Analysis
-
max time kernel
154s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 16:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-25_4d6b274f5f999e2fbff962e2b5a6ee49_mafia.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
General
-
Target
2024-01-25_4d6b274f5f999e2fbff962e2b5a6ee49_mafia.exe
-
Size
488KB
-
MD5
4d6b274f5f999e2fbff962e2b5a6ee49
-
SHA1
1713c13583f61da202c46177619c82282e9ac166
-
SHA256
94a69d5b003d1aeba899db74a68f55469bc92383f9b89e8a69e11d1b516a8f45
-
SHA512
925291fe86f3500cb5d5a8bda8b95bf1ce520af6a8190a5dbd50212221b25db883f46baeb2c906e3d27752910fee52f5ff5adb1c2268304fd98c0e0ca09eb4f8
-
SSDEEP
12288:/U5rCOTeiDRHsSh7QlE79GewWIiqWnlUzRAzPpNZ:/UQOJDHh6E4VIgKpN
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
Processes:
BAA5.tmpBC2C.tmpBCE7.tmpBDE1.tmpBECC.tmpC071.tmpC14C.tmpC217.tmpC2F2.tmpC3EC.tmpC4D6.tmpC5E0.tmpC6EA.tmpC7E4.tmpC8CE.tmpC9E7.tmpCA93.tmpCB5E.tmpCC68.tmpCD62.tmpCE9A.tmpCFC3.tmpD09E.tmpD188.tmpD234.tmpD32E.tmpD467.tmpD522.tmpD5FD.tmpD707.tmpD7D2.tmpD87E.tmpD949.tmpD9C6.tmpDA43.tmpDACF.tmpDB3D.tmpDBBA.tmpDC46.tmpDCD3.tmpDD40.tmpDDAE.tmpDE3A.tmpDEF6.tmpDF83.tmpE05D.tmpE0FA.tmpE1A5.tmpE232.tmpE31C.tmpE38A.tmpE407.tmpE474.tmpE520.tmpE58D.tmpE62A.tmpE6E5.tmpE791.tmpE7FE.tmpE8BA.tmpE956.tmpE9D3.tmpEA41.tmpEAAE.tmppid process 3464 BAA5.tmp 3328 BC2C.tmp 4424 BCE7.tmp 4784 BDE1.tmp 2772 BECC.tmp 4856 C071.tmp 4772 C14C.tmp 4284 C217.tmp 4756 C2F2.tmp 3324 C3EC.tmp 2720 C4D6.tmp 3212 C5E0.tmp 1016 C6EA.tmp 2488 C7E4.tmp 468 C8CE.tmp 4232 C9E7.tmp 5104 CA93.tmp 3200 CB5E.tmp 848 CC68.tmp 1220 CD62.tmp 4588 CE9A.tmp 1448 CFC3.tmp 4156 D09E.tmp 1364 D188.tmp 1276 D234.tmp 988 D32E.tmp 5012 D467.tmp 3492 D522.tmp 1812 D5FD.tmp 556 D707.tmp 3528 D7D2.tmp 4688 D87E.tmp 2664 D949.tmp 4052 D9C6.tmp 4996 DA43.tmp 1912 DACF.tmp 4664 DB3D.tmp 3672 DBBA.tmp 3992 DC46.tmp 4568 DCD3.tmp 3272 DD40.tmp 1108 DDAE.tmp 5108 DE3A.tmp 1916 DEF6.tmp 2716 DF83.tmp 2076 E05D.tmp 5100 E0FA.tmp 3360 E1A5.tmp 2228 E232.tmp 4976 E31C.tmp 2196 E38A.tmp 4068 E407.tmp 4132 E474.tmp 3748 E520.tmp 2980 E58D.tmp 4032 E62A.tmp 488 E6E5.tmp 2748 E791.tmp 1936 E7FE.tmp 2312 E8BA.tmp 4276 E956.tmp 2628 E9D3.tmp 468 EA41.tmp 1668 EAAE.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-01-25_4d6b274f5f999e2fbff962e2b5a6ee49_mafia.exeBAA5.tmpBC2C.tmpBCE7.tmpBDE1.tmpBECC.tmpC071.tmpC14C.tmpC217.tmpC2F2.tmpC3EC.tmpC4D6.tmpC5E0.tmpC6EA.tmpC7E4.tmpC8CE.tmpC9E7.tmpCA93.tmpCB5E.tmpCC68.tmpCD62.tmpCE9A.tmpdescription pid process target process PID 1868 wrote to memory of 3464 1868 2024-01-25_4d6b274f5f999e2fbff962e2b5a6ee49_mafia.exe BAA5.tmp PID 1868 wrote to memory of 3464 1868 2024-01-25_4d6b274f5f999e2fbff962e2b5a6ee49_mafia.exe BAA5.tmp PID 1868 wrote to memory of 3464 1868 2024-01-25_4d6b274f5f999e2fbff962e2b5a6ee49_mafia.exe BAA5.tmp PID 3464 wrote to memory of 3328 3464 BAA5.tmp BC2C.tmp PID 3464 wrote to memory of 3328 3464 BAA5.tmp BC2C.tmp PID 3464 wrote to memory of 3328 3464 BAA5.tmp BC2C.tmp PID 3328 wrote to memory of 4424 3328 BC2C.tmp BCE7.tmp PID 3328 wrote to memory of 4424 3328 BC2C.tmp BCE7.tmp PID 3328 wrote to memory of 4424 3328 BC2C.tmp BCE7.tmp PID 4424 wrote to memory of 4784 4424 BCE7.tmp BDE1.tmp PID 4424 wrote