrote to memory of 2044 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 41 PID 332 wrote to memory of 2028 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 43 PID 332 wrote to memory of 2028 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 43 PID 332 wrote to memory of 2028 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 43 PID 332 wrote to memory of 2028 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 43 PID 332 wrote to memory of 1068 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 45 PID 332 wrote to memory of 1068 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 45 PID 332 wrote to memory of 1068 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 45 PID 332 wrote to memory of 1068 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 45 PID 332 wrote to memory of 1580 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 47 PID 332 wrote to memory of 1580 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 47 PID 332 wrote to memory of 1580 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 47 PID 332 wrote to memory of 1580 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 47 PID 332 wrote to memory of 844 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 49 PID 332 wrote to memory of 844 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 49 PID 332 wrote to memory of 844 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 49 PID 332 wrote to memory of 844 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 49 PID 332 wrote to memory of 1892 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 51 PID 332 wrote to memory of 1892 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 51 PID 332 wrote to memory of 1892 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 51 PID 332 wrote to memory of 1892 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 51 PID 332 wrote to memory of 1664 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 53 PID 332 wrote to memory of 1664 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 53 PID 332 wrote to memory of 1664 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 53 PID 332 wrote to memory of 1664 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 53 PID 332 wrote to memory of 900 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 55 PID 332 wrote to memory of 900 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 55 PID 332 wrote to memory of 900 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 55 PID 332 wrote to memory of 900 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 55 PID 332 wrote to memory of 1996 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 57 PID 332 wrote to memory of 1996 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 57 PID 332 wrote to memory of 1996 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 57 PID 332 wrote to memory of 1996 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 57 PID 332 wrote to memory of 860 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 59 PID 332 wrote to memory of 860 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 59 PID 332 wrote to memory of 860 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 59 PID 332 wrote to memory of 860 332 24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe 59
