Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows7_x64 -
resource
win7 -
submitted
28-07-2020 18:35
Static task
static1
Behavioral task
behavioral1
Sample
Payment Slip.exe
Resource
win7
Behavioral task
behavioral2
Sample
Payment Slip.exe
Resource
win10v200722
General
-
Target
Payment Slip.exe
-
Size
278KB
-
MD5
e2ac3d9facc2259a85c66087ff0b6a85
-
SHA1
b592f4eea4d6632f6f543c75d71c4749e8aa8b69
-
SHA256
370f3e9f42d074cd9575a0fa8df285e970dda741ae4200b54fb53f0a3145369e
-
SHA512
226bf723fc4094cf2ac6ca74ff9fdefc0daebe90de2d905b0b9c7acae8c9d3e3956c17f1df80d736bb2bae094d075d307c05534485eae6c51575b2939261ae4c
Malware Config
Signatures
-
Suspicious use of SetThreadContext 203 IoCs
Processes:
Payment Slip.exeRegAsm.exePayment Slip.exePayment Slip.exeRegAsm.exePayment Slip.exeRegAsm.exePayment Slip.exeRegAsm.exePayment Slip.exeRegAsm.exePayment Slip.exeRegAsm.exePayment Slip.exeRegAsm.exePayment Slip.exeRegAsm.exePayment Slip.exeRegAsm.exePayment Slip.exeRegAsm.exePayment Slip.exeRegAsm.exePayment Slip.exeRegAsm.exePayment Slip.exeRegAsm.exePayment Slip.exeRegAsm.exeRegAsm.exePayment Slip.execmd.exePayment Slip.exeRegAsm.exeRegAsm.exePayment Slip.exeRegAsm.exePayment Slip.exePayment Slip.exeRegAsm.exePayment Slip.exeRegAsm.exeRegAsm.exePayment Slip.exeRegAsm.exePayment Slip.exePayment Slip.exeRegAsm.exePayment Slip.exeRegAsm.exeRegAsm.exePayment Slip.exeRegAsm.exePayment Slip.exedescription pid process target process PID 900 set thread context of 1288 900 Payment Slip.exe RegAsm.exe PID 1288 set thread context of 1292 1288 RegAsm.exe Explorer.EXE PID 1516 set thread context of 304 1516 Payment Slip.exe RegAsm.exe PID 1068 set thread context of 1076 1068 Payment Slip.exe RegAsm.exe PID 304 set thread context of 1292 304 RegAsm.exe Explorer.EXE PID 1700 set thread context of 1824 1700 Payment Slip.exe RegAsm.exe PID 1076 set thread context of 1292 1076 RegAsm.exe Explorer.EXE PID 1780 set thread context of 1380 1780 Payment Slip.exe RegAsm.exe PID 1824 set thread context of 1292 1824 RegAsm.exe Explorer.EXE PID 1640 set thread context of 1652 1640 Payment Slip.exe RegAsm.exe PID 1380 set thread context of 1292 1380 RegAsm.exe Explorer.EXE PID 1956 set thread context of 2000 1956 Payment Slip.exe RegAsm.exe PID 1652 set thread context of 1292 1652 RegAsm.exe Explorer.EXE PID 1952 set thread context of 840 1952 Payment Slip.exe RegAsm.exe PID 2000 set thread context of 1292 2000 RegAsm.exe Explorer.EXE PID 1484 set thread context of 1324 1484 Payment Slip.exe RegAsm.exe PID 840 set thread context of 1292 840 RegAsm.exe Explorer.EXE PID 1056 set thread context of 456 1056 Payment Slip.exe RegAsm.exe PID 1324 set thread context of 1292 1324 RegAsm.exe Explorer.EXE PID 1084 set thread context of 1068 1084 Payment Slip.exe RegAsm.exe PID 456 set thread context of 1292 456 RegAsm.exe Explorer.EXE PID 1800 set thread context of 1944 1800 Payment Slip.exe RegAsm.exe PID 1068 set thread context of 1292 1068 RegAsm.exe Explorer.EXE PID 304 set thread context of 1292 304 RegAsm.exe Explorer.EXE PID 1996 set thread context of 1972 1996 Payment Slip.exe RegAsm.exe PID 1944 set thread context of 1292 1944 RegAsm.exe Explorer.EXE PID 1640 set thread context of 616 1640 Payment Slip.exe RegAsm.exe PID 1824 set thread context of 1292 1824 RegAsm.exe Explorer.EXE PID 1972 set thread context of 1292 1972 RegAsm.exe Explorer.EXE PID 108 set thread context of 2028 108 Payment Slip.exe RegAsm.exe PID 616 set thread context of 1292 616 RegAsm.exe Explorer.EXE PID 1380 set thread context of 1292 1380 RegAsm.exe Explorer.EXE PID 1652 set thread context of 1292 1652 RegAsm.exe Explorer.EXE PID 2028 set thread context of 1292 2028 RegAsm.exe Explorer.EXE PID 1432 set thread context of 1796 1432 Payment Slip.exe RegAsm.exe PID 1616 set thread context of 1292 1616 cmd.exe Explorer.EXE PID 2004 set thread context of 1700 2004 Payment Slip.exe RegAsm.exe PID 840 set thread context of 1292 840 RegAsm.exe Explorer.EXE PID 1796 set thread context of 1292 1796 RegAsm.exe Explorer.EXE PID 1700 set thread context of 1292 1700 RegAsm.exe Explorer.EXE PID 2040 set thread context of 1332 2040 Payment Slip.exe RegAsm.exe PID 1332 set thread context of 1292 1332 RegAsm.exe Explorer.EXE PID 1972 set thread context of 1292 1972 RegAsm.exe Explorer.EXE PID 1392 set thread context of 900 1392 Payment Slip.exe RegAsm.exe PID 616 set thread context of 1292 616 RegAsm.exe Explorer.EXE PID 1964 set thread context of 1080 1964 Payment Slip.exe RegAsm.exe PID 900 set thread context of 1292 900 RegAsm.exe Explorer.EXE PID 2028 set thread context of 1292 2028 RegAsm.exe Explorer.EXE PID 1312 set thread context of 1440 1312 Payment Slip.exe RegAsm.exe PID 1080 set thread context of 1292 1080 RegAsm.exe Explorer.EXE PID 1440 set thread context of 1292 1440 RegAsm.exe Explorer.EXE PID 976 set thread context of 884 976 Payment Slip.exe RegAsm.exe PID 1796 set thread context of 1292 1796 RegAsm.exe Explorer.EXE PID 884 set thread context of 1292 884 RegAsm.exe Explorer.EXE PID 1840 set thread context of 1684 1840 Payment Slip.exe RegAsm.exe PID 1868 set thread context of 1500 1868 Payment Slip.exe RegAsm.exe PID 1684 set thread context of 1292 1684 RegAsm.exe Explorer.EXE PID 1892 set thread context of 1392 1892 Payment Slip.exe RegAsm.exe PID 1500 set thread context of 1292 1500 RegAsm.exe Explorer.EXE PID 1332 set thread context of 1292 1332 RegAsm.exe Explorer.EXE PID 1392 set thread context of 1292 1392 RegAsm.exe Explorer.EXE PID 540 set thread context of 1812 540 Payment Slip.exe RegAsm.exe PID 1812 set thread context of 1292 1812 RegAsm.exe Explorer.EXE PID 2004 set thread context of 1836 2004 Payment Slip.exe RegAsm.exe -