to memory of 4784 4424 BCE7.tmp BDE1.tmp PID 4424 wrote to memory of 4784 4424 BCE7.tmp BDE1.tmp PID 4784 wrote to memory of 2772 4784 BDE1.tmp BECC.tmp PID 4784 wrote to memory of 2772 4784 BDE1.tmp BECC.tmp PID 4784 wrote to memory of 2772 4784 BDE1.tmp BECC.tmp PID 2772 wrote to memory of 4856 2772 BECC.tmp C071.tmp PID 2772 wrote to memory of 4856 2772 BECC.tmp C071.tmp PID 2772 wrote to memory of 4856 2772 BECC.tmp C071.tmp PID 4856 wrote to memory of 4772 4856 C071.tmp C14C.tmp PID 4856 wrote to memory of 4772 4856 C071.tmp C14C.tmp PID 4856 wrote to memory of 4772 4856 C071.tmp C14C.tmp PID 4772 wrote to memory of 4284 4772 C14C.tmp C217.tmp PID 4772 wrote to memory of 4284 4772 C14C.tmp C217.tmp PID 4772 wrote to memory of 4284 4772 C14C.tmp C217.tmp PID 4284 wrote to memory of 4756 4284 C217.tmp C2F2.tmp PID 4284 wrote to memory of 4756 4284 C217.tmp C2F2.tmp PID 4284 wrote to memory of 4756 4284 C217.tmp C2F2.tmp PID 4756 wrote to memory of 3324 4756 C2F2.tmp C3EC.tmp PID 4756 wrote to memory of 3324 4756 C2F2.tmp C3EC.tmp PID 4756 wrote to memory of 3324 4756 C2F2.tmp C3EC.tmp PID 3324 wrote to memory of 2720 3324 C3EC.tmp C4D6.tmp PID 3324 wrote to memory of 2720 3324 C3EC.tmp C4D6.tmp PID 3324 wrote to memory of 2720 3324 C3EC.tmp C4D6.tmp PID 2720 wrote to memory of 3212 2720 C4D6.tmp C5E0.tmp PID 2720 wrote to memory of 3212 2720 C4D6.tmp C5E0.tmp PID 2720 wrote to memory of 3212 2720 C4D6.tmp C5E0.tmp PID 3212 wrote to memory of 1016 3212 C5E0.tmp C6EA.tmp PID 3212 wrote to memory of 1016 3212 C5E0.tmp C6EA.tmp PID 3212 wrote to memory of 1016 3212 C5E0.tmp C6EA.tmp PID 1016 wrote to memory of 2488 1016 C6EA.tmp C7E4.tmp PID 1016 wrote to memory of 2488 1016 C6EA.tmp C7E4.tmp PID 1016 wrote to memory of 2488 1016 C6EA.tmp C7E4.tmp PID 2488 wrote to memory of 468 2488 C7E4.tmp C8CE.tmp PID 2488 wrote to memory of 468 2488 C7E4.tmp C8CE.tmp PID 2488 wrote to memory of 468 2488 C7E4.tmp C8CE.tmp PID 468 wrote to memory of 4232 468 C8CE.tmp C9E7.tmp PID 468 wrote to memory of 4232 468 C8CE.tmp C9E7.tmp PID 468 wrote to memory of 4232 468 C8CE.tmp C9E7.tmp PID 4232 wrote to memory of 5104 4232 C9E7.tmp CA93.tmp PID 4232 wrote to memory of 5104 4232 C9E7.tmp CA93.tmp PID 4232 wrote to memory of 5104 4232 C9E7.tmp CA93.tmp PID 5104 wrote to memory of 3200 5104 CA93.tmp CB5E.tmp PID 5104 wrote to memory of 3200 5104 CA93.tmp CB5E.tmp PID 5104 wrote to memory of 3200 5104 CA93.tmp CB5E.tmp PID 3200 wrote to memory of 848 3200 CB5E.tmp CC68.tmp PID 3200 wrote to memory of 848 3200 CB5E.tmp CC68.tmp PID 3200 wrote to memory of 848 3200 CB5E.tmp CC68.tmp PID 848 wrote to memory of 1220 848 CC68.tmp CD62.tmp PID 848 wrote to memory of 1220 848 CC68.tmp CD62.tmp PID 848 wrote to memory of 1220 848 CC68.tmp CD62.tmp PID 1220 wrote to memory of 4588 1220 CD62.tmp CE9A.tmp PID 1220 wrote to memory of 4588 1220 CD62.tmp CE9A.tmp PID 1220 wrote to memory of 4588 1220 CD62.tmp CE9A.tmp PID 4588 wrote to memory of 1448 4588 CE9A.tmp CFC3.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_4d6b274f5f999e2fbff962e2b5a6ee49_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_4d6b274f5f999e2fbff962e2b5a6ee49_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\BAA5.tmp"C:\Users\Admin\AppData\Local\Temp\BAA5.