Processes
-
C:\Users\Admin\AppData\Local\Temp\24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe"C:\Users\Admin\AppData\Local\Temp\24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c xVpguGGxyc2⤵PID:1392
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bpEOnapciaOcVvMCGJUMWoiuIyTpAaGvJv2⤵PID:1336
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c dcQZdSoMHFAgSxtqK2⤵PID:1852
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c JjfenyanqUPLaLmzciPKETNcmAiRwPvsWkZpN2⤵PID:520
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WKGRShXWjOOnYXlZFQnTDXYBbknbPuMdGilttNqAnDgaeD2⤵PID:752
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c miWGoKTKZMtxGPAuyenRQMyVRPYxqIFmTcYfSADGMbkaZzxLYvodELZMwwOaMmKdiFAkQlhFmSyaBNWncjvDmfUicjhRLlThNUlxSoVOoDQMGGkgydXmeuQSKzPE2⤵PID:936
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vTgYRFHCBFjsIxWnoAOwZMchxlHraJmzsRMJCOPwDLDKKixLUzBSqCXJnwDGYDlSyTqQIjWxLNbhpKDhQVoYiHaOUekBlorZBKFQuErHbiihyJANbdQeckKnBjVFwcpCKbMnyMukSBBq2⤵PID:2044
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tIkCbrUawEdqifUIbGeYFDIWwILpEpTKKYvEKrDsglISvnXbjDcUneUBZgAOaLNRKFdpSdXzeKJcUQAD2⤵PID:2028
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c hXwOZkHrVEvDPZDvRiQoOFWFwSOamGpNWrtOLeLzIuWLBQhKuYeJJcWIqvMibgDgcIHLVOLPcvmIIlrkErjBDAtAucNffEWzCHdTpBOshhhhW2⤵PID:1068
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c qPaBCxeeLVEuFAwcmRAuyqUlergVhdjRERcXXOwCsAWxfeWgd2⤵PID:1580
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c OvMPpqUimmyuOxINBNyrbKPYPErmVZuZFvBQtPIxeQgCvlMBMCBppjzrGNqEXcjmayBaTRIMtKqHcjBFSBNznXQaenldOrbHEPlsIxIUTOtmjLHzkxMcHSwcfpfcHsX2⤵PID:844
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c jarGelWbSSm2⤵PID:1892
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SdudQQtxswZLNOwmthhCQtjTIqdwbgDPzsCYeZEQjDJlzaTgpbzFEXTOrhIPmrWenlsckevyJvfjceAfueRqVYlvnOVPsOspHGLowneuwh2⤵PID:1664
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c oHGawMaIbjWuAZVXbiGNUyuFOdsgIqKYIeeORcTeYyUXLAkpyAFZxmweBwELctqvBXnnWuywgDPPkpThtioocLEoqqhPRiHUybvOwMjZxDLQKjRaodGhVRqPadbWTdluWUJNNyjaVp2⤵PID:900
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c RqObOoUHAAxZhbGcLgfutzETQCrFetgaMtpOESINYIJFCUvduJBrFrIbcUGjyfFckwhogRRSGCivJYsVuMmzDkMJvLzJjvIJrgzAHhegRIbrVkOvDLu2⤵PID:1996
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c QjSqfEMCnoGpTnzcFQgSJlBUOJNlXWuBfgTRvzkrBmPJehpbSaRMvhJFLXkGQ2⤵PID:860
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c FCwyTFECZkFlspcRRBmdaEtxteFhyniFjZTjHXzESfaGujWmlTyKuAownHqRZsvBrqXsdopUoVbrkbhSuur2⤵PID:1288
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c abnMRSOqWBEBTRCygEpwKkCkeyPqxoLThloGCkAbxpX2⤵PID:1608
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c dWpxViEBWwCuVhJLrNGOPLhJIWDetMHAgVUuVcyjElWjHeKgCOzGDoQEIALYDBblzwRqaCQIIzpFOwwGjfAfawXytdbxJuIeMM2⤵PID:912
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c GlKWZYLYpZlQHmyMgwiSarMVeycYBKiTepxcBzBsGrOuTmQVExzwFUmCnOTTCMvnRsNntJlVAPkffFwCfAxudygoJRXMmHPUGfgCMsQUpnAPJphSNdEwsfiMrFOjLnvTq2⤵PID:1852
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c JZdmQXKmXSFnmmEtZoeNCdoCnuCDpLeHOaAgCgAGsRafuEugIGnhQh2⤵PID:1884
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c aRNqJxidkQXKuZfCLHcvKXScUqgUCjORBEibOhRjlBunpUZfztNFxRrxYsuIujOYwuoBSSObQpkpRxjZqYBbmpvKBMnvioyXMibeMbbAddOlFTDEyuIiL2⤵PID:1760
