Analysis
-
max time kernel
151s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 18:39
Static task
static1
Behavioral task
behavioral1
Sample
2022-11-23_e26a00e517d09c62f66a02585bdf0bab_mafia.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2022-11-23_e26a00e517d09c62f66a02585bdf0bab_mafia.exe
Resource
win10v2004-20220901-en
General
-
Target
2022-11-23_e26a00e517d09c62f66a02585bdf0bab_mafia.exe
-
Size
486KB
-
MD5
e26a00e517d09c62f66a02585bdf0bab
-
SHA1
7e58dd7178f7b8dfac8f50227b3506fd4581687f
-
SHA256
ed55bf0fa046bfacdb245bf7c5066fdf5b88543a5026ec2ee66c301c7ec9d5bb
-
SHA512
bfd1780fde73622f98d188a71560fd2f8fd97b697c5a5d3bfb8cdefb86219635c2ec91cf17c1d62fbd1f21dce162b8d00274344007a8cfd3acb1f0ad64947907
-
SSDEEP
6144:Sorf3lPvovsgZnqG2C7mOTeiLfD7zALt+PMitdzW+8xOoHrFFYXSAgTuEsvnppQh:/U5rCOTeiD95I+8xhrFWXSAdEWpQNZ
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
Processes:
9436.tmp9511.tmp959D.tmp963A.tmp96E6.tmp9772.tmp983D.tmp98AB.tmp9928.tmp9995.tmp9A41.tmp9B0C.tmp9B89.tmp9C45.tmp9CF0.tmp9D7D.tmp9DFA.tmp9E87.tmpA4FF.tmpA59B.tmpA618.tmpA6C4.tmpA770.tmpA82B.tmpA8C8.tmpA983.tmpA9F1.tmpAAEB.tmpAB68.tmpAC04.tmpACBF.tmpAD6B.tmpADD9.tmpAE75.tmpAF01.tmpAF6F.tmpAFEC.tmpB088.tmpB124.tmpB1B1.tmpB22E.tmpB2AB.tmpB328.tmpB3A5.tmpB422.tmpB4AF.tmpB51C.tmpB599.tmpB635.tmpB6B2.tmpB73F.tmpB7AC.tmpB829.tmpB8A6.tmpB933.tmpB9A0.tmpBA2D.tmpBB46.tmpBBF2.tmpBC6F.tmpBCEC.tmpBD59.tmpBDD6.tmpBE53.tmppid process 2300 9436.tmp 4708 9511.tmp 4796 959D.tmp 4872 963A.tmp 3780 96E6.tmp 4316 9772.tmp 620 983D.tmp 3184 98AB.tmp 3004 9928.tmp 3292 9995.tmp 4268 9A41.tmp 740 9B0C.tmp 2344 9B89.tmp 940 9C45.tmp 4400 9CF0.tmp 4416 9D7D.tmp 2284 9DFA.tmp 4148 9E87.tmp 4476 A4FF.tmp 3816 A59B.tmp 3748 A618.tmp 4540 A6C4.tmp 3988 A770.tmp 2932 A82B.tmp 4652 A8C8.tmp 4040 A983.tmp 5112 A9F1.tmp 4212 AAEB.tmp 772 AB68.tmp 4992 AC04.tmp 3516 ACBF.tmp 4320 AD6B.tmp 452 ADD9.tmp 2144 AE75.tmp 4188 AF01.tmp 4128 AF6F.tmp 1768 AFEC.tmp 992 B088.tmp 1724 B124.tmp 4084 B1B1.tmp 308 B22E.tmp 1388 B2AB.tmp 1188 B328.tmp 4780 B3A5.tmp 4016 B422.tmp 2840 B4AF.tmp 4392 B51C.tmp 428 B599.tmp 3672 B635.tmp 2796 B6B2.tmp 4516 B73F.tmp 3032 B7AC.tmp 1932 B829.tmp 3448 B8A6.tmp 1008 B933.tmp 536 B9A0.tmp 1980 BA2D.tmp 2712 BB46.tmp 4944 BBF2.tmp 2164 BC6F.tmp 4204 BCEC.tmp 5060 BD59.tmp 4136 BDD6.tmp 3968 BE53.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2022-11-23_e26a00e517d09c62f66a02585bdf0bab_mafia.exe9436.tmp9511.tmp959D.tmp963A.tmp96E6.tmp9772.tmp983D.tmp98AB.tmp9928.tmp9995.tmp9A41.tmp9B0C.tmp9B89.tmp9C45.tmp9CF0.tmp9D7D.tmp9DFA.tmp9E87.tmpA4FF.tmpA59B.tmpA618.tmpdescription pid process target process PID 4896 wrote to memory of 2300 4896 2022-11-23_e26a00e517d09c62f66a02585bdf0bab_mafia.exe 9436.tmp PID 4896 wrote to memory of 2300 4896 2022-11-23_e26a00e517d09c62f66a02585bdf0bab_mafia.exe 9436.tmp PID 4896 wrote to memory of 2300 4896 2022-11-23_e26a00e517d09c62f66a02585bdf0bab_mafia.exe 9436.tmp PID 2300 wrote to memory of 4708 2300 9436.tmp 9511.tmp PID 2300 wrote to memory of 4708 2300 9436.tmp 9511.tmp PID 2300 wrote to memory of 4708 2300 9436.tmp 9511.tmp PID 4708 wrote to memory of 4796 4708 9511.tmp 959D.tmp PID 4708 wrote to memory of 4796 4708 9511.tmp 959D.tmp PID 4708 wrote to memory of 4796 4708 9511.tmp 959D.tmp PID 4796 wrote to memory of 4872 4796 959D.tmp 963A.tmp PID 4796 wrote to memory of 4872 4796 959D.tmp 963A.tmp PID 4796 wrote to memory of 4872 4796 959D.tmp 963A.tmp PID 4872 wrote to memory of 3780 4872 963A.tmp 96E6.tmp PID 4872 wrote to memory of 3780 4872 963A.tmp 96E6.tmp PID 4872 wrote to memory of 3780 4872 963A.tmp 96E6.tmp PID 3780 wrote to memory of 4316 3780 96E6.tmp 9772.tmp PID 3780 wrote to memory of 4316 3780 96E6.tmp 9772.tmp PID 3780 wrote to memory of 4316 3780 96E6.tmp 9772.tmp PID 4316 wrote to memory of 620 4316 9772.tmp 983D.tmp PID 4316 wrote to memory of 620 4316 9772.tmp 983D.tmp PID 4316 wrote to memory of 620 4316 9772.tmp 983D.tmp PID 620 wrote to memory of 3184 620 983D.tmp 98AB.tmp PID 620 wrote to memory of 3184 620 983D.tmp 98AB.tmp PID 620 wrote to memory of 3184 620 983D.tmp 98AB.tmp PID 3184 wrote to memory of 3004 3184 98AB.tmp 9928.tmp PID 3184 wrote to memory of 3004 