Drops startup file 2 IoCs
Processes:
Payment Slip.exePayment Slip.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HJdyTuap.exe Payment Slip.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HJdyTuap.exe Payment Slip.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
cmd.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer cmd.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
Processes:
chkdsk.exechkdsk.exechkdsk.exechkdsk.exechkdsk.exechkdsk.exechkdsk.exechkdsk.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 1397 IoCs
Processes:
Payment Slip.exeExplorer.EXEPayment Slip.exePayment Slip.exePayment Slip.exePayment Slip.exedescription pid process target process PID 900 wrote to memory of 1288 900 Payment Slip.exe RegAsm.exe PID 900 wrote to memory of 1288 900 Payment Slip.exe RegAsm.exe PID 900 wrote to memory of 1288 900 Payment Slip.exe RegAsm.exe PID 900 wrote to memory of 1288 900 Payment Slip.exe RegAsm.exe PID 900 wrote to memory of 1288 900 Payment Slip.exe RegAsm.exe PID 900 wrote to memory of 1288 900 Payment Slip.exe RegAsm.exe PID 900 wrote to memory of 1288 900 Payment Slip.exe RegAsm.exe PID 900 wrote to memory of 1288 900 Payment Slip.exe RegAsm.exe PID 900 wrote to memory of 1516 900 Payment Slip.exe Payment Slip.exe PID 900 wrote to memory of 1516 900 Payment Slip.exe Payment Slip.exe PID 900 wrote to memory of 1516 900 Payment Slip.exe Payment Slip.exe PID 900 wrote to memory of 1516 900 Payment Slip.exe Payment Slip.exe PID 1292 wrote to memory of 1616 1292 Explorer.EXE cmd.exe PID 1292 wrote to memory of 1616 1292 Explorer.EXE cmd.exe PID 1292 wrote to memory of 1616 1292 Explorer.EXE cmd.exe PID 1292 wrote to memory of 1616 1292 Explorer.EXE cmd.exe PID 1516 wrote to memory of 304 1516 Payment Slip.exe RegAsm.exe PID 1516 wrote to memory of 304 1516 Payment Slip.exe RegAsm.exe PID 1516 wrote to memory of 304 1516 Payment Slip.exe RegAsm.exe PID 1516 wrote to memory of 304 1516 Payment Slip.exe RegAsm.exe PID 1516 wrote to memory of 304 1516 Payment Slip.exe RegAsm.exe PID 1516 wrote to memory of 304 1516 Payment Slip.exe RegAsm.exe PID 1516 wrote to memory of 304 1516 Payment Slip.exe RegAsm.exe PID 1516 wrote to memory of 304 1516 Payment Slip.exe RegAsm.exe PID 1516 wrote to memory of 1068 1516 Payment Slip.exe Payment Slip.exe PID 1516 wrote to memory of 1068 1516 Payment Slip.exe Payment Slip.exe PID 1516 wrote to memory of 1068 1516 Payment Slip.exe Payment Slip.exe PID 1516 wrote to memory of 1068 1516 Payment Slip.exe Payment Slip.exe PID 1068 wrote to memory of 1076 1068 Payment Slip.exe RegAsm.exe PID 1068 wrote to memory of 1076 1068 Payment Slip.exe RegAsm.exe PID 1068 wrote to memory of 1076 1068 Payment Slip.exe RegAsm.exe PID 1068 wrote to memory of 1076 1068 Payment Slip.exe RegAsm.exe PID 1068 wrote to memory of 1076 1068 Payment Slip.exe RegAsm.exe PID 1068 wrote to memory of 1076 1068 Payment Slip.exe RegAsm.exe PID 1068 wrote to memory of 1076 1068 Payment Slip.exe RegAsm.exe PID 1068 wrote to memory of 1076 1068 Payment Slip.exe RegAsm.exe PID 1068 wrote to memory of 1700 1068 Payment Slip.exe Payment Slip.exe PID 1068 wrote to memory of 1700 1068 Payment Slip.exe Payment Slip.exe PID 1068 wrote to memory of 1700 1068 Payment Slip.exe Payment Slip.exe PID 1068 wrote to memory of 1700 1068 Payment Slip.exe Payment Slip.exe PID 1700 wrote to memory of 1824 1700 Payment Slip.exe RegAsm.exe PID 1700 wrote to memory of 1824 1700 Payment Slip.exe RegAsm.exe PID 1700 wrote to memory of 1824 1700 Payment Slip.exe RegAsm.exe PID 1700 wrote to memory of 1824 1700 Payment Slip.exe RegAsm.exe PID 1700 wrote to memory of 1824 1700 Payment Slip.exe RegAsm.exe PID 1700 wrote to memory of 1824 1700 Payment Slip.exe RegAsm.exe PID 1700 wrote to memory of 1824 1700 Payment Slip.exe RegAsm.exe PID 1700 wrote to memory of 1824 1700 Payment Slip.exe RegAsm.exe PID 1292 wrote to memory of 1848 1292 Explorer.EXE colorcpl.exe PID 1292 wrote to memory of 1848 1292 Explorer.EXE colorcpl.exe PID 1292 wrote to memory of 1848 1292 Explorer.EXE colorcpl.exe PID 1292 wrote to memory of 1848 1292 Explorer.EXE colorcpl.exe PID 1700 wrote to memory of 1780 1700 Payment Slip.exe Payment Slip.exe PID 1700 wrote to memory of 1780 1700 Payment Slip.exe Payment Slip.exe PID 1700 wrote to memory of 1780 1700 Payment Slip.exe Payment Slip.exe PID 1700 wrote to memory of 1780 1700 Payment Slip.exe Payment Slip.exe PID 1780 wrote to memory of 1380 1780 Payment Slip.exe RegAsm.exe PID 1780 wrote to memory of 1380 1780 Payment Slip.exe RegAsm.exe PID 1780 wrote to memory of 1380 1780 Payment Slip.exe RegAsm.exe PID 1780 wrote to memory of 1380 1780 Payment Slip.exe RegAsm.exe PID 1780 wrote to memory of 1380 1780 Payment Slip.exe RegAsm.exe PID 1780 wrote to memory of 1380 1780 Payment Slip.exe RegAsm.exe PID 1780 wrote to memory of 1380 1780 Payment Slip.exe RegAsm.exe PID 1780 wrote to memory of 1380 1780 Payment Slip.exe RegAsm.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