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c mRKnqyzsfItgvJWphCBqipxktIoUdwAXjcHGahbsiYquusvUIVTyGKp2⤵PID:1088
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bnzaWmqgiuwwwdRZypToohtNkgjcocsBjsoUUyxHXMZqfcSstTZvRqo2⤵PID:1380
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c zFuIjFyMPAOKiWyZPklcgtnQcUdfcVJkoZA2⤵PID:1112
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ZMcaGhkOGoliNZHGPMVgifjsgQdTQDBovRqePSPqTJlhKpBv2⤵PID:2008
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c rcvrjuJArtPXsXrHeLWZEQXXUxnyZHtfUFNiytlLdCMOZrC2⤵PID:1160
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c kETsrwWgoFbppHflMfdhiWcwUqCqE & fOcmzeiuplOoPmFQLQeLIkymZgpRbrmVJjdJNKhjrGyynYiWvrfLXThrJVAyTfIuKTmDoWewCPHwyZwqihxxNNXQYhZSpozNYZcFmENAqgpokjXJUmXGUgaWVJEUWlRzvTruEcBDmUzm & PEMdfYJkNTJHnKQZSEQvQLapRymYxuZUSayySEGjioJqznyKKEGdDeNrjDnlnLRGTOOyEKugXDfIeaPaZOhPmJsPEwT & yvNvdeuEJZuqnaaZNywUNulKbwulbYBCRQoBPTsZkkIZHhsidsem & ZCZkeYfVWu & nDoHpRpTNwICblepJZTyWwCShpfNUwtgtXBtyKYnipLYdqBwqPFWeqObqfzZBvYMXzbAJYtZqcYMfDChIgNycijrorrPdYXKlZqWCwswLGVHe & ivNudhJSdQixsFU & JenhCfDFKHWLxPkFquWGwlHJqsJlPoJMivXTpPmRTocJdYnA & CzkJhjmxOjlGaPBXlDXSackGtMTOYzeTpGhPnrTlnmxCgkBzTLucAIjuiEFAaKcclsbMBMmiJNzSqJaSkAUjjGaAziHU & aRNrZsWOPRijZLNgzynkMfSQooDZWaxtFJdVGOwsctcIMqhVFkZepILrYXVQOXRvbeGfxRIFti & IUlroVIzKaaVXYhXJTlDbjYkJxXAODxYwRroOTMVyEutyuJsuTZLTEacVYzNYiFiXzUyUtoQugbTyUuCLFxUEItbmHhPmZXYYZuLjDbwLpFEunfwSQeaNLDffvGh & adismVuNcdioapxemdqajXIWElhvRcQXplaSnhHDohvAUlxBojQyGUExIlNgHKWZmlYiQCEjIvpZBiwzQLhEFKdfFXlhAzWndvwKjjLGHDblLFTApznVvsxPUJCTas & gmLItusiDqHWwhuDqtJtuVqwYwkPDKRhdRoKqWOxRjUVPczCNyBPIjFzmJKeUBESozGptvDtfgjUqyjDIJeboeFrjPkdjLAfHeMcOpbsBbmxZLaz & uzlmuJyOCXfkjRDOXjYaQOmjLWLDktAvRTysfQBzHHjkiugFVFenxwGsUYNlYCDnvTzzMjnu & FKpCgtFHyHFweePhNbsrdxttNOgMVTJuWNPdbPFToDSVXvxQEuZOirxlGyOmQTLjXnyghnPYRnVNBpudzboPUVZTaEKsqyefRGXmsuDydqWIoG & vYnuzKWaenjVINnXLcGWVjHZhTemTYdKMVgaCZJEVgUqylUsSelhBKNlsmSmHbnriBpMmycMLwwGsGTrYLHQNrpworwrulWnPRSEqoS & HnCAJuTKFPAWQIdtaoEctaFByDRAOfrQTUofBJawldbsJZIuBOjSDvIgTqxufzWdMKrVmqDJPClNVhRyVKYqrljvkUcAgkLRxiFZWMGAlCeqkVzFog & FxWhBbGKFErxDRazNHSpornPAikkfBQsZqubnUtB & wwViompTBFXdyeCVuMzkcxtOLxDKUVTDsTiwDIsIwaNVSwUYECsiK & UGXuvNWmYGMxYjUAancKprHoWKAEuaDMTwYBtvjEMCzipneHrrl & MZyRZOlLhsaFeZBWhzvVkQXHJmZnHSBroKZTWuCfjAsclOtpXyzKHgHVenomOLtxPfbaqHqiRuJLmCvVcQBBnRcUetRbYrAAcWFUdLpftjSBEWcmwjrYlCVYTDdVQDoOFpfD & BEKGjvkYUfuIscLZCdTqHwNxhnBttVcGSDmIzsYyJqZhljnivOrTvCfAQfzNViTYUAQOVrGlsNsGwmlqZxIdSBpdhZRtYllCuqaKvKkaoSBIlIndtaNBmDuadAAWjBjiDOmwiAEfofiZ & ByEAAZFbIeD & C:\Windows\system32\cmd < Naso.avi2⤵PID:328
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd3⤵
- Loads dropped DLL
PID:684 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^JMwsfVERnDBURqxHDYhNCuTSPfHILUaLUPRAorBOUkHipfETBjTFiEaDSpBZhWuDkQqeoTmmbmSdnMIALOunwMEdvgIYBBAYytWzgBKINziHMeyuAwgmPHCmjKFUlAYWYUlzQfkprnLIEW$" Pensato.avi4⤵PID:1320
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Tra.exe.comTra.exe.com C4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Tra.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Tra.exe.com C5⤵
- Executes dropped EXE
- Checks processor information in registry
PID:1996
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 304⤵
- Runs ping.exe
PID:1572
-
-
-