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\BC2C.tmp"C:\Users\Admin\AppData\Local\Temp\BC2C.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Users\Admin\AppData\Local\Temp\BCE7.tmp"C:\Users\Admin\AppData\Local\Temp\BCE7.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\BDE1.tmp"C:\Users\Admin\AppData\Local\Temp\BDE1.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\BECC.tmp"C:\Users\Admin\AppData\Local\Temp\BECC.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\C071.tmp"C:\Users\Admin\AppData\Local\Temp\C071.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\C14C.tmp"C:\Users\Admin\AppData\Local\Temp\C14C.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\C217.tmp"C:\Users\Admin\AppData\Local\Temp\C217.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\C2F2.tmp"C:\Users\Admin\AppData\Local\Temp\C2F2.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\C3EC.tmp"C:\Users\Admin\AppData\Local\Temp\C3EC.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\C4D6.tmp"C:\Users\Admin\AppData\Local\Temp\C4D6.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\C5E0.tmp"C:\Users\Admin\AppData\Local\Temp\C5E0.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\C6EA.tmp"C:\Users\Admin\AppData\Local\Temp\C6EA.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\C7E4.tmp"C:\Users\Admin\AppData\Local\Temp\C7E4.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\C8CE.tmp"C:\Users\Admin\AppData\Local\Temp\C8CE.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Users\Admin\AppData\Local\Temp\C9E7.tmp"C:\Users\Admin\AppData\Local\Temp\C9E7.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\CA93.tmp"C:\Users\Admin\AppData\Local\Temp\CA93.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\CB5E.tmp"C:\Users\Admin\AppData\Local\Temp\CB5E.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\CC68.tmp"C:\Users\Admin\AppData\Local\Temp\CC68.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Local\Temp\CD62.tmp"C:\Users\Admin\AppData\Local\Temp\CD62.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\CE9A.tmp"C:\Users\Admin\AppData\Local\Temp\CE9A.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\CFC3.tmp"C:\Users\Admin\AppData\Local\Temp\CFC3.tmp"23⤵
- Executes dropped EXE
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\D09E.tmp"C:\Users\Admin\AppData\Local\Temp\D09E.tmp"24⤵
- Executes dropped EXE
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\D188.tmp"C:\Users\Admin\AppData\Local\Temp\D188.tmp"25⤵
- Executes dropped EXE
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\D234.tmp"C:\Users\Admin\AppData\Local\Temp\D234.tmp"26⤵
- Executes dropped EXE
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\D32E.tmp"C:\Users\Admin\AppData\Local\Temp\D32E.tmp"27⤵
- Executes dropped EXE
PID:988 -
C:\Users\Admin\AppData\Local\Temp\D467.tmp"C:\Users\Admin\AppData\Local\Temp\D467.tmp"28⤵
- Executes dropped EXE
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\D522.tmp"C:\Users\Admin\AppData\Local\Temp\D522.tmp"29⤵
- Executes dropped EXE
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\D5FD.tmp"C:\Users\Admin\AppData\Local\Temp\D5FD.tmp"30⤵