cmd.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\LTXHXDZ00XI = "C:\\Program Files (x86)\\Tqlr\\configohzdlll.exe" cmd.exe -
Processes:
cmd.exedescription ioc process Key created \Registry\User\S-1-5-21-1131729243-447456001-3632642222-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cmd.exe -
Suspicious behavior: MapViewOfSection 383 IoCs
Processes:
Payment Slip.exeRegAsm.exePayment Slip.exePayment Slip.exeRegAsm.exeRegAsm.exePayment Slip.exeRegAsm.exePayment Slip.exePayment Slip.exeRegAsm.exeRegAsm.exePayment Slip.exePayment Slip.exeRegAsm.exeRegAsm.exePayment Slip.execmd.exeRegAsm.exePayment Slip.exePayment Slip.exeRegAsm.exePayment Slip.exeRegAsm.exePayment Slip.exeRegAsm.exePayment Slip.exeRegAsm.exePayment Slip.exeRegAsm.exeRegAsm.exePayment Slip.exePayment Slip.exeRegAsm.exeRegAsm.exepid process 900 Payment Slip.exe 1288 RegAsm.exe 1516 Payment Slip.exe 1068 Payment Slip.exe 304 RegAsm.exe 1076 RegAsm.exe 1700 Payment Slip.exe 1824 RegAsm.exe 1780 Payment Slip.exe 1640 Payment Slip.exe 1288 RegAsm.exe 1288 RegAsm.exe 1380 RegAsm.exe 1652 RegAsm.exe 1956 Payment Slip.exe 1956 Payment Slip.exe 1952 Payment Slip.exe 2000 RegAsm.exe 1076 RegAsm.exe 1076 RegAsm.exe 840 RegAsm.exe 1484 Payment Slip.exe 1484 Payment Slip.exe 1616 cmd.exe 1324 RegAsm.exe 1056 Payment Slip.exe 1084 Payment Slip.exe 456 RegAsm.exe 1800 Payment Slip.exe 1068 RegAsm.exe 2000 RegAsm.exe 2000 RegAsm.exe 304 RegAsm.exe 1996 Payment Slip.exe 1944 RegAsm.exe 1640 Payment Slip.exe 1824 RegAsm.exe 1972 RegAsm.exe 108 Payment Slip.exe 616 RegAsm.exe 1380 RegAsm.exe 1324 RegAsm.exe 1324 RegAsm.exe 1652 RegAsm.exe 2028 RegAsm.exe 456 RegAsm.exe 456 RegAsm.exe 1432 Payment Slip.exe 1068 RegAsm.exe 1068 RegAsm.exe 304 RegAsm.exe 304 RegAsm.exe 1616 cmd.exe 1944 RegAsm.exe 1944 RegAsm.exe 2004 Payment Slip.exe 1796 RegAsm.exe 840 RegAsm.exe 1824 RegAsm.exe 1824 RegAsm.exe 1380 RegAsm.exe 1380 RegAsm.exe 1700 RegAsm.exe 1652 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 244 IoCs
Processes:
Payment Slip.exeRegAsm.exePayment Slip.exePayment Slip.exeRegAsm.exeRegAsm.exePayment Slip.exeRegAsm.exePayment Slip.exePayment Slip.exeRegAsm.exeRegAsm.exePayment Slip.execmd.exePayment Slip.exeRegAsm.exeRegAsm.exePayment Slip.exeRegAsm.execolorcpl.exePayment Slip.exeRegAsm.exePayment Slip.exePayment Slip.exeRegAsm.exeRegAsm.exePayment Slip.exewlanext.exePayment Slip.exeRegAsm.exeRegAsm.exePayment Slip.exeRegAsm.execmmon32.exePayment Slip.exewininit.exeRegAsm.exePayment Slip.exenetsh.exechkdsk.exeRegAsm.exewininit.execmd.exePayment Slip.execmd.exeRegAsm.exemsiexec.exePayment Slip.exesvchost.exePayment Slip.exeRegAsm.exeRegAsm.exePayment Slip.exeRegAsm.exesvchost.exePayment Slip.exeRegAsm.exechkdsk.exePayment Slip.execontrol.exePayment Slip.exeRegAsm.exeRegAsm.exePayment Slip.exedescription pid process Token: SeDebugPrivilege 900 Payment Slip.exe Token: SeDebugPrivilege 1288 RegAsm.exe Token: SeDebugPrivilege 1516 Payment Slip.exe Token: SeDebugPrivilege 1068 Payment Slip.exe Token: SeDebugPrivilege 304 RegAsm.exe Token: SeDebugPrivilege 1076 RegAsm.exe Token: SeDebugPrivilege 1700 Payment Slip.exe Token: SeDebugPrivilege 1824 RegAsm.exe Token: SeDebugPrivilege 1780 Payment Slip.exe Token: SeDebugPrivilege 1640 Payment Slip.exe Token: SeDebugPrivilege 1380 RegAsm.exe Token: SeDebugPrivilege 1652 RegAsm.exe Token: SeDebugPrivilege 1956 Payment Slip.exe Token: SeDebugPrivilege 1616 cmd.exe Token: SeDebugPrivilege 1952 Payment Slip.exe Token: SeDebugPrivilege 2000 RegAsm.exe Token: SeDebugPrivilege 840 RegAsm.exe Token: SeDebugPrivilege 1484 Payment Slip.exe Token: SeDebugPrivilege 1324 RegAsm.exe Token: SeDebugPrivilege 1848 colorcpl.exe Token: SeDebugPrivilege 1056 Payment Slip.exe Token: SeDebugPrivilege 456 RegAsm.exe Token: SeDebugPrivilege 1084 Payment Slip.exe Token: SeDebugPrivilege 1800 Payment Slip.exe Token: SeDebugPrivilege 1068 RegAsm.exe Token: SeDebugPrivilege 1944 RegAsm.exe Token: SeDebugPrivilege 1996 Payment Slip.exe Token: SeDebugPrivilege 2036 wlanext.exe Token: SeDebugPrivilege 1640 Payment Slip.exe Token: SeDebugPrivilege 1972 RegAsm.exe Token: SeDebugPrivilege 616 RegAsm.exe Token: SeDebugPrivilege 108 Payment Slip.exe Token: SeDebugPrivilege 2028 RegAsm.exe Token: SeDebugPrivilege 1856 cmmon32.exe Token: SeDebugPrivilege 1432 Payment Slip.exe Token: SeDebugPrivilege 1820 wininit.exe Token: SeDebugPrivilege 1796 RegAsm.exe Token: SeDebugPrivilege 2004 Payment Slip.exe Token: SeDebugPrivilege 1884 netsh.exe Token: SeDebugPrivilege 1108 chkdsk.exe Token: SeDebugPrivilege 1700 RegAsm.exe Token: SeDebugPrivilege 2044 wininit.exe Token: SeDebugPrivilege 1524 cmd.exe Token: SeDebugPrivilege 2040 Payment Slip.exe Token: SeDebugPrivilege 1936 cmd.exe Token: SeDebugPrivilege 1332 RegAsm.exe Token: SeDebugPrivilege 1908 msiexec.exe Token: SeDebugPrivilege 1392 Payment Slip.exe Token: SeDebugPrivilege 1028 svchost.exe Token: SeDebugPrivilege 1964 Payment Slip.exe Token: SeDebugPrivilege 900 RegAsm.exe Token: SeDebugPrivilege 1080 RegAsm.exe Token: SeDebugPrivilege 1312 Payment Slip.exe Token: SeDebugPrivilege 1440 RegAsm.exe Token: SeDebugPrivilege 1976 svchost.exe Token: SeDebugPrivilege 976 Payment Slip.exe Token: SeDebugPrivilege 884 RegAsm.exe Token: SeDebugPrivilege 524 chkdsk.exe Token: SeDebugPrivilege 1840 Payment Slip.exe Token: SeDebugPrivilege 664 control.exe Token: SeDebugPrivilege 1868 Payment Slip.exe Token: SeDebugPrivilege 1684 RegAsm.exe Token: SeDebugPrivilege 1500 RegAsm.exe Token: SeDebugPrivilege 1892 Payment Slip.exe -