3184 98AB.tmp 9928.tmp PID 3184 wrote to memory of 3004 3184 98AB.tmp 9928.tmp PID 3004 wrote to memory of 3292 3004 9928.tmp 9995.tmp PID 3004 wrote to memory of 3292 3004 9928.tmp 9995.tmp PID 3004 wrote to memory of 3292 3004 9928.tmp 9995.tmp PID 3292 wrote to memory of 4268 3292 9995.tmp 9A41.tmp PID 3292 wrote to memory of 4268 3292 9995.tmp 9A41.tmp PID 3292 wrote to memory of 4268 3292 9995.tmp 9A41.tmp PID 4268 wrote to memory of 740 4268 9A41.tmp 9B0C.tmp PID 4268 wrote to memory of 740 4268 9A41.tmp 9B0C.tmp PID 4268 wrote to memory of 740 4268 9A41.tmp 9B0C.tmp PID 740 wrote to memory of 2344 740 9B0C.tmp 9B89.tmp PID 740 wrote to memory of 2344 740 9B0C.tmp 9B89.tmp PID 740 wrote to memory of 2344 740 9B0C.tmp 9B89.tmp PID 2344 wrote to memory of 940 2344 9B89.tmp 9C45.tmp PID 2344 wrote to memory of 940 2344 9B89.tmp 9C45.tmp PID 2344 wrote to memory of 940 2344 9B89.tmp 9C45.tmp PID 940 wrote to memory of 4400 940 9C45.tmp 9CF0.tmp PID 940 wrote to memory of 4400 940 9C45.tmp 9CF0.tmp PID 940 wrote to memory of 4400 940 9C45.tmp 9CF0.tmp PID 4400 wrote to memory of 4416 4400 9CF0.tmp 9D7D.tmp PID 4400 wrote to memory of 4416 4400 9CF0.tmp 9D7D.tmp PID 4400 wrote to memory of 4416 4400 9CF0.tmp 9D7D.tmp PID 4416 wrote to memory of 2284 4416 9D7D.tmp 9DFA.tmp PID 4416 wrote to memory of 2284 4416 9D7D.tmp 9DFA.tmp PID 4416 wrote to memory of 2284 4416 9D7D.tmp 9DFA.tmp PID 2284 wrote to memory of 4148 2284 9DFA.tmp 9E87.tmp PID 2284 wrote to memory of 4148 2284 9DFA.tmp 9E87.tmp PID 2284 wrote to memory of 4148 2284 9DFA.tmp 9E87.tmp PID 4148 wrote to memory of 4476 4148 9E87.tmp A4FF.tmp PID 4148 wrote to memory of 4476 4148 9E87.tmp A4FF.tmp PID 4148 wrote to memory of 4476 4148 9E87.tmp A4FF.tmp PID 4476 wrote to memory of 3816 4476 A4FF.tmp A59B.tmp PID 4476 wrote to memory of 3816 4476 A4FF.tmp A59B.tmp PID 4476 wrote to memory of 3816 4476 A4FF.tmp A59B.tmp PID 3816 wrote to memory of 3748 3816 A59B.tmp A618.tmp PID 3816 wrote to memory of 3748 3816 A59B.tmp A618.tmp PID 3816 wrote to memory of 3748 3816 A59B.tmp A618.tmp PID 3748 wrote to memory of 4540 3748 A618.tmp A6C4.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\2022-11-23_e26a00e517d09c62f66a02585bdf0bab_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2022-11-23_e26a00e517d09c62f66a02585bdf0bab_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\9436.tmp"C:\Users\Admin\AppData\Local\Temp\9436.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\9511.tmp"C:\Users\Admin\AppData\Local\Temp\9511.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\959D.tmp"C:\Users\Admin\AppData\Local\Temp\959D.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\963A.tmp"C:\Users\Admin\AppData\Local\Temp\963A.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\96E6.tmp"C:\Users\Admin\AppData\Local\Temp\96E6.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\9772.tmp"C:\Users\Admin\AppData\Local\Temp\9772.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\983D.tmp"C:\Users\Admin\AppData\Local\Temp\983D.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Users\Admin\AppData\Local\Temp\98AB.tmp"C:\Users\Admin\AppData\Local\Temp\98AB.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\9928.tmp"C:\Users\Admin\AppData\Local\Temp\9928.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\9995.tmp"C:\Users\Admin\AppData\Local\Temp\9995.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\9A41.tmp"C:\Users\Admin\AppData\Local\Temp\9A41.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\9B0C.tmp"C:\Users\Admin\AppData\Local\Temp\9B0C.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Local\Temp\9B89.tmp"C:\Users\Admin\AppData\Local\Temp\9B89.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\9C45.tmp"C:\Users\Admin\AppData\Local\Temp\9C45.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Local\Temp\9CF0.tmp"C:\Users\Admin\AppData\Local\Temp\9CF0.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\9D7D.tmp"C:\Users\Admin\AppData\Local\Temp\9D7D.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\9DFA.tmp"C:\Users\Admin\AppData\Local\Temp\9DFA.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\9E87.tmp"C:\Users\Admin\AppData\Local\Temp\9E87.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\A4FF.tmp"C:\Users\Admin\AppData\Local\Temp\A4FF.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\A59B.tmp"C:\Users\Admin\AppData\Local\Temp\A59B.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Users\Admin\AppData\Local\Temp\A618.tmp"C:\Users\Admin\AppData\Local\Temp\A618.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Users\Admin\AppData\Local\Temp\A6C4.tmp"C:\Users\Admin\AppData\Local\Temp\A6C4.tmp"23⤵
