Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 06:36
Static task
static1
Behavioral task
behavioral1
Sample
5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe
Resource
win10v2004-20241007-en
General
-
Target
5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe
-
Size
218KB
-
MD5
415a0770a8f5e60a5fb408ebf360f6db
-
SHA1
679b46c5d0bc11608aa21636b3c11ac75ee0e6c5
-
SHA256
5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd
-
SHA512
0c059bbc1f4b684b15629cc6e5c2a2eac8ba89db5ae54286e0286b0f35a779af9a5a026ba26a821fcaccd6ec33586637cac32ba41bb79a3c4d08759663df31b5
-
SSDEEP
6144:mnIR+VhX35mOtbF9CZCLRdJiiOOAOy/D:mIRWN5btbBLRziidAO
Malware Config
Extracted
azorult
http://45.95.168.162/city/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 1728 set thread context of 3056 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 31 PID 2296 set thread context of 2908 2296 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 36 PID 2732 set thread context of 2972 2732 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 41 PID 2664 set thread context of 2396 2664 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 46 PID 2004 set thread context of 1744 2004 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 51 PID 1236 set thread context of 1128 1236 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 56 PID 2460 set thread context of 1928 2460 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 62 PID 2268 set thread context of 2272 2268 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 67 PID 2360 set thread context of 2304 2360 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 72 PID 1760 set thread context of 1156 1760 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 77 PID 2372 set thread context of 2132 2372 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 82 PID 2452 set thread context of 2228 2452 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 87 PID 2616 set thread context of 2112 2616 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 93 PID 2636 set thread context of 1840 2636 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 98 PID 2680 set thread context of 1152 2680 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 105 PID 2188 set thread context of 2028 2188 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 110 PID 408 set thread context of 872 408 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 115 PID 972 set thread context of 1876 972 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 120 PID 3016 set thread context of 1364 3016 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 125 PID 2164 set thread context of 1532 2164 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 131 PID 548 set thread context of 1808 548 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 136 PID 2440 set thread context of 2952 2440 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 141 PID 2864 set thread context of 316 2864 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 146 PID 2272 set thread context of 2052 2272 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 153 PID 2188 set thread context of 2808 2188 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 158 PID 1920 set thread context of 1056 1920 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 163 PID 1932 set thread context of 2832 1932 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 208 PID 804 set thread context of 1552 804 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 174 PID 2040 set thread context of 2164 2040 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 179 PID 532 set thread context of 2956 532 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 184 PID 1632 set thread context of 2624 1632 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 189 PID 2036 set thread context of 1672 2036 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 195 PID 2672 set thread context of 2688 2672 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 200 PID 1752 set thread context of 2752 1752 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 274 PID 1812 set thread context of 2768 1812 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 210 PID 1736 set thread context of 944 1736 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 251 PID 3016 set thread context of 1992 3016 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 259 PID 2236 set thread context of 1948 2236 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 375 PID 1840 set thread context of 1640 1840 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 230 PID 492 set thread context of 1792 492 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 348 PID 2392 set thread context of 564 2392 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 240 PID 864 set thread context of 2372 864 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 245 PID 1968 set thread context of 1728 1968 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 435 PID 1812 set thread context of 900 1812 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 255 PID 1992 set thread context of 3060 1992 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 260 PID 2952 set thread context of 1712 2952 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 413 PID 988 set thread context of 2380 988 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 473 PID 2752 set thread context of 1856 2752 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 275 PID 2160 set thread context of 2660 2160 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 280 PID 2620 set thread context of 1304 2620 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 285 PID 2616 set thread context of 2516 2616 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 480 PID 976 set thread context of 892 976 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 463 PID 1084 set thread context of 1636 1084 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 374 PID 1812 set thread context of 1236 1812 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 345 PID 1564 set thread context of 1056 1564 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 310 PID 1436 set thread context of 336 1436 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 395 PID 2136 set thread context of 1536 2136 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 505 PID 2892 set thread context of 1932 2892 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 327 PID 1668 set thread context of 1956 1668 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 519 PID 784 set thread context of 2472 784 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 570 PID 1096 set thread context of 2888 1096 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 380 PID 1788 set thread context of 1084 1788 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 347 PID 2132 set thread context of 2288 2132 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 389 PID 2924 set thread context of 336 2924 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 395 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 2296 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 2732 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 2664 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 2004 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1236 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 2460 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 2460 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 2268 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 2360 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1760 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 2372 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 2452 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 2616 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 2616 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 2636 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 2680 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 2680 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 2188 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 408 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 972 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 3016 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 2164 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 2164 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 548 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 2440 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 2864 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 2272 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 2272 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 2272 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 2188 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1920 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1932 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1932 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 804 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 2040 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 532 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1632 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 2036 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 2036 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 2672 