Gathers network information 2 TTPs 4 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exeNETSTAT.EXENETSTAT.EXEipconfig.exepid process 1760 ipconfig.exe 976 NETSTAT.EXE 1584 NETSTAT.EXE 1052 ipconfig.exe -
Processes:
Explorer.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 16434 IoCs
Processes:
Payment Slip.exepid process 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe 900 Payment Slip.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
Explorer.EXEpid process 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE -
Suspicious use of SendNotifyMessage 5 IoCs
Processes:
Explorer.EXEpid process 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE 1292 Explorer.EXE -
Drops file in Program Files directory 1 IoCs
Processes:
cmd.exedescription ioc process File opened for modification C:\Program Files (x86)\Tqlr\configohzdlll.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
- Checks whether UAC is enabled
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"2⤵
- Suspicious use of SetThreadContext
- Drops startup file
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:900 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"3⤵
- Suspicious use of SetThreadContext
- Drops startup file
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1516 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:304 -
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1068 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"5⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1700 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"6⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1780 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"7⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1640 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"8⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"8⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1956 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"9⤵PID:1904
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"9⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"9⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1952 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"10⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:840 -
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"10⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1484 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"11⤵PID:836
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"11⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"11⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1056 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"12⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:456 -
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"12⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1084 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"13⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"13⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1800 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"14⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"14⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1996 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"15⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"15⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1640 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"16⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:616 -
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"16⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:108 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"17⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"17⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1432 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"18⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"18⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2004 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"19⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"19⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2040 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"20⤵PID:1520
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"20⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1332 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"21⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"20⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1392 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"21⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:900 -
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"21⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1964 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"22⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"22⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1312 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"23⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"23⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:976 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"24⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:884 -