- Executes dropped EXE
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\D707.tmp"C:\Users\Admin\AppData\Local\Temp\D707.tmp"31⤵
- Executes dropped EXE
PID:556 -
C:\Users\Admin\AppData\Local\Temp\D7D2.tmp"C:\Users\Admin\AppData\Local\Temp\D7D2.tmp"32⤵
- Executes dropped EXE
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\D87E.tmp"C:\Users\Admin\AppData\Local\Temp\D87E.tmp"33⤵
- Executes dropped EXE
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\D949.tmp"C:\Users\Admin\AppData\Local\Temp\D949.tmp"34⤵
- Executes dropped EXE
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\D9C6.tmp"C:\Users\Admin\AppData\Local\Temp\D9C6.tmp"35⤵
- Executes dropped EXE
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\DA43.tmp"C:\Users\Admin\AppData\Local\Temp\DA43.tmp"36⤵
- Executes dropped EXE
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\DACF.tmp"C:\Users\Admin\AppData\Local\Temp\DACF.tmp"37⤵
- Executes dropped EXE
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\DB3D.tmp"C:\Users\Admin\AppData\Local\Temp\DB3D.tmp"38⤵
- Executes dropped EXE
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\DBBA.tmp"C:\Users\Admin\AppData\Local\Temp\DBBA.tmp"39⤵
- Executes dropped EXE
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\DC46.tmp"C:\Users\Admin\AppData\Local\Temp\DC46.tmp"40⤵
- Executes dropped EXE
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\DCD3.tmp"C:\Users\Admin\AppData\Local\Temp\DCD3.tmp"41⤵
- Executes dropped EXE
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\DD40.tmp"C:\Users\Admin\AppData\Local\Temp\DD40.tmp"42⤵
- Executes dropped EXE
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\DDAE.tmp"C:\Users\Admin\AppData\Local\Temp\DDAE.tmp"43⤵
- Executes dropped EXE
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\DE3A.tmp"C:\Users\Admin\AppData\Local\Temp\DE3A.tmp"44⤵
- Executes dropped EXE
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\DEF6.tmp"C:\Users\Admin\AppData\Local\Temp\DEF6.tmp"45⤵
- Executes dropped EXE
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\DF83.tmp"C:\Users\Admin\AppData\Local\Temp\DF83.tmp"46⤵
- Executes dropped EXE
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\DFF0.tmp"C:\Users\Admin\AppData\Local\Temp\DFF0.tmp"47⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\E05D.tmp"C:\Users\Admin\AppData\Local\Temp\E05D.tmp"48⤵
- Executes dropped EXE
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\E0FA.tmp"C:\Users\Admin\AppData\Local\Temp\E0FA.tmp"49⤵
- Executes dropped EXE
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\E1A5.tmp"C:\Users\Admin\AppData\Local\Temp\E1A5.tmp"50⤵
- Executes dropped EXE
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\E232.tmp"C:\Users\Admin\AppData\Local\Temp\E232.tmp"51⤵
- Executes dropped EXE
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\E31C.tmp"C:\Users\Admin\AppData\Local\Temp\E31C.tmp"52⤵
- Executes dropped EXE
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\E38A.tmp"C:\Users\Admin\AppData\Local\Temp\E38A.tmp"53⤵
- Executes dropped EXE
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\E407.tmp"C:\Users\Admin\AppData\Local\Temp\E407.tmp"54⤵