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1752 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1812 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1736 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 3016 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 2236 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1840 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 492 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 2392 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 864 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1968 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1812 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1992 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 2952 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 988 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 2752 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 2160 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 2620 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 2616 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 976 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1084 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1812 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1564 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 1436 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 2296 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 2732 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 2664 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 2004 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 1236 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 2460 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 2268 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 2360 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 1760 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 2372 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 2452 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 2616 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 2636 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 2680 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 2188 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 408 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 972 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 3016 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 2164 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 548 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 2440 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 2864 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 2272 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 2188 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 1920 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 1932 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 804 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 2040 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 532 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 1632 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 2036 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 2672 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 1752 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 1812 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 1736 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 3016 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 2236 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 1840 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 492 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 2392 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 864 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 1968 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 1812 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 1992 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 2952 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 988 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 2752 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 2160 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 2620 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 2616 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 976 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 1084 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 1812 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 1564 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 1436 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 2136 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 2892 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 1668 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 784 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 1096 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 1788 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 2132 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe Token: SeDebugPrivilege 2924 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1728 wrote to memory of 3056 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 31 PID 1728 wrote to memory of 3056 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 31 PID 1728 wrote to memory of 3056 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 31 PID 1728 wrote to memory of 3056 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 31 PID 1728 wrote to memory of 3056 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 31 PID 1728 wrote to memory of 3056 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 31 PID 1728 wrote to memory of 3056 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 31 PID 1728 wrote to memory of 3056 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 31 PID 1728 wrote to memory of 2248 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 32 PID 1728 wrote to memory of 2248 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 32 PID 1728 wrote to memory of 2248 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 32 PID 1728 wrote to memory of 2248 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 32 PID 2248 wrote to memory of 2176 2248 cmd.exe 34 PID 2248 wrote to memory of 2176 2248 cmd.exe 34 PID 2248 wrote to memory of 2176 2248 cmd.exe 34 PID 2248 wrote to memory of 2176 2248 cmd.exe 34 PID 1728 wrote to memory of 2296 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 35 PID 1728 wrote to memory of 2296 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 35 PID 1728 wrote to memory of 2296 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 35 PID 1728 wrote to memory of 2296 1728 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 35 PID 2296 wrote to memory of 2908 2296 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 36 PID 2296 wrote to memory of 2908 2296 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 36 PID 2296 wrote to memory of 2908 2296 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 36 PID 2296 wrote to memory of 2908 2296 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 36 PID 2296 wrote to memory of 2908 2296 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 36 PID 2296 wrote to memory of 2908 2296 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 36 PID 2296 wrote to memory of 2908 2296 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 36 PID 2296 wrote to memory of 2908 2296 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 36 PID 2296 wrote to memory of 2992 2296 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 37 PID 2296 wrote to memory of 2992 2296 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 37 PID 2296 wrote to memory of 2992 2296 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 37 PID 2296 wrote to memory of 2992 2296 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 37 PID 2992 wrote to memory of 2920 2992 cmd.exe 39 PID 2992 wrote to memory of 2920 2992 cmd.exe 39 PID 2992 wrote to memory of 2920 2992 cmd.exe 39 PID 2992 wrote to memory of 2920 2992 cmd.exe 39 PID 2296 wrote to memory of 2732 2296 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 40 PID 2296 wrote to memory of 2732 2296 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 40 PID 2296 wrote to memory of 2732 2296 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 40 PID 2296 wrote to memory of 2732 2296 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 40 PID 2732 wrote to memory of 2972 2732 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 41 PID 2732 wrote to memory of 2972 2732 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 41 PID 2732 wrote to memory of 2972 2732 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 41 PID 2732 wrote to memory of 2972 2732 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 41 PID 2732 wrote to memory of 2972 2732 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 41 PID 2732 wrote to memory of 2972 2732 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 41 PID 2732 wrote to memory of 2972 2732 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 41 PID 2732 wrote to memory of 2972 2732 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 41 PID 2732 wrote to memory of 2672 2732 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 42 PID 2732 wrote to memory of 2672 2732 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 42 PID 2732 wrote to memory of 2672 2732 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 42 PID 2732 wrote to memory of 2672 2732 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 42 PID 2672 wrote to memory of 2628 2672 cmd.exe 44 PID 2672 wrote to memory of 2628 2672 cmd.exe 44 PID 2672 wrote to memory of 2628 2672 cmd.exe 44 PID 2672 wrote to memory of 2628 2672 cmd.exe 44 PID 2732 wrote to memory of 2664 2732 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 45 PID 2732 wrote to memory of 2664 2732 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 45 PID 2732 wrote to memory of 2664 2732 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 45 PID 2732 wrote to memory of 2664 2732 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 45 PID 2664 wrote to memory of 2396 2664 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 46 PID 2664 wrote to memory of 2396 2664 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 46 PID 2664 wrote to memory of 2396 2664 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 46 PID 2664 wrote to memory of 2396 2664 5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:3056
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 33⤵PID:2176
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:2908
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 34⤵PID:2920
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:2972
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 35⤵PID:2628
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵PID:2396
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"5⤵PID:320
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 36⤵PID:1668
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"5⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2004 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵PID:1744
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"6⤵PID:1812
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 37⤵PID:2024
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"6⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1236 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵PID:1128
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"7⤵PID:1416
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 38⤵PID:1640
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"7⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2460 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"8⤵PID:1132
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"8⤵PID:1928
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"8⤵PID:2504
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 39⤵PID:1316
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"8⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2268 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"9⤵PID:2272
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"9⤵PID:2508
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 310⤵PID:936
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"9⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2360 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"10⤵PID:2304
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"10⤵PID:2544
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 311⤵PID:2080
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"10⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1760 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"11⤵PID:1156
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"11⤵PID:1216
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 312⤵PID:1496
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"11⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2372 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"12⤵PID:2132
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"12⤵PID:3036
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 313⤵PID:1484
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"12⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2452 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"13⤵PID:2228
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"13⤵PID:2988
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 314⤵PID:2964
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2616 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"14⤵PID:1688
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"14⤵PID:2112
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"14⤵PID:2716
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 315⤵PID:2772
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"14⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2636 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"15⤵PID:1840
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"15⤵PID:2660
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 316⤵PID:1692
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"15⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2680 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"16⤵PID:1320
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"16⤵PID:1152
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"16⤵PID:1724
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 317⤵PID:852
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"16⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2188 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"17⤵
- System Location Discovery: System Language Discovery
PID:2028
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"17⤵PID:1132
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 318⤵PID:324
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"17⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:408 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"18⤵PID:872
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"18⤵PID:2488
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 319⤵PID:2696
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"18⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:972 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"19⤵PID:1876
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"19⤵PID:2128
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 320⤵PID:1792
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"19⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3016 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"20⤵PID:1364
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"20⤵PID:2944
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 321⤵PID:2292
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"20⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2164 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"21⤵PID:1760
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"21⤵PID:1532
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"21⤵PID:880
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 322⤵PID:2296
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"21⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:548 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"22⤵PID:1808
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"22⤵PID:2924
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 323⤵PID:1796
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"22⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2440 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"23⤵PID:2952
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"23⤵PID:892
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 324⤵PID:2664
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"23⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2864 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"24⤵PID:316
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"24⤵PID:1780
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 325⤵PID:2756
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"24⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2272 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"25⤵PID:476
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"25⤵PID:692
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"25⤵PID:2052
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"25⤵PID:1032
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 326⤵PID:1052
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"25⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2188 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"26⤵PID:2808
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"26⤵
- System Location Discovery: System Language Discovery
PID:2360 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 327⤵PID:2912
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"26⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1920 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"27⤵PID:1056
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"27⤵PID:2876
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 328⤵PID:540
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"27⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1932 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"28⤵PID:676
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"28⤵PID:2832
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"28⤵
- System Location Discovery: System Language Discovery
PID:752 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 329⤵PID:1476
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"28⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:804 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"29⤵PID:1552
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"29⤵PID:2908
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 330⤵PID:2640
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"29⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2040 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"30⤵PID:2164
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"30⤵PID:2256
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 331⤵PID:2144
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"30⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:532 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"31⤵PID:2956
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"31⤵PID:832
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 332⤵PID:2004
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"31⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1632 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"32⤵PID:2624
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"32⤵PID:784
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 333⤵
- System Location Discovery: System Language Discovery
PID:2904
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"32⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2036 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"33⤵PID:2864
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"33⤵PID:1672
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"33⤵PID:1236
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 334⤵PID:2288
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"33⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2672 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"34⤵PID:2688
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"34⤵PID:1316
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 335⤵PID:1600
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"34⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1752 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"35⤵PID:2752
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"35⤵PID:1660
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 336⤵PID:2832
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"35⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1812 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"36⤵PID:2768
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"36⤵PID:1164
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 337⤵PID:1380
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"36⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1736 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"37⤵PID:944
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"37⤵PID:1744
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 338⤵PID:3048
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"37⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3016 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"38⤵PID:1992
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"38⤵PID:1668
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 339⤵PID:1684
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"38⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2236 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"39⤵PID:1948
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"39⤵
- System Location Discovery: System Language Discovery
PID:1484 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 340⤵PID:2748
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"39⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1840 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"40⤵PID:1640
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"40⤵PID:1952
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 341⤵PID:320
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"40⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:492 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"41⤵PID:1792
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"41⤵PID:2880
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 342⤵PID:2428
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"41⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2392 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"42⤵PID:564
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"42⤵PID:1048
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 343⤵PID:3000
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"42⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:864 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"43⤵PID:2372
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"43⤵PID:1796
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 344⤵PID:2772
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"43⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1968 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"44⤵PID:1728
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"44⤵PID:944
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 345⤵PID:1428
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"44⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1812 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"45⤵PID:900
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"45⤵
- System Location Discovery: System Language Discovery
PID:1628 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 346⤵PID:1780
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"45⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1992 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"46⤵PID:3060
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"46⤵
- System Location Discovery: System Language Discovery
PID:1080 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 347⤵PID:1972
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"46⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2952 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"47⤵PID:1712
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"47⤵PID:1388
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 348⤵PID:2020
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"47⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:988 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"48⤵PID:2380
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"48⤵PID:1544
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 349⤵PID:936
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"48⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2752 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"49⤵PID:1856
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"49⤵PID:2928
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 350⤵PID:2948
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"49⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2160 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"50⤵PID:2660
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"50⤵PID:2576
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 351⤵PID:1688
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"50⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2620 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"51⤵PID:1304
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"51⤵PID:2808
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 352⤵PID:1612
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"51⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2616 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"52⤵PID:2516
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"52⤵PID:880
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 353⤵PID:1736
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"52⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:976 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"53⤵PID:892
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"53⤵PID:2144
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 354⤵PID:2004
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"53⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1084 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"54⤵PID:1636
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"54⤵PID:620
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 355⤵PID:1996
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"54⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1812 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"55⤵PID:1236
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"55⤵PID:2240
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 356⤵PID:828
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"55⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1564 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"56⤵PID:1056
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"56⤵PID:2644
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 357⤵
- System Location Discovery: System Language Discovery
PID:2932
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"56⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1436 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"57⤵PID:2824
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"57⤵PID:2300
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"57⤵
- System Location Discovery: System Language Discovery
PID:336
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"57⤵PID:2072
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 358⤵PID:2728
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"57⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2136 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"58⤵PID:1536
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"58⤵PID:540
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 359⤵PID:2788
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"58⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2892 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"59⤵PID:1932
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"59⤵PID:3044
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 360⤵PID:2152
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"59⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1668 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"60⤵PID:1956
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"60⤵PID:552
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 361⤵PID:1656
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"60⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:784 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"61⤵PID:2472
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"61⤵PID:2616
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 362⤵PID:2056
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"61⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1096 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"62⤵PID:2888
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"62⤵PID:532
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 363⤵PID:1236
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"62⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1788 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"63⤵PID:1084
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"63⤵PID:1792
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 364⤵PID:2944
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"63⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2132 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"64⤵PID:2288
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"64⤵PID:2736
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 365⤵PID:1784
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"64⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2924 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"65⤵PID:336
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"65⤵PID:1564
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 366⤵PID:2984
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"65⤵PID:2436
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"66⤵PID:1496
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"66⤵PID:604
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 367⤵PID:1012
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"66⤵PID:2992
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"67⤵PID:2716
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"67⤵
- System Location Discovery: System Language Discovery
PID:1780 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 368⤵PID:2356
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"67⤵PID:1080
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"68⤵PID:2548
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"68⤵PID:1952
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 369⤵PID:1948
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"68⤵PID:740
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"69⤵PID:2284
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"69⤵PID:2128
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 370⤵
- System Location Discovery: System Language Discovery
PID:2888
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"69⤵PID:1704
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"70⤵PID:676
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"70⤵PID:1936
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 371⤵PID:2440
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"70⤵PID:2772
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"71⤵PID:2612
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"71⤵PID:1740
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 372⤵PID:1360
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"71⤵PID:1596
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"72⤵PID:996
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"72⤵PID:2744
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 373⤵PID:336
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"72⤵PID:1048
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"73⤵PID:944
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"73⤵PID:2028
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 374⤵PID:2300
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"73⤵PID:884
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"74⤵PID:2640
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"74⤵PID:972
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 375⤵PID:2160
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"74⤵PID:1436
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"75⤵PID:864
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"75⤵PID:1152
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 376⤵PID:1968
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"75⤵PID:2636
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"76⤵PID:112
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"76⤵PID:1712
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 377⤵PID:1032
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"76⤵PID:3036
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"77⤵PID:2396
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"77⤵PID:1816
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 378⤵PID:2964
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"77⤵
- System Location Discovery: System Language Discovery
PID:2400 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"78⤵PID:2720
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"78⤵PID:2360
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 379⤵
- System Location Discovery: System Language Discovery
PID:2948
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"78⤵PID:1536
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"79⤵PID:2644
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"79⤵PID:920
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 380⤵PID:2072
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"79⤵PID:1940
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"80⤵PID:2784
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"80⤵PID:2672
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 381⤵PID:1728
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"80⤵PID:1832
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"81⤵PID:2372
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"81⤵PID:2972
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 382⤵PID:1744
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"81⤵
- System Location Discovery: System Language Discovery
PID:880 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"82⤵PID:1672
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"82⤵PID:1808
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 383⤵PID:1496
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"82⤵PID:3048
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"83⤵PID:2248
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"83⤵
- System Location Discovery: System Language Discovery
PID:2936 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 384⤵PID:1008
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"83⤵PID:2892
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"84⤵PID:408
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"84⤵PID:1824
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 385⤵PID:2500
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"84⤵PID:2472
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"85⤵PID:3032
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"85⤵PID:2696
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 386⤵PID:2780
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"85⤵
- System Location Discovery: System Language Discovery
PID:2776 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"86⤵PID:1784
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"86⤵PID:892
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 387⤵PID:3068
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"86⤵PID:2040
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"87⤵PID:3016
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"87⤵PID:1760
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 388⤵PID:3064
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"87⤵PID:580
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"88⤵
- System Location Discovery: System Language Discovery
PID:1216
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"88⤵PID:2380
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 389⤵PID:1484
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"88⤵PID:2748
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"89⤵PID:492
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"89⤵PID:2244
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 390⤵PID:2516
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"89⤵PID:2388
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"90⤵PID:1632
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"90⤵PID:1132
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 391⤵PID:1580
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"90⤵PID:2248
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"91⤵PID:2392
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"91⤵PID:2128
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 392⤵PID:1532
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"91⤵PID:1388
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"92⤵PID:2256
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"92⤵PID:1936
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 393⤵PID:676
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"92⤵PID:2720
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"93⤵PID:3032
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"93⤵PID:1080
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"93⤵PID:2680
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 394⤵PID:2904
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"93⤵PID:1504
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"94⤵PID:2824
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"94⤵
- System Location Discovery: System Language Discovery
PID:2784 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 395⤵PID:1696
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"94⤵PID:2284
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"95⤵PID:2684
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"95⤵PID:864
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 396⤵PID:2400
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"95⤵PID:1392
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"96⤵PID:2224
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"96⤵PID:1128
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 397⤵PID:1428
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"96⤵PID:2876
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"97⤵PID:1840
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"97⤵PID:1956
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 398⤵PID:2576
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"97⤵PID:2716
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"98⤵PID:1752
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"98⤵PID:1272
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"98⤵PID:2640
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 399⤵PID:1700
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"98⤵PID:2916
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"99⤵PID:2548
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"99⤵PID:2880
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 3100⤵PID:2376
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"99⤵PID:1772
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"100⤵PID:2964
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"100⤵PID:1792
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 3101⤵PID:604
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"100⤵PID:940
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"101⤵PID:2812
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"101⤵PID:1380
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 3102⤵PID:1972
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"101⤵PID:856
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"102⤵PID:2804
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"102⤵PID:1728
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 3103⤵PID:1692
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"102⤵PID:2496
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"103⤵PID:1948
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"103⤵PID:824
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 3104⤵PID:2152
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"103⤵PID:2144
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"104⤵PID:1872
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"104⤵PID:1476
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 3105⤵PID:1496
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"104⤵PID:2092
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"105⤵PID:2660
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"105⤵PID:1392
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 3106⤵PID:884
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"105⤵PID:620
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"106⤵PID:2892
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"106⤵PID:1876
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 3107⤵PID:1868
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"106⤵PID:1660
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"107⤵PID:2948
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"107⤵PID:2472
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"107⤵PID:1828
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 3108⤵PID:2716
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"107⤵PID:3068
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"108⤵PID:2944
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"108⤵PID:2000
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 3109⤵PID:2120
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"108⤵PID:1940
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"109⤵PID:988
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"109⤵
- System Location Discovery: System Language Discovery
PID:2812 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 3110⤵PID:2360
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"109⤵PID:1984
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"110⤵PID:1812
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"110⤵PID:2592
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 3111⤵PID:408
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"110⤵PID:2924
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"111⤵PID:1628
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"111⤵PID:1948
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 3112⤵PID:2720
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"111⤵PID:2260
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"112⤵PID:860
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"112⤵PID:2176
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 3113⤵PID:492
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"112⤵PID:1724
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"113⤵PID:2308
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"113⤵PID:564
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"113⤵PID:2004
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 3114⤵PID:1640
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"113⤵PID:1264
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"114⤵PID:1936
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"114⤵PID:2892
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 3115⤵PID:1784
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"114⤵PID:692
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"115⤵PID:1544
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"115⤵PID:1032
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 3116⤵PID:1740
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"115⤵PID:2680
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"116⤵PID:1508
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"116⤵PID:1564
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"116⤵PID:832
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 3117⤵PID:2428
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"116⤵PID:1052
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"117⤵PID:988
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"117⤵PID:3016
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 3118⤵PID:1056
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"117⤵PID:2776
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"118⤵PID:1652
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"118⤵PID:1596
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 3119⤵
- System Location Discovery: System Language Discovery
PID:1216
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"118⤵PID:2616
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"119⤵PID:2136
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"119⤵PID:2884
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 3120⤵PID:2988
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"119⤵PID:1752
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"120⤵PID:1632
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"120⤵PID:784
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 3121⤵PID:936
-
-
-
C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"120⤵PID:1856
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"121⤵PID:1240
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\5308f89ea6ae9b511d38eaf32f0352c06279190262618737aeae66c24e4af7bd.exe"121⤵PID:1580
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 3122⤵PID:2168
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-