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"25⤵PID:908
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"24⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1840 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"25⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1684 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"26⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"25⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1868 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"26⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"26⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1892 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"27⤵
- Suspicious use of SetThreadContext
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"27⤵
- Suspicious use of SetThreadContext
PID:540 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"28⤵
- Suspicious use of SetThreadContext
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"28⤵
- Suspicious use of SetThreadContext
PID:2004 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"29⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"29⤵PID:316
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"30⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"30⤵PID:1608
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"31⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"31⤵PID:1784
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"32⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"32⤵PID:1892
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"33⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"33⤵PID:1040
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"34⤵PID:1648
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"35⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"34⤵PID:316
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"35⤵PID:1988
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"36⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"35⤵PID:1516
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"36⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"36⤵PID:744
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"37⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"37⤵PID:652
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"38⤵PID:564
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"38⤵PID:1304
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"39⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"39⤵PID:1084
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"40⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"40⤵PID:1964
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"41⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"41⤵PID:1628
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"42⤵PID:484
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"42⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"42⤵PID:1300
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"43⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"43⤵PID:1048
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"44⤵PID:744
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"44⤵PID:1964
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"45⤵PID:576
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"45⤵PID:556
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"46⤵PID:108
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"46⤵PID:316
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"47⤵PID:1528
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"48⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"47⤵PID:1696
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"48⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"48⤵PID:1568
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"49⤵PID:1432
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"49⤵PID:1232
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"50⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"50⤵PID:2092
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"51⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"51⤵PID:2196
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"52⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"52⤵PID:2304
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"53⤵PID:2352
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"53⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"53⤵PID:2420
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"54⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"54⤵PID:2568
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"55⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"55⤵PID:2648
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"56⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"56⤵PID:2780
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"57⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"57⤵PID:2900
