Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
171s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 20:18
Static task
static1
Behavioral task
behavioral1
Sample
a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe
Resource
win10v2004-20220812-en
General
-
Target
a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe
-
Size
1.3MB
-
MD5
44b5f7a75d67bbb7ec9261c0d8f75828
-
SHA1
4a1b87bf7cea4bb70aebc4d96218e85f918b4161
-
SHA256
a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb
-
SHA512
9b6a8676eb9cab2005fb4bc4f15e04aea33a5e813ab12bfc482619c31011226db13942ba5f7de9f0c5ab2960a703c2f84f722a87e4de25dd71c050168f480e5b
-
SSDEEP
24576:H+Ffiy8EIcZvTFjieW93bERQ5BpbpSlDCL1SFvMS3pRUtMY0+hRGd:eoEIwTF2H9QUtEo1SNFTcMY0oI
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3140 wrote to memory of 4892 3140 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 80 PID 3140 wrote to memory of 4892 3140 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 80 PID 3140 wrote to memory of 4892 3140 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 80 PID 4892 wrote to memory of 4996 4892 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 81 PID 4892 wrote to memory of 4996 4892 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 81 PID 4892 wrote to memory of 4996 4892 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 81 PID 4996 wrote to memory of 2712 4996 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 82 PID 4996 wrote to memory of 2712 4996 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 82 PID 4996 wrote to memory of 2712 4996 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 82 PID 2712 wrote to memory of 2484 2712 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 83 PID 2712 wrote to memory of 2484 2712 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 83 PID 2712 wrote to memory of 2484 2712 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 83 PID 2484 wrote to memory of 2784 2484 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 84 PID 2484 wrote to memory of 2784 2484 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 84 PID 2484 wrote to memory of 2784 2484 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 84 PID 2784 wrote to memory of 932 2784 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 85 PID 2784 wrote to memory of 932 2784 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 85 PID 2784 wrote to memory of 932 2784 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 85 PID 932 wrote to memory of 1708 932 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 86 PID 932 wrote to memory of 1708 932 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 86 PID 932 wrote to memory of 1708 932 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 86 PID 1708 wrote to memory of 3856 1708 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 87 PID 1708 wrote to memory of 3856 1708 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 87 PID 1708 wrote to memory of 3856 1708 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 87 PID 3856 wrote to memory of 4132 3856 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 88 PID 3856 wrote to memory of 4132 3856 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 88 PID 3856 wrote to memory of 4132 3856 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 88 PID 4132 wrote to memory of 228 4132 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 89 PID 4132 wrote to memory of 228 4132 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 89 PID 4132 wrote to memory of 228 4132 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 89 PID 228 wrote to memory of 3832 228 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 90 PID 228 wrote to memory of 3832 228 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 90 PID 228 wrote to memory of 3832 228 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 90 PID 3832 wrote to memory of 4872 3832 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 91 PID 3832 wrote to memory of 4872 3832 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 91 PID 3832 wrote to memory of 4872 3832 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 91 PID 4872 wrote to memory of 3660 4872 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 92 PID 4872 wrote to memory of 3660 4872 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 92 PID 4872 wrote to memory of 3660 4872 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 92 PID 3660 wrote to memory of 1840 3660 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 93 PID 3660 wrote to memory of 1840 3660 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 93 PID 3660 wrote to memory of 1840 3660 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 93 PID 1840 wrote to memory of 3148 1840 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 94 PID 1840 wrote to memory of 3148 1840 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 94 PID 1840 wrote to memory of 3148 1840 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 94 PID 3148 wrote to memory of 852 3148 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 95 PID 3148 wrote to memory of 852 3148 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 95 PID 3148 wrote to memory of 852 3148 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 95 PID 852 wrote to memory of 2964 852 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 97 PID 852 wrote to memory of 2964 852 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 97 PID 852 wrote to memory of 2964 852 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 97 PID 2964 wrote to memory of 5064 2964 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 99 PID 2964 wrote to memory of 5064 2964 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 99 PID 2964 wrote to memory of 5064 2964 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 99 PID 5064 wrote to memory of 4260 5064 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 100 PID 5064 wrote to memory of 4260 5064 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 100 PID 5064 wrote to memory of 4260 5064 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 100 PID 4260 wrote to memory of 876 4260 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 101 PID 4260 wrote to memory of 876 4260 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 101 PID 4260 wrote to memory of 876 4260 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 101 PID 876 wrote to memory of 4072 876 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 102 PID 876 wrote to memory of 4072 876 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 102 PID 876 wrote to memory of 4072 876 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 102 PID 4072 wrote to memory of 1412 4072 a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"7⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"8⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"9⤵
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"10⤵
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"11⤵
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"12⤵
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"13⤵
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"14⤵
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"15⤵
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"16⤵
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"17⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"18⤵
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"19⤵
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"20⤵
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"21⤵
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"22⤵
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"23⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"24⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"25⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"26⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"27⤵PID:4296
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"28⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"29⤵PID:4056
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"30⤵PID:648
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"31⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"32⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"33⤵
- Checks computer location settings
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"34⤵PID:3952
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"35⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"36⤵PID:3740
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"37⤵
- Checks computer location settings
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"38⤵
- Checks computer location settings
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"39⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"40⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"41⤵PID:4100
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"42⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"43⤵
- Checks computer location settings
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"44⤵
- Checks computer location settings
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"45⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"46⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"47⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"48⤵PID:3416
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"49⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"50⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"51⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"52⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"53⤵PID:3180
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"54⤵
- Checks computer location settings
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"55⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"56⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"57⤵
- Checks computer location settings
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"58⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"59⤵PID:816
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"60⤵PID:364
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"61⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"62⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"63⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"64⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"65⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"66⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"67⤵PID:3176
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"68⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"69⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"70⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"71⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"72⤵PID:728
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"73⤵
- Checks computer location settings
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"74⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"75⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"76⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"77⤵PID:3148
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"78⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"79⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"80⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"81⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"82⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"83⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"84⤵PID:3488
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"85⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"86⤵
- Checks computer location settings
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"87⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"88⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"89⤵PID:3676
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"90⤵
- Checks computer location settings
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"91⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"92⤵PID:4000
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"93⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"94⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"95⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"96⤵PID:3596
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"97⤵PID:3736
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"98⤵PID:4080
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"99⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"100⤵PID:4040
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"101⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"102⤵PID:4424
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"103⤵PID:204
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"104⤵
- Checks computer location settings
PID:400 -
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"105⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"106⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"107⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"108⤵
- Checks computer location settings
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"109⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"110⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"111⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"112⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"113⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"114⤵PID:4984
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"115⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"116⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"117⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"118⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"119⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"120⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"121⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"C:\Users\Admin\AppData\Local\Temp\a2b405facb053ed107ee1f9dd9bcf86b70d06334690dbcf2433b72eb1362ebfb.exe"122⤵PID:3956
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-