- Executes dropped EXE
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\E474.tmp"C:\Users\Admin\AppData\Local\Temp\E474.tmp"55⤵
- Executes dropped EXE
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\E520.tmp"C:\Users\Admin\AppData\Local\Temp\E520.tmp"56⤵
- Executes dropped EXE
PID:3748 -
C:\Users\Admin\AppData\Local\Temp\E58D.tmp"C:\Users\Admin\AppData\Local\Temp\E58D.tmp"57⤵
- Executes dropped EXE
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\E62A.tmp"C:\Users\Admin\AppData\Local\Temp\E62A.tmp"58⤵
- Executes dropped EXE
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\E6E5.tmp"C:\Users\Admin\AppData\Local\Temp\E6E5.tmp"59⤵
- Executes dropped EXE
PID:488 -
C:\Users\Admin\AppData\Local\Temp\E791.tmp"C:\Users\Admin\AppData\Local\Temp\E791.tmp"60⤵
- Executes dropped EXE
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\E7FE.tmp"C:\Users\Admin\AppData\Local\Temp\E7FE.tmp"61⤵
- Executes dropped EXE
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\E8BA.tmp"C:\Users\Admin\AppData\Local\Temp\E8BA.tmp"62⤵
- Executes dropped EXE
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\E956.tmp"C:\Users\Admin\AppData\Local\Temp\E956.tmp"63⤵
- Executes dropped EXE
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\E9D3.tmp"C:\Users\Admin\AppData\Local\Temp\E9D3.tmp"64⤵
- Executes dropped EXE
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\EA41.tmp"C:\Users\Admin\AppData\Local\Temp\EA41.tmp"65⤵
- Executes dropped EXE
PID:468 -
C:\Users\Admin\AppData\Local\Temp\EAAE.tmp"C:\Users\Admin\AppData\Local\Temp\EAAE.tmp"66⤵
- Executes dropped EXE
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\EB69.tmp"C:\Users\Admin\AppData\Local\Temp\EB69.tmp"67⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\EBE6.tmp"C:\Users\Admin\AppData\Local\Temp\EBE6.tmp"68⤵PID:4020
-
C:\Users\Admin\AppData\Local\Temp\EC63.tmp"C:\Users\Admin\AppData\Local\Temp\EC63.tmp"69⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\ECD1.tmp"C:\Users\Admin\AppData\Local\Temp\ECD1.tmp"70⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\ED3E.tmp"C:\Users\Admin\AppData\Local\Temp\ED3E.tmp"71⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\EDDA.tmp"C:\Users\Admin\AppData\Local\Temp\EDDA.tmp"72⤵PID:3488
-
C:\Users\Admin\AppData\Local\Temp\EE38.tmp"C:\Users\Admin\AppData\Local\Temp\EE38.tmp"73⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\EEC5.tmp"C:\Users\Admin\AppData\Local\Temp\EEC5.tmp"74⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\EF32.tmp"C:\Users\Admin\AppData\Local\Temp\EF32.tmp"75⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\EFAF.tmp"C:\Users\Admin\AppData\Local\Temp\EFAF.tmp"76⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\F01D.tmp"C:\Users\Admin\AppData\Local\Temp\F01D.tmp"77⤵PID:4156
-
C:\Users\Admin\AppData\Local\Temp\F08A.tmp"C:\Users\Admin\AppData\Local\Temp\F08A.tmp"78⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\F107.tmp"C:\Users\Admin\AppData\Local\Temp\F107.tmp"79⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\F184.tmp"C:\Users\Admin\AppData\Local\Temp\F184.tmp"80⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\F1F1.tmp"C:\Users\Admin\AppData\Local\Temp\F1F1.tmp"81⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\F28E.tmp"C:\Users\Admin\AppData\Local\Temp\F28E.tmp"82⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\F2EB.tmp"C:\Users\Admin\AppData\Local\Temp\F2EB.tmp"83⤵PID:1340