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"58⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"58⤵PID:2964
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"59⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"59⤵PID:3056
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"60⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"60⤵PID:1660
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"61⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"61⤵PID:2088
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"62⤵PID:572
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"62⤵PID:2392
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"63⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"63⤵PID:2404
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"64⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"64⤵PID:1040
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"65⤵PID:2620
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"65⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"65⤵PID:2640
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"66⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"66⤵PID:2720
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"67⤵PID:2652
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"68⤵PID:2064
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"68⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"67⤵PID:2780
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"68⤵PID:652
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"68⤵PID:2960
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"69⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"69⤵PID:3052
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"70⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"70⤵PID:2380
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"71⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"71⤵PID:1960
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"72⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"72⤵PID:2292
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"73⤵PID:2096
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"73⤵PID:2124
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"73⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"73⤵PID:2696
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"74⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"74⤵PID:2768
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"75⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"75⤵PID:2572
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"76⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"76⤵PID:2612
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"77⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"77⤵PID:2640
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"78⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"78⤵PID:2068
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"79⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"79⤵PID:436
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"80⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"80⤵PID:1888
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"81⤵PID:2936
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"82⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"81⤵PID:2532
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"82⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"82⤵PID:2624
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"83⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"83⤵PID:1696
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"84⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"84⤵PID:2592
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"85⤵PID:2276
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- System policy modification
- Adds policy Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Drops file in Program Files directory
PID:1616 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:1980
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:2084
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1848 -
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2036 -
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1856 -
C:\Windows\SysWOW64\wininit.exe"C:\Windows\SysWOW64\wininit.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1820 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1884 -
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1108 -
C:\Windows\SysWOW64\wininit.exe"C:\Windows\SysWOW64\wininit.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2044 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1936 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1524 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1908 -
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:744
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1028 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1976 -
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:524 -
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:664 -
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Enumerates system info in registry
PID:1104 -
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:624