- Executes dropped EXE
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\A770.tmp"C:\Users\Admin\AppData\Local\Temp\A770.tmp"24⤵
- Executes dropped EXE
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\A82B.tmp"C:\Users\Admin\AppData\Local\Temp\A82B.tmp"25⤵
- Executes dropped EXE
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\A8C8.tmp"C:\Users\Admin\AppData\Local\Temp\A8C8.tmp"26⤵
- Executes dropped EXE
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\A983.tmp"C:\Users\Admin\AppData\Local\Temp\A983.tmp"27⤵
- Executes dropped EXE
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\A9F1.tmp"C:\Users\Admin\AppData\Local\Temp\A9F1.tmp"28⤵
- Executes dropped EXE
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\AAEB.tmp"C:\Users\Admin\AppData\Local\Temp\AAEB.tmp"29⤵
- Executes dropped EXE
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\AB68.tmp"C:\Users\Admin\AppData\Local\Temp\AB68.tmp"30⤵
- Executes dropped EXE
PID:772 -
C:\Users\Admin\AppData\Local\Temp\AC04.tmp"C:\Users\Admin\AppData\Local\Temp\AC04.tmp"31⤵
- Executes dropped EXE
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\ACBF.tmp"C:\Users\Admin\AppData\Local\Temp\ACBF.tmp"32⤵
- Executes dropped EXE
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\AD6B.tmp"C:\Users\Admin\AppData\Local\Temp\AD6B.tmp"33⤵
- Executes dropped EXE
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\ADD9.tmp"C:\Users\Admin\AppData\Local\Temp\ADD9.tmp"34⤵
- Executes dropped EXE
PID:452 -
C:\Users\Admin\AppData\Local\Temp\AE75.tmp"C:\Users\Admin\AppData\Local\Temp\AE75.tmp"35⤵
- Executes dropped EXE
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\AF01.tmp"C:\Users\Admin\AppData\Local\Temp\AF01.tmp"36⤵
- Executes dropped EXE
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\AF6F.tmp"C:\Users\Admin\AppData\Local\Temp\AF6F.tmp"37⤵
- Executes dropped EXE
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\AFEC.tmp"C:\Users\Admin\AppData\Local\Temp\AFEC.tmp"38⤵
- Executes dropped EXE
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\B088.tmp"C:\Users\Admin\AppData\Local\Temp\B088.tmp"39⤵
- Executes dropped EXE
PID:992 -
C:\Users\Admin\AppData\Local\Temp\B124.tmp"C:\Users\Admin\AppData\Local\Temp\B124.tmp"40⤵
- Executes dropped EXE
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\B1B1.tmp"C:\Users\Admin\AppData\Local\Temp\B1B1.tmp"41⤵
- Executes dropped EXE
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\B22E.tmp"C:\Users\Admin\AppData\Local\Temp\B22E.tmp"42⤵
- Executes dropped EXE
PID:308 -
C:\Users\Admin\AppData\Local\Temp\B2AB.tmp"C:\Users\Admin\AppData\Local\Temp\B2AB.tmp"43⤵
- Executes dropped EXE
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\B328.tmp"C:\Users\Admin\AppData\Local\Temp\B328.tmp"44⤵
- Executes dropped EXE
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\B3A5.tmp"C:\Users\Admin\AppData\Local\Temp\B3A5.tmp"45⤵
- Executes dropped EXE
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\B422.tmp"C:\Users\Admin\AppData\Local\Temp\B422.tmp"46⤵
- Executes dropped EXE
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\B4AF.tmp"C:\Users\Admin\AppData\Local\Temp\B4AF.tmp"47⤵
- Executes dropped EXE
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\B51C.tmp"C:\Users\Admin\AppData\Local\Temp\B51C.tmp"48⤵
- Executes dropped EXE
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\B599.tmp"C:\Users\Admin\AppData\Local\Temp\B599.tmp"49⤵
- Executes dropped EXE
PID:428 -
C:\Users\Admin\AppData\Local\Temp\B635.tmp"C:\Users\Admin\AppData\Local\Temp\B635.tmp"50⤵
- Executes dropped EXE
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\B6B2.tmp"C:\Users\Admin\AppData\Local\Temp\B6B2.tmp"51⤵
- Executes dropped EXE
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\B73F.tmp"C:\Users\Admin\AppData\Local\Temp\B73F.tmp"52⤵
- Executes dropped EXE
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\B7AC.tmp"C:\Users\Admin\AppData\Local\Temp\B7AC.tmp"53⤵
- Executes dropped EXE
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\B829.tmp"C:\Users\Admin\AppData\Local\Temp\B829.tmp"54⤵
- Executes dropped EXE
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\B8A6.tmp"C:\Users\Admin\AppData\Local\Temp\B8A6.tmp"55⤵
- Executes dropped EXE
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\B933.tmp"C:\Users\Admin\AppData\Local\Temp\B933.tmp"56⤵
- Executes dropped EXE
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\B9A0.tmp"C:\Users\Admin\AppData\Local\Temp\B9A0.tmp"57⤵
- Executes dropped EXE
PID:536 -
C:\Users\Admin\AppData\Local\Temp\BA2D.tmp"C:\Users\Admin\AppData\Local\Temp\BA2D.tmp"58⤵
- Executes dropped EXE
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\BB46.tmp"C:\Users\Admin\AppData\Local\Temp\BB46.tmp"59⤵
- Executes dropped EXE
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\BBF2.tmp"C:\Users\Admin\AppData\Local\Temp\BBF2.tmp"60⤵
- Executes dropped EXE
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\BC6F.tmp"C:\Users\Admin\AppData\Local\Temp\BC6F.tmp"61⤵
- Executes dropped EXE
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\BCEC.tmp"C:\Users\Admin\AppData\Local\Temp\BCEC.tmp"62⤵
- Executes dropped EXE
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\BD59.tmp"C:\Users\Admin\AppData\Local\Temp\BD59.tmp"63⤵
- Executes dropped EXE
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\BDD6.tmp"C:\Users\Admin\AppData\Local\Temp\BDD6.tmp"64⤵
- Executes dropped EXE
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\BE53.tmp"C:\Users\Admin\AppData\Local\Temp\BE53.tmp"65⤵
- Executes dropped EXE
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\BEC1.tmp"C:\Users\Admin\AppData\Local\Temp\BEC1.tmp"66⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\BF1E.tmp"C:\Users\Admin\AppData\Local\Temp\BF1E.tmp"67⤵PID:3736
-
C:\Users\Admin\AppData\Local\Temp\BFAB.tmp"C:\Users\Admin\AppData\Local\Temp\BFAB.tmp"68⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\C018.tmp"C:\Users\Admin\AppData\Local\Temp\C018.tmp"69⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\C086.tmp"C:\Users\Admin\AppData\Local\Temp\C086.tmp"70⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\C0F3.tmp"C:\Users\Admin\AppData\Local\Temp\C0F3.tmp"71⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\C161.tmp"C:\Users\Admin\AppData\Local\Temp\C161.tmp"72⤵PID:4796
-
C:\Users\Admin\AppData\Local\Temp\C22C.tmp"C:\Users\Admin\AppData\Local\Temp\C22C.tmp"73⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\C299.tmp"C:\Users\Admin\AppData\Local\Temp\C299.tmp"74⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\C316.tmp"C:\Users\Admin\AppData\Local\Temp\C316.tmp"75⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\C3A3.tmp"C:\Users\Admin\AppData\Local\Temp\C3A3.tmp"76⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\C44F.tmp"C:\Users\Admin\AppData\Local\Temp\C44F.tmp"77⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\C4BC.tmp"C:\Users\Admin\AppData\Local\Temp\C4BC.tmp"78⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\C549.tmp"C:\Users\Admin\AppData\Local\Temp\C549.tmp"79⤵PID:4192
-
C:\Users\Admin\AppData\Local\Temp\C5C6.tmp"C:\Users\Admin\AppData\Local\Temp\C5C6.tmp"80⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\C633.tmp"C:\Users\Admin\AppData\Local\Temp\C633.tmp"81⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\C6A0.tmp"C:\Users\Admin\AppData\Local\Temp\C6A0.tmp"82⤵PID:4184
-
C:\Users\Admin\AppData\Local\Temp\C70E.tmp"C:\Users\Admin\AppData\Local\Temp\C70E.tmp"83⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\C78B.tmp"C:\Users\Admin\AppData\Local\Temp\C78B.tmp"84⤵PID:4380
-
C:\Users\Admin\AppData\Local\Temp\C7F8.tmp"C:\Users\Admin\AppData\Local\Temp\C7F8.tmp"85⤵PID:4296
-
C:\Users\Admin\AppData\Local\Temp\C865.tmp"C:\Users\Admin\AppData\Local\Temp\C865.tmp"86⤵PID:4160
-
C:\Users\Admin\AppData\Local\Temp\C8D3.tmp"C:\Users\Admin\AppData\Local\Temp\C8D3.tmp"87⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\C940.tmp"C:\Users\Admin\AppData\Local\Temp\C940.tmp"88⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\C9CD.tmp"C:\Users\Admin\AppData\Local\Temp\C9CD.tmp"89⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\CA2B.tmp"C:\Users\Admin\AppData\Local\Temp\CA2B.tmp"90⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\CAB7.tmp"C:\Users\Admin\AppData\Local\Temp\CAB7.tmp"91⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\CB44.tmp"C:\Users\Admin\AppData\Local\Temp\CB44.tmp"92⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\CBE0.tmp"C:\Users\Admin\AppData\Local\Temp\CBE0.tmp"93⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\CC5D.tmp"C:\Users\Admin\AppData\Local\Temp\CC5D.tmp"94⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\CCCA.tmp"C:\Users\Admin\AppData\Local\Temp\CCCA.tmp"95⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\CD38.tmp"C:\Users\Admin\AppData\Local\Temp\CD38.tmp"96⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\CDA5.tmp"C:\Users\Admin\AppData\Local\Temp\CDA5.tmp"97⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\CE22.tmp"C:\Users\Admin\AppData\Local\Temp\CE22.tmp"98⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\CF6A.tmp"C:\Users\Admin\AppData\Local\Temp\CF6A.tmp"99⤵PID:344
-
C:\Users\Admin\AppData\Local\Temp\CFD8.tmp"C:\Users\Admin\AppData\Local\Temp\CFD8.tmp"100⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\D055.tmp"C:\Users\Admin\AppData\Local\Temp\D055.tmp"101⤵PID:728
-
C:\Users\Admin\AppData\Local\Temp\D0E1.tmp"C:\Users\Admin\AppData\Local\Temp\D0E1.tmp"102⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\D16E.tmp"C:\Users\Admin\AppData\Local\Temp\D16E.tmp"103⤵PID:3724
-
C:\Users\Admin\AppData\Local\Temp\D1DB.tmp"C:\Users\Admin\AppData\Local\Temp\D1DB.tmp"104⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\D258.tmp"C:\Users\Admin\AppData\Local\Temp\D258.tmp"105⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\D2E5.tmp"C:\Users\Admin\AppData\Local\Temp\D2E5.tmp"106⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\D352.tmp"C:\Users\Admin\AppData\Local\Temp\D352.tmp"107⤵PID:828
-
C:\Users\Admin\AppData\Local\Temp\D3C0.tmp"C:\Users\Admin\AppData\Local\Temp\D3C0.tmp"108⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\D42D.tmp"C:\Users\Admin\AppData\Local\Temp\D42D.tmp"109⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\D4AA.tmp"C:\Users\Admin\AppData\Local\Temp\D4AA.tmp"110⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\D517.tmp"C:\Users\Admin\AppData\Local\Temp\D517.tmp"111⤵PID:4040
-
C:\Users\Admin\AppData\Local\Temp\D5B4.tmp"C:\Users\Admin\AppData\Local\Temp\D5B4.tmp"112⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\D631.tmp"C:\Users\Admin\AppData\Local\Temp\D631.tmp"113⤵PID:4212
-
C:\Users\Admin\AppData\Local\Temp\D69E.tmp"C:\Users\Admin\AppData\Local\Temp\D69E.tmp"114⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\D6FC.tmp"C:\Users\Admin\AppData\Local\Temp\D6FC.tmp"115⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\D769.tmp"C:\Users\Admin\AppData\Local\Temp\D769.tmp"116⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\D7F6.tmp"C:\Users\Admin\AppData\Local\Temp\D7F6.tmp"117⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\D854.tmp"C:\Users\Admin\AppData\Local\Temp\D854.tmp"118⤵PID:476
-
C:\Users\Admin\AppData\Local\Temp\D8C1.tmp"C:\Users\Admin\AppData\Local\Temp\D8C1.tmp"119⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\D94E.tmp"C:\Users\Admin\AppData\Local\Temp\D94E.tmp"120⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\D9DA.tmp"C:\Users\Admin\AppData\Local\Temp\D9DA.tmp"121⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\DA57.tmp"C:\Users\Admin\AppData\Local\Temp\DA57.tmp"122⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\DAC5.tmp"C:\Users\Admin\AppData\Local\Temp\DAC5.tmp"123⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\DB42.tmp"C:\Users\Admin\AppData\Local\Temp\DB42.tmp"124⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\DBBF.tmp"C:\Users\Admin\AppData\Local\Temp\DBBF.tmp"125⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\DC3C.tmp"C:\Users\Admin\AppData\Local\Temp\DC3C.tmp"126⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\DCA9.tmp"C:\Users\Admin\AppData\Local\Temp\DCA9.tmp"127⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\DD07.tmp"C:\Users\Admin\AppData\Local\Temp\DD07.tmp"128⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\DD84.tmp"C:\Users\Admin\AppData\Local\Temp\DD84.tmp"129⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\DDF1.tmp"C:\Users\Admin\AppData\Local\Temp\DDF1.tmp"130⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\DE6E.tmp"C:\Users\Admin\AppData\Local\Temp\DE6E.tmp"131⤵PID:3480
-
C:\Users\Admin\AppData\Local\Temp\DEEB.tmp"C:\Users\Admin\AppData\Local\Temp\DEEB.tmp"132⤵PID:736
-
C:\Users\Admin\AppData\Local\Temp\DF97.tmp"C:\Users\Admin\AppData\Local\Temp\DF97.tmp"133⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\E014.tmp"C:\Users\Admin\AppData\Local\Temp\E014.tmp"134⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\E0A1.tmp"C:\Users\Admin\AppData\Local\Temp\E0A1.tmp"135⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\E11E.tmp"C:\Users\Admin\AppData\Local\Temp\E11E.tmp"136⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\E18B.tmp"C:\Users\Admin\AppData\Local\Temp\E18B.tmp"137⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\E1F8.tmp"C:\Users\Admin\AppData\Local\Temp\E1F8.tmp"138⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\E295.tmp"C:\Users\Admin\AppData\Local\Temp\E295.tmp"139⤵PID:428
-
C:\Users\Admin\AppData\Local\Temp\E312.tmp"C:\Users\Admin\AppData\Local\Temp\E312.tmp"140⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\E38F.tmp"C:\Users\Admin\AppData\Local\Temp\E38F.tmp"141⤵PID:3132
-
C:\Users\Admin\AppData\Local\Temp\E40C.tmp"C:\Users\Admin\AppData\Local\Temp\E40C.tmp"142⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\E489.tmp"C:\Users\Admin\AppData\Local\Temp\E489.tmp"143⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\E515.tmp"C:\Users\Admin\AppData\Local\Temp\E515.tmp"144⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\E573.tmp"C:\Users\Admin\AppData\Local\Temp\E573.tmp"145⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\E600.tmp"C:\Users\Admin\AppData\Local\Temp\E600.tmp"146⤵PID:3700
-
C:\Users\Admin\AppData\Local\Temp\E67D.tmp"C:\Users\Admin\AppData\Local\Temp\E67D.tmp"147⤵PID:3776
-
C:\Users\Admin\AppData\Local\Temp\E6FA.tmp"C:\Users\Admin\AppData\Local\Temp\E6FA.tmp"148⤵PID:3716
-
C:\Users\Admin\AppData\Local\Temp\E786.tmp"C:\Users\Admin\AppData\Local\Temp\E786.tmp"149⤵PID:536
-
C:\Users\Admin\AppData\Local\Temp\E803.tmp"C:\Users\Admin\AppData\Local\Temp\E803.tmp"150⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\E871.tmp"C:\Users\Admin\AppData\Local\Temp\E871.tmp"151⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\E90D.tmp"C:\Users\Admin\AppData\Local\Temp\E90D.tmp"152⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\E98A.tmp"C:\Users\Admin\AppData\Local\Temp\E98A.tmp"153⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\EA07.tmp"C:\Users\Admin\AppData\Local\Temp\EA07.tmp"154⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\EA74.tmp"C:\Users\Admin\AppData\Local\Temp\EA74.tmp"155⤵PID:812
-
C:\Users\Admin\AppData\Local\Temp\EAF1.tmp"C:\Users\Admin\AppData\Local\Temp\EAF1.tmp"156⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\EB6E.tmp"C:\Users\Admin\AppData\Local\Temp\EB6E.tmp"157⤵PID:5060
-
C:\Users\Admin\AppData\Local\Temp\EBDC.tmp"C:\Users\Admin\AppData\Local\Temp\EBDC.tmp"158⤵PID:4136
-
C:\Users\Admin\AppData\Local\Temp\EC68.tmp"C:\Users\Admin\AppData\Local\Temp\EC68.tmp"159⤵PID:4036
-
C:\Users\Admin\AppData\Local\Temp\ECE5.tmp"C:\Users\Admin\AppData\Local\Temp\ECE5.tmp"160⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\ED62.tmp"C:\Users\Admin\AppData\Local\Temp\ED62.tmp"161⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\EDDF.tmp"C:\Users\Admin\AppData\Local\Temp\EDDF.tmp"162⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\EE5C.tmp"C:\Users\Admin\AppData\Local\Temp\EE5C.tmp"163⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\EECA.tmp"C:\Users\Admin\AppData\Local\Temp\EECA.tmp"164⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\EF47.tmp"C:\Users\Admin\AppData\Local\Temp\EF47.tmp"165⤵PID:4800
-
C:\Users\Admin\AppData\Local\Temp\F012.tmp"C:\Users\Admin\AppData\Local\Temp\F012.tmp"166⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\F08F.tmp"C:\Users\Admin\AppData\Local\Temp\F08F.tmp"167⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\F0FC.tmp"C:\Users\Admin\AppData\Local\Temp\F0FC.tmp"168⤵PID:3592
-
C:\Users\Admin\AppData\Local\Temp\F179.tmp"C:\Users\Admin\AppData\Local\Temp\F179.tmp"169⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\F1F6.tmp"C:\Users\Admin\AppData\Local\Temp\F1F6.tmp"170⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\F273.tmp"C:\Users\Admin\AppData\Local\Temp\F273.tmp"171⤵PID:4192
-
C:\Users\Admin\AppData\Local\Temp\F2F0.tmp"C:\Users\Admin\AppData\Local\Temp\F2F0.tmp"172⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\F35D.tmp"C:\Users\Admin\AppData\Local\Temp\F35D.tmp"173⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\F3EA.tmp"C:\Users\Admin\AppData\Local\Temp\F3EA.tmp"174⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\F467.tmp"C:\Users\Admin\AppData\Local\Temp\F467.tmp"175⤵PID:3292
-
C:\Users\Admin\AppData\Local\Temp\F523.tmp"C:\Users\Admin\AppData\Local\Temp\F523.tmp"176⤵PID:3760
-
C:\Users\Admin\AppData\Local\Temp\F5BF.tmp"C:\Users\Admin\AppData\Local\Temp\F5BF.tmp"177⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\F62C.tmp"C:\Users\Admin\AppData\Local\Temp\F62C.tmp"178⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\F6B9.tmp"C:\Users\Admin\AppData\Local\Temp\F6B9.tmp"179⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\F745.tmp"C:\Users\Admin\AppData\Local\Temp\F745.tmp"180⤵PID:4920
-
C:\Users\Admin\AppData\Local\Temp\F7B3.tmp"C:\Users\Admin\AppData\Local\Temp\F7B3.tmp"181⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\F820.tmp"C:\Users\Admin\AppData\Local\Temp\F820.tmp"182⤵PID:4308
-
C:\Users\Admin\AppData\Local\Temp\F88E.tmp"C:\Users\Admin\AppData\Local\Temp\F88E.tmp"183⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\F959.tmp"C:\Users\Admin\AppData\Local\Temp\F959.tmp"184⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\F9B6.tmp"C:\Users\Admin\AppData\Local\Temp\F9B6.tmp"185⤵PID:4264
-
C:\Users\Admin\AppData\Local\Temp\FA43.tmp"C:\Users\Admin\AppData\Local\Temp\FA43.tmp"186⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\FAC0.tmp"C:\Users\Admin\AppData\Local\Temp\FAC0.tmp"187⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\FB3D.tmp"C:\Users\Admin\AppData\Local\Temp\FB3D.tmp"188⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\FBAA.tmp"C:\Users\Admin\AppData\Local\Temp\FBAA.tmp"189⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\FC27.tmp"C:\Users\Admin\AppData\Local\Temp\FC27.tmp"190⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\FCA4.tmp"C:\Users\Admin\AppData\Local\Temp\FCA4.tmp"191⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\FD12.tmp"C:\Users\Admin\AppData\Local\Temp\FD12.tmp"192⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\FD8F.tmp"C:\Users\Admin\AppData\Local\Temp\FD8F.tmp"193⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\FE1B.tmp"C:\Users\Admin\AppData\Local\Temp\FE1B.tmp"194⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\FE89.tmp"C:\Users\Admin\AppData\Local\Temp\FE89.tmp"195⤵PID:3924
-
C:\Users\Admin\AppData\Local\Temp\FEF6.tmp"C:\Users\Admin\AppData\Local\Temp\FEF6.tmp"196⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\FFD1.tmp"C:\Users\Admin\AppData\Local\Temp\FFD1.tmp"197⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\4E.tmp"C:\Users\Admin\AppData\Local\Temp\4E.tmp"198⤵PID:688
-
C:\Users\Admin\AppData\Local\Temp\CB.tmp"C:\Users\Admin\AppData\Local\Temp\CB.tmp"199⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\148.tmp"C:\Users\Admin\AppData\Local\Temp\148.tmp"200⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\1C5.tmp"C:\Users\Admin\AppData\Local\Temp\1C5.tmp"201⤵PID:4540
-
C:\Users\Admin\AppData\Local\Temp\252.tmp"C:\Users\Admin\AppData\Local\Temp\252.tmp"202⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\2DE.tmp"C:\Users\Admin\AppData\Local\Temp\2DE.tmp"203⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\35B.tmp"C:\Users\Admin\AppData\Local\Temp\35B.tmp"204⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\3D8.tmp"C:\Users\Admin\AppData\Local\Temp\3D8.tmp"205⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\436.tmp"C:\Users\Admin\AppData\Local\Temp\436.tmp"206⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\4F1.tmp"C:\Users\Admin\AppData\Local\Temp\4F1.tmp"207⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\55F.tmp"C:\Users\Admin\AppData\Local\Temp\55F.tmp"208⤵PID:3852
-
C:\Users\Admin\AppData\Local\Temp\5CC.tmp"C:\Users\Admin\AppData\Local\Temp\5CC.tmp"209⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\63A.tmp"C:\Users\Admin\AppData\Local\Temp\63A.tmp"210⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\6C6.tmp"C:\Users\Admin\AppData\Local\Temp\6C6.tmp"211⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\743.tmp"C:\Users\Admin\AppData\Local\Temp\743.tmp"212⤵PID:4716
-
C:\Users\Admin\AppData\Local\Temp\7A1.tmp"C:\Users\Admin\AppData\Local\Temp\7A1.tmp"213⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\81E.tmp"C:\Users\Admin\AppData\Local\Temp\81E.tmp"214⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\89B.tmp"C:\Users\Admin\AppData\Local\Temp\89B.tmp"215⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\928.tmp"C:\Users\Admin\AppData\Local\Temp\928.tmp"216⤵PID:792
-
C:\Users\Admin\AppData\Local\Temp\9A5.tmp"C:\Users\Admin\AppData\Local\Temp\9A5.tmp"217⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\ADD.tmp"C:\Users\Admin\AppData\Local\Temp\ADD.tmp"218⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\B4A.tmp"C:\Users\Admin\AppData\Local\Temp\B4A.tmp"219⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\BC7.tmp"C:\Users\Admin\AppData\Local\Temp\BC7.tmp"220⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\C44.tmp"C:\Users\Admin\AppData\Local\Temp\C44.tmp"221⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\CB2.tmp"C:\Users\Admin\AppData\Local\Temp\CB2.tmp"222⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\D2F.tmp"C:\Users\Admin\AppData\Local\Temp\D2F.tmp"223⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\D9C.tmp"C:\Users\Admin\AppData\Local\Temp\D9C.tmp"224⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\E0A.tmp"C:\Users\Admin\AppData\Local\Temp\E0A.tmp"225⤵PID:308
-
C:\Users\Admin\AppData\Local\Temp\E77.tmp"C:\Users\Admin\AppData\Local\Temp\E77.tmp"226⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\F04.tmp"C:\Users\Admin\AppData\Local\Temp\F04.tmp"227⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\FA0.tmp"C:\Users\Admin\AppData\Local\Temp\FA0.tmp"228⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\100D.tmp"C:\Users\Admin\AppData\Local\Temp\100D.tmp"229⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\107B.tmp"C:\Users\Admin\AppData\Local\Temp\107B.tmp"230⤵PID:4016
-
C:\Users\Admin\AppData\Local\Temp\10E8.tmp"C:\Users\Admin\AppData\Local\Temp\10E8.tmp"231⤵PID:4580
-
C:\Users\Admin\AppData\Local\Temp\1146.tmp"C:\Users\Admin\AppData\Local\Temp\1146.tmp"232⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\11B3.tmp"C:\Users\Admin\AppData\Local\Temp\11B3.tmp"233⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\1220.tmp"C:\Users\Admin\AppData\Local\Temp\1220.tmp"234⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\129D.tmp"C:\Users\Admin\AppData\Local\Temp\129D.tmp"235⤵PID:3672
-
C:\Users\Admin\AppData\Local\Temp\12FB.tmp"C:\Users\Admin\AppData\Local\Temp\12FB.tmp"236⤵PID:4732
-
C:\Users\Admin\AppData\Local\Temp\1359.tmp"C:\Users\Admin\AppData\Local\Temp\1359.tmp"237⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\13C6.tmp"C:\Users\Admin\AppData\Local\Temp\13C6.tmp"238⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\1453.tmp"C:\Users\Admin\AppData\Local\Temp\1453.tmp"239⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\14E0.tmp"C:\Users\Admin\AppData\Local\Temp\14E0.tmp"240⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\154D.tmp"C:\Users\Admin\AppData\Local\Temp\154D.tmp"241⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\15AB.tmp"C:\Users\Admin\AppData\Local\Temp\15AB.tmp"242⤵PID:2604