-
C:\Users\Admin\AppData\Local\Temp\F359.tmp"C:\Users\Admin\AppData\Local\Temp\F359.tmp"84⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\F3C6.tmp"C:\Users\Admin\AppData\Local\Temp\F3C6.tmp"85⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\F433.tmp"C:\Users\Admin\AppData\Local\Temp\F433.tmp"86⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\F4B0.tmp"C:\Users\Admin\AppData\Local\Temp\F4B0.tmp"87⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\F50E.tmp"C:\Users\Admin\AppData\Local\Temp\F50E.tmp"88⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\F58B.tmp"C:\Users\Admin\AppData\Local\Temp\F58B.tmp"89⤵PID:3144
-
C:\Users\Admin\AppData\Local\Temp\F5E9.tmp"C:\Users\Admin\AppData\Local\Temp\F5E9.tmp"90⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\F666.tmp"C:\Users\Admin\AppData\Local\Temp\F666.tmp"91⤵PID:792
-
C:\Users\Admin\AppData\Local\Temp\F6D3.tmp"C:\Users\Admin\AppData\Local\Temp\F6D3.tmp"92⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\F760.tmp"C:\Users\Admin\AppData\Local\Temp\F760.tmp"93⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\F7CD.tmp"C:\Users\Admin\AppData\Local\Temp\F7CD.tmp"94⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\F84A.tmp"C:\Users\Admin\AppData\Local\Temp\F84A.tmp"95⤵PID:3672
-
C:\Users\Admin\AppData\Local\Temp\F935.tmp"C:\Users\Admin\AppData\Local\Temp\F935.tmp"96⤵PID:3196
-
C:\Users\Admin\AppData\Local\Temp\F9D1.tmp"C:\Users\Admin\AppData\Local\Temp\F9D1.tmp"97⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\FA4E.tmp"C:\Users\Admin\AppData\Local\Temp\FA4E.tmp"98⤵PID:3856
-
C:\Users\Admin\AppData\Local\Temp\FADB.tmp"C:\Users\Admin\AppData\Local\Temp\FADB.tmp"99⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\FB58.tmp"C:\Users\Admin\AppData\Local\Temp\FB58.tmp"100⤵PID:4116
-
C:\Users\Admin\AppData\Local\Temp\FBC5.tmp"C:\Users\Admin\AppData\Local\Temp\FBC5.tmp"101⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\FC52.tmp"C:\Users\Admin\AppData\Local\Temp\FC52.tmp"102⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\FCDE.tmp"C:\Users\Admin\AppData\Local\Temp\FCDE.tmp"103⤵PID:368
-
C:\Users\Admin\AppData\Local\Temp\FD4C.tmp"C:\Users\Admin\AppData\Local\Temp\FD4C.tmp"104⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\FDB9.tmp"C:\Users\Admin\AppData\Local\Temp\FDB9.tmp"105⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\FE36.tmp"C:\Users\Admin\AppData\Local\Temp\FE36.tmp"106⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\FEB3.tmp"C:\Users\Admin\AppData\Local\Temp\FEB3.tmp"107⤵PID:3864
-
C:\Users\Admin\AppData\Local\Temp\FF7E.tmp"C:\Users\Admin\AppData\Local\Temp\FF7E.tmp"108⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\1A.tmp"C:\Users\Admin\AppData\Local\Temp\1A.tmp"109⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\78.tmp"C:\Users\Admin\AppData\Local\Temp\78.tmp"110⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\21E.tmp"C:\Users\Admin\AppData\Local\Temp\21E.tmp"111⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\2AB.tmp"C:\Users\Admin\AppData\Local\Temp\2AB.tmp"112⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\3A5.tmp"C:\Users\Admin\AppData\Local\Temp\3A5.tmp"113⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\460.tmp"C:\Users\Admin\AppData\Local\Temp\460.tmp"114⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\4CD.tmp"C:\Users\Admin\AppData\Local\Temp\4CD.tmp"115⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\55A.tmp"C:\Users\Admin\AppData\Local\Temp\55A.tmp"116⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\5C7.tmp"C:\Users\Admin\AppData\Local\Temp\5C7.tmp"117⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\654.tmp"C:\Users\Admin\AppData\Local\Temp\654.tmp"118⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\6F0.tmp"C:\Users\Admin\AppData\Local\Temp\6F0.tmp"119⤵PID:4020
-
C:\Users\Admin\AppData\Local\Temp\77D.tmp"C:\Users\Admin\AppData\Local\Temp\77D.tmp"120⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\819.tmp"C:\Users\Admin\AppData\Local\Temp\819.tmp"121⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\896.tmp"C:\Users\Admin\AppData\Local\Temp\896.tmp"122⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\932.tmp"C:\Users\Admin\AppData\Local\Temp\932.tmp"123⤵PID:3488
-
C:\Users\Admin\AppData\Local\Temp\9BF.tmp"C:\Users\Admin\AppData\Local\Temp\9BF.tmp"124⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\A2C.tmp"C:\Users\Admin\AppData\Local\Temp\A2C.tmp"125⤵PID:3416
-
C:\Users\Admin\AppData\Local\Temp\AA9.tmp"C:\Users\Admin\AppData\Local\Temp\AA9.tmp"126⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\B55.tmp"C:\Users\Admin\AppData\Local\Temp\B55.tmp"127⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\BC3.tmp"C:\Users\Admin\AppData\Local\Temp\BC3.tmp"128⤵PID:4156
-
C:\Users\Admin\AppData\Local\Temp\C5F.tmp"C:\Users\Admin\AppData\Local\Temp\C5F.tmp"129⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\DC6.tmp"C:\Users\Admin\AppData\Local\Temp\DC6.tmp"130⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\E34.tmp"C:\Users\Admin\AppData\Local\Temp\E34.tmp"131⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\EEF.tmp"C:\Users\Admin\AppData\Local\Temp\EEF.tmp"132⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\F5D.tmp"C:\Users\Admin\AppData\Local\Temp\F5D.tmp"133⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\1141.tmp"C:\Users\Admin\AppData\Local\Temp\1141.tmp"134⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\11DD.tmp"C:\Users\Admin\AppData\Local\Temp\11DD.tmp"135⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\12A8.tmp"C:\Users\Admin\AppData\Local\Temp\12A8.tmp"136⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\1316.tmp"C:\Users\Admin\AppData\Local\Temp\1316.tmp"137⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\13E1.tmp"C:\Users\Admin\AppData\Local\Temp\13E1.tmp"138⤵PID:3616
-