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Gathers network information
PID:1584 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Gathers network information
PID:1052 -
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵PID:1588
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵PID:1656
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Gathers network information
PID:1760 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵PID:472
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵PID:1176
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵PID:1808
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Enumerates system info in registry
PID:1544 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵PID:1804
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵PID:540
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Gathers network information
PID:976 -
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:108
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵PID:1620
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵PID:1956
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵PID:1708
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵PID:1516
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Enumerates system info in registry
PID:2004 -
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:908
-
C:\Windows\SysWOW64\NAPSTAT.EXE"C:\Windows\SysWOW64\NAPSTAT.EXE"2⤵PID:1564
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵PID:640
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:556
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1320
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵PID:1756
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Enumerates system info in registry
PID:316 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵PID:2072
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵PID:2228
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵PID:2236
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵PID:2296
-
C:\Windows\SysWOW64\NAPSTAT.EXE"C:\Windows\SysWOW64\NAPSTAT.EXE"2⤵PID:2396
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵PID:2516
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵PID:2536
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵PID:2684
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2696
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2704
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2712
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2720
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵PID:2740
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵PID:2860
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵PID:3028
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵PID:3036
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵PID:2144
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵PID:2168
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵PID:2312
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Enumerates system info in registry
PID:2372 -
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵PID:2480
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2424
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2440
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2420
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2728
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2788
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2848
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2852
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2584
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2592
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2644
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2568
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2692
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2772
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2896
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2664
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2680
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2800
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵PID:2972
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵PID:3016
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵PID:2996
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵PID:3008
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵PID:2712
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵PID:2672
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵PID:2136
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Enumerates system info in registry
PID:2124 -
C:\Windows\SysWOW64\wuapp.exe"C:\Windows\SysWOW64\wuapp.exe"2⤵PID:2440
-
C:\Windows\SysWOW64\wuapp.exe"C:\Windows\SysWOW64\wuapp.exe"2⤵PID:2568
-
C:\Windows\SysWOW64\wuapp.exe"C:\Windows\SysWOW64\wuapp.exe"2⤵PID:1664
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵PID:2224
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵PID:2656
-
C:\Windows\SysWOW64\wininit.exe"C:\Windows\SysWOW64\wininit.exe"2⤵PID:2316
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵PID:2524
-
C:\Windows\SysWOW64\wininit.exe"C:\Windows\SysWOW64\wininit.exe"2⤵PID:2344
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵PID:2984