Analysis
-
max time kernel
45s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-01-2025 05:11
Static task
static1
Behavioral task
behavioral1
Sample
458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe
Resource
win7-20240903-en
General
-
Target
458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe
-
Size
405KB
-
MD5
2d3305a87b929b8ffd9128cc0531fe70
-
SHA1
b856528226de4bf73c44ce13a9a2c5d15dd94fb1
-
SHA256
458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8
-
SHA512
f2d41da92e21aec2ead7b527b1f25b35fa1fb9086fd2a75938d126f272c7a23bb89b55ab190cd822cba9f4b780ee16d88bbe5f9457241aa73bd423e9d2cb84a8
-
SSDEEP
6144:8FReki7IuH/8hYvKgT69KepKdAD47lUwscIFAhhGphFd39yoJDi/a2Seal:8FRil/ti3pKd17nsjJj1yoti/qe
Malware Config
Extracted
asyncrat
0.5.6E
Default
mendey.duckdns.org:2333
nfabbudcyb
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 2780 set thread context of 2768 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 30 PID 2652 set thread context of 2692 2652 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 34 PID 2564 set thread context of 2616 2564 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 36 PID 1456 set thread context of 2872 1456 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 38 PID 644 set thread context of 2184 644 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 40 PID 2960 set thread context of 1928 2960 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 42 PID 536 set thread context of 2876 536 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 44 PID 2928 set thread context of 2924 2928 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 46 PID 1968 set thread context of 2492 1968 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 48 PID 3028 set thread context of 2120 3028 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 50 PID 2100 set thread context of 2404 2100 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 53 PID 1756 set thread context of 1812 1756 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 55 PID 852 set thread context of 964 852 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 57 PID 1940 set thread context of 696 1940 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 59 PID 1560 set thread context of 1864 1560 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 61 PID 1308 set thread context of 1324 1308 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 63 PID 1684 set thread context of 2632 1684 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 65 PID 1652 set thread context of 2280 1652 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 67 PID 908 set thread context of 2416 908 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 69 PID 2508 set thread context of 1612 2508 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 71 PID 2728 set thread context of 2548 2728 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 73 PID 2368 set thread context of 2856 2368 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 75 PID 2600 set thread context of 2564 2600 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 159 PID 2252 set thread context of 584 2252 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 79 PID 1796 set thread context of 2976 1796 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 81 PID 2964 set thread context of 2736 2964 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 84 PID 320 set thread context of 408 320 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 88 PID 1028 set thread context of 868 1028 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 90 PID 2884 set thread context of 1736 2884 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 92 PID 2604 set thread context of 860 2604 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 94 PID 2212 set thread context of 3016 2212 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 96 PID 1800 set thread context of 2500 1800 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 98 PID 2120 set thread context of 1940 2120 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 100 PID 1636 set thread context of 1740 1636 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 102 PID 1196 set thread context of 2448 1196 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 105 PID 1708 set thread context of 2988 1708 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 107 PID 1712 set thread context of 1764 1712 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 109 PID 288 set thread context of 2024 288 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 111 PID 2508 set thread context of 2652 2508 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 113 PID 2728 set thread context of 2816 2728 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 115 PID 2412 set thread context of 2912 2412 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 117 PID 2600 set thread context of 2960 2600 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 198 PID 2860 set thread context of 1988 2860 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 121 PID 2936 set thread context of 2348 2936 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 123 PID 2180 set thread context of 536 2180 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 125 PID 2016 set thread context of 320 2016 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 127 PID 3008 set thread context of 2932 3008 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 173 PID 1300 set thread context of 1840 1300 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 174 PID 2692 set thread context of 716 2692 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 133 PID 2272 set thread context of 616 2272 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 135 PID 1308 set thread context of 1872 1308 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 137 PID 3052 set thread context of 1572 3052 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 139 PID 1096 set thread context of 944 1096 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 141 PID 1000 set thread context of 2632 1000 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 143 PID 1600 set thread context of 908 1600 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 145 PID 1016 set thread context of 2832 1016 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 147 PID 2516 set thread context of 2368 2516 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 149 PID 2648 set thread context of 2480 2648 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 151 PID 1996 set thread context of 2084 1996 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 153 PID 692 set thread context of 2152 692 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 155 PID 3004 set thread context of 1444 3004 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 157 PID 1796 set thread context of 2564 1796 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 207 PID 2608 set thread context of 1028 2608 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 161 PID 1756 set thread context of 2392 1756 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 211 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2652 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2652 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2652 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2564 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 1456 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 644 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2960 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 536 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2928 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 1968 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 3028 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2100 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2100 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 1756 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 852 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 1940 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 1560 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 1308 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 1684 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 1652 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 908 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2508 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2728 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2368 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2600 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2252 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 1796 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2964 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2964 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 320 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 320 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 320 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 1028 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2884 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2604 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2212 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 1800 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2120 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 1636 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 1196 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 1196 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 1708 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 1712 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 288 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2508 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2728 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2412 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2600 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2860 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2936 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2180 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2016 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 3008 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 1300 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2692 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2272 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 1308 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 3052 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 1096 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 1000 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 1600 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 1016 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 2516 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 2652 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 2564 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 1456 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 644 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 2960 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 536 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 2928 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 1968 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 3028 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 2100 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 1756 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 852 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 1940 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 1560 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 1308 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 1684 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 1652 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 2616 RegAsm.exe Token: SeDebugPrivilege 908 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 2508 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 2728 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 2368 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 2600 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 2252 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 1796 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 2964 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 320 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 1028 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 2884 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 2604 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 2212 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 1800 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 2120 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 1636 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 1196 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 1708 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 1712 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 288 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 2508 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 2728 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 2412 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 2600 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 2860 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 2936 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 2180 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 2016 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 3008 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 1300 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 2692 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 2272 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 1308 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 3052 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 1096 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 1000 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 1600 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 1016 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 2516 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 2648 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 1996 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 692 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 3004 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 1796 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe Token: SeDebugPrivilege 2608 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2768 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 30 PID 2780 wrote to memory of 2768 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 30 PID 2780 wrote to memory of 2768 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 30 PID 2780 wrote to memory of 2768 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 30 PID 2780 wrote to memory of 2768 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 30 PID 2780 wrote to memory of 2768 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 30 PID 2780 wrote to memory of 2768 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 30 PID 2780 wrote to memory of 2768 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 30 PID 2780 wrote to memory of 2652 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 31 PID 2780 wrote to memory of 2652 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 31 PID 2780 wrote to memory of 2652 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 31 PID 2780 wrote to memory of 2652 2780 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 31 PID 2652 wrote to memory of 2572 2652 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 32 PID 2652 wrote to memory of 2572 2652 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 32 PID 2652 wrote to memory of 2572 2652 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 32 PID 2652 wrote to memory of 2572 2652 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 32 PID 2652 wrote to memory of 2572 2652 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 32 PID 2652 wrote to memory of 2572 2652 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 32 PID 2652 wrote to memory of 2572 2652 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 32 PID 2652 wrote to memory of 1528 2652 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 33 PID 2652 wrote to memory of 1528 2652 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 33 PID 2652 wrote to memory of 1528 2652 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 33 PID 2652 wrote to memory of 1528 2652 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 33 PID 2652 wrote to memory of 1528 2652 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 33 PID 2652 wrote to memory of 1528 2652 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 33 PID 2652 wrote to memory of 1528 2652 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 33 PID 2652 wrote to memory of 2692 2652 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 34 PID 2652 wrote to memory of 2692 2652 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 34 PID 2652 wrote to memory of 2692 2652 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 34 PID 2652 wrote to memory of 2692 2652 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 34 PID 2652 wrote to memory of 2692 2652 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 34 PID 2652 wrote to memory of 2692 2652 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 34 PID 2652 wrote to memory of 2692 2652 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 34 PID 2652 wrote to memory of 2692 2652 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 34 PID 2652 wrote to memory of 2564 2652 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 35 PID 2652 wrote to memory of 2564 2652 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 35 PID 2652 wrote to memory of 2564 2652 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 35 PID 2652 wrote to memory of 2564 2652 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 35 PID 2564 wrote to memory of 2616 2564 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 36 PID 2564 wrote to memory of 2616 2564 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 36 PID 2564 wrote to memory of 2616 2564 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 36 PID 2564 wrote to memory of 2616 2564 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 36 PID 2564 wrote to memory of 2616 2564 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 36 PID 2564 wrote to memory of 2616 2564 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 36 PID 2564 wrote to memory of 2616 2564 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 36 PID 2564 wrote to memory of 2616 2564 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 36 PID 2564 wrote to memory of 1456 2564 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 37 PID 2564 wrote to memory of 1456 2564 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 37 PID 2564 wrote to memory of 1456 2564 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 37 PID 2564 wrote to memory of 1456 2564 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 37 PID 1456 wrote to memory of 2872 1456 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 38 PID 1456 wrote to memory of 2872 1456 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 38 PID 1456 wrote to memory of 2872 1456 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 38 PID 1456 wrote to memory of 2872 1456 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 38 PID 1456 wrote to memory of 2872 1456 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 38 PID 1456 wrote to memory of 2872 1456 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 38 PID 1456 wrote to memory of 2872 1456 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 38 PID 1456 wrote to memory of 2872 1456 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 38 PID 1456 wrote to memory of 644 1456 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 39 PID 1456 wrote to memory of 644 1456 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 39 PID 1456 wrote to memory of 644 1456 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 39 PID 1456 wrote to memory of 644 1456 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 39 PID 644 wrote to memory of 2184 644 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 40 PID 644 wrote to memory of 2184 644 458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2768
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:2572
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:1528
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:2692
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵
- System Location Discovery: System Language Discovery
PID:2872
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"5⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵PID:2184
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"6⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2960 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵
- System Location Discovery: System Language Discovery
PID:1928
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"7⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:536 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"8⤵PID:2876
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"8⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2928 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"9⤵
- System Location Discovery: System Language Discovery
PID:2924
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"9⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1968 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"10⤵PID:2492
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"10⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3028 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"11⤵PID:2120
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"11⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2100 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"12⤵PID:2380
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"12⤵PID:2404
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"12⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1756 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"13⤵
- System Location Discovery: System Language Discovery
PID:1812
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:852 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"14⤵
- System Location Discovery: System Language Discovery
PID:964
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"14⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1940 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"15⤵
- System Location Discovery: System Language Discovery
PID:696
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"15⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1560 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"16⤵PID:1864
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"16⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1308 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"17⤵
- System Location Discovery: System Language Discovery
PID:1324
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"17⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1684 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"18⤵PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"18⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1652 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"19⤵PID:2280
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"19⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:908 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"20⤵PID:2416
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"20⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2508 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"21⤵
- System Location Discovery: System Language Discovery
PID:1612
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"21⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2728 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"22⤵PID:2548
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"22⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2368 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"23⤵PID:2856
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"23⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2600 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"24⤵PID:2564
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"24⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2252 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"25⤵
- System Location Discovery: System Language Discovery
PID:584
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"25⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1796 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"26⤵
- System Location Discovery: System Language Discovery
PID:2976
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"26⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2964 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"27⤵PID:2384
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"27⤵PID:2736
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"27⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:320 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"28⤵PID:1968
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"28⤵PID:3036
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"28⤵PID:408
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"28⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1028 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"29⤵
- System Location Discovery: System Language Discovery
PID:868
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"29⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2884 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"30⤵PID:1736
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"30⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2604 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"31⤵
- System Location Discovery: System Language Discovery
PID:860
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"31⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2212 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"32⤵
- System Location Discovery: System Language Discovery
PID:3016
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"32⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1800 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"33⤵PID:2500
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"33⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2120 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"34⤵PID:1940
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"34⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1636 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"35⤵PID:1740
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"35⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1196 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"36⤵PID:444
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"36⤵PID:2448
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"36⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1708 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"37⤵PID:2988
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"37⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1712 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"38⤵PID:1764
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"38⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:288 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"39⤵
- System Location Discovery: System Language Discovery
PID:2024
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"39⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2508 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"40⤵
- System Location Discovery: System Language Discovery
PID:2652
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"40⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2728 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"41⤵
- System Location Discovery: System Language Discovery
PID:2816
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"41⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2412 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"42⤵PID:2912
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"42⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2600 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"43⤵PID:2960
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"43⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2860 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"44⤵PID:1988
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"44⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2936 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"45⤵PID:2348
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"45⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2180 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"46⤵PID:536
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"46⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2016 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"47⤵PID:320
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"47⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3008 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"48⤵
- System Location Discovery: System Language Discovery
PID:2932
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"48⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1300 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"49⤵
- System Location Discovery: System Language Discovery
PID:1840
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"49⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2692 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"50⤵PID:716
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"50⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2272 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"51⤵
- System Location Discovery: System Language Discovery
PID:616
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"51⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1308 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"52⤵PID:1872
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"52⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3052 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"53⤵
- System Location Discovery: System Language Discovery
PID:1572
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"53⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1096 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"54⤵PID:944
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"54⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1000 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"55⤵
- System Location Discovery: System Language Discovery
PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"55⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1600 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"56⤵
- System Location Discovery: System Language Discovery
PID:908
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"56⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1016 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"57⤵PID:2832
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"57⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2516 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"58⤵PID:2368
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"58⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2648 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"59⤵PID:2480
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"59⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1996 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"60⤵PID:2084
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"60⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:692 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"61⤵
- System Location Discovery: System Language Discovery
PID:2152
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"61⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3004 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"62⤵PID:1444
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"62⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1796 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"63⤵PID:2564
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"63⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2608 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"64⤵PID:1028
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"64⤵
- Suspicious use of SetThreadContext
PID:1756 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"65⤵
- System Location Discovery: System Language Discovery
PID:2392
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"65⤵PID:2548
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"66⤵PID:2264
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"66⤵
- System Location Discovery: System Language Discovery
PID:3008 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"67⤵PID:2292
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"67⤵
- System Location Discovery: System Language Discovery
PID:1036 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"68⤵PID:2604
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"68⤵PID:3068
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"69⤵
- System Location Discovery: System Language Discovery
PID:928
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"69⤵PID:3012
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"70⤵PID:2932
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"70⤵PID:1840
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"71⤵
- System Location Discovery: System Language Discovery
PID:1684
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"71⤵PID:2120
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"72⤵PID:3052
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"72⤵
- System Location Discovery: System Language Discovery
PID:1368 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"73⤵PID:2068
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"73⤵PID:2032
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"73⤵PID:1360
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"73⤵PID:968
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"74⤵PID:2496
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"74⤵PID:1708
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"74⤵PID:1608
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"74⤵PID:1964
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"75⤵PID:1676
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"75⤵PID:696
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"76⤵PID:2012
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"76⤵
- System Location Discovery: System Language Discovery
PID:2096 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"77⤵PID:2796
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"77⤵
- System Location Discovery: System Language Discovery
PID:2412 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"78⤵PID:1996
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"78⤵PID:448
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"79⤵PID:692
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"79⤵PID:2920
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"80⤵PID:2644
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"80⤵PID:2960
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"81⤵PID:2052
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"81⤵PID:1292
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"81⤵PID:2156
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"82⤵PID:2164
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"82⤵
- System Location Discovery: System Language Discovery
PID:2268 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"83⤵PID:1808
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"83⤵PID:2876
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"83⤵PID:1576
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"84⤵PID:2564
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"84⤵PID:2176
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"85⤵PID:1464
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"85⤵PID:2352
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"86⤵PID:2392
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"86⤵
- System Location Discovery: System Language Discovery
PID:1268
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"86⤵PID:2144
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"87⤵PID:1560
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"87⤵PID:2292
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"88⤵PID:2924
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"88⤵PID:2272
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"89⤵PID:2208
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"89⤵
- System Location Discovery: System Language Discovery
PID:1788 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"90⤵PID:2708
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"90⤵PID:860
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"90⤵PID:1016
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"91⤵PID:1940
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"91⤵PID:2060
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"92⤵
- System Location Discovery: System Language Discovery
PID:2788
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"92⤵PID:2504
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"93⤵
- System Location Discovery: System Language Discovery
PID:3052
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"93⤵
- System Location Discovery: System Language Discovery
PID:1620 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"94⤵PID:2108
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"94⤵PID:2828
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"95⤵PID:1504
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"95⤵PID:2020
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"95⤵PID:2280
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"95⤵
- System Location Discovery: System Language Discovery
PID:584 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"96⤵PID:2628
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"96⤵PID:448
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"97⤵
- System Location Discovery: System Language Discovery
PID:1240
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"97⤵
- System Location Discovery: System Language Discovery
PID:2760 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"98⤵PID:2988
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"98⤵
- System Location Discovery: System Language Discovery
PID:1388 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"99⤵PID:1528
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"99⤵PID:2968
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"100⤵PID:2852
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"100⤵PID:1876
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"101⤵
- System Location Discovery: System Language Discovery
PID:2792
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"101⤵PID:3012
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"102⤵PID:1980
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"102⤵
- System Location Discovery: System Language Discovery
PID:788 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"103⤵PID:2472
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"103⤵PID:2620
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"104⤵
- System Location Discovery: System Language Discovery
PID:1736
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"104⤵PID:1800
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"105⤵PID:2904
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"105⤵PID:2284
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"106⤵
- System Location Discovery: System Language Discovery
PID:2520
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"106⤵PID:2560
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"107⤵PID:2272
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"107⤵PID:1740
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"108⤵
- System Location Discovery: System Language Discovery
PID:2404
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"108⤵PID:2060
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"109⤵PID:2000
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"109⤵PID:2764
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"110⤵PID:2580
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"110⤵PID:2012
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"111⤵PID:636
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"111⤵PID:340
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"112⤵PID:2208
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"112⤵PID:1992
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"112⤵PID:1636
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"113⤵PID:1864
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"113⤵PID:448
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"114⤵PID:2728
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"114⤵PID:2600
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"114⤵PID:1360
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"115⤵PID:2976
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"115⤵PID:1996
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"115⤵PID:2408
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"116⤵PID:1388
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"116⤵PID:2244
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"117⤵PID:2468
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"117⤵PID:2864
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"118⤵PID:2384
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"118⤵PID:1156
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"119⤵PID:2712
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"119⤵PID:788
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"120⤵PID:1564
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"120⤵PID:2852
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"121⤵PID:3000
-
-
C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"C:\Users\Admin\AppData\Local\Temp\458fc7f9fc9742b63edefb6a769ebbea643ae79f49f2fcaf4d29c2430ae632f8N.exe"121⤵PID:2824
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"122⤵PID:1980
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-