C:\Users\Admin\AppData\Local\Temp\144E.tmp"C:\Users\Admin\AppData\Local\Temp\144E.tmp"139⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\14CB.tmp"C:\Users\Admin\AppData\Local\Temp\14CB.tmp"140⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\1681.tmp"C:\Users\Admin\AppData\Local\Temp\1681.tmp"141⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\17E8.tmp"C:\Users\Admin\AppData\Local\Temp\17E8.tmp"142⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\1875.tmp"C:\Users\Admin\AppData\Local\Temp\1875.tmp"143⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\18E2.tmp"C:\Users\Admin\AppData\Local\Temp\18E2.tmp"144⤵PID:3236
-
C:\Users\Admin\AppData\Local\Temp\1B43.tmp"C:\Users\Admin\AppData\Local\Temp\1B43.tmp"145⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\1BB1.tmp"C:\Users\Admin\AppData\Local\Temp\1BB1.tmp"146⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\1C2E.tmp"C:\Users\Admin\AppData\Local\Temp\1C2E.tmp"147⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\1CAB.tmp"C:\Users\Admin\AppData\Local\Temp\1CAB.tmp"148⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\1D57.tmp"C:\Users\Admin\AppData\Local\Temp\1D57.tmp"149⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\1DD4.tmp"C:\Users\Admin\AppData\Local\Temp\1DD4.tmp"150⤵PID:3464
-
C:\Users\Admin\AppData\Local\Temp\1E31.tmp"C:\Users\Admin\AppData\Local\Temp\1E31.tmp"151⤵PID:648
-
C:\Users\Admin\AppData\Local\Temp\1E8F.tmp"C:\Users\Admin\AppData\Local\Temp\1E8F.tmp"152⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\1F2B.tmp"C:\Users\Admin\AppData\Local\Temp\1F2B.tmp"153⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\1FC8.tmp"C:\Users\Admin\AppData\Local\Temp\1FC8.tmp"154⤵PID:3320
-
C:\Users\Admin\AppData\Local\Temp\2035.tmp"C:\Users\Admin\AppData\Local\Temp\2035.tmp"155⤵PID:3108
-
C:\Users\Admin\AppData\Local\Temp\20A2.tmp"C:\Users\Admin\AppData\Local\Temp\20A2.tmp"156⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\2110.tmp"C:\Users\Admin\AppData\Local\Temp\2110.tmp"157⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\218D.tmp"C:\Users\Admin\AppData\Local\Temp\218D.tmp"158⤵PID:4600
-
C:\Users\Admin\AppData\Local\Temp\21FA.tmp"C:\Users\Admin\AppData\Local\Temp\21FA.tmp"159⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\2258.tmp"C:\Users\Admin\AppData\Local\Temp\2258.tmp"160⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\22D5.tmp"C:\Users\Admin\AppData\Local\Temp\22D5.tmp"161⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\2381.tmp"C:\Users\Admin\AppData\Local\Temp\2381.tmp"162⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\23DF.tmp"C:\Users\Admin\AppData\Local\Temp\23DF.tmp"163⤵PID:3160
-
C:\Users\Admin\AppData\Local\Temp\244C.tmp"C:\Users\Admin\AppData\Local\Temp\244C.tmp"164⤵PID:3344
-
C:\Users\Admin\AppData\Local\Temp\24C9.tmp"C:\Users\Admin\AppData\Local\Temp\24C9.tmp"165⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\2536.tmp"C:\Users\Admin\AppData\Local\Temp\2536.tmp"166⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\25F2.tmp"C:\Users\Admin\AppData\Local\Temp\25F2.tmp"167⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\265F.tmp"C:\Users\Admin\AppData\Local\Temp\265F.tmp"168⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\26CD.tmp"C:\Users\Admin\AppData\Local\Temp\26CD.tmp"169⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\2769.tmp"C:\Users\Admin\AppData\Local\Temp\2769.tmp"170⤵PID:3588
-
C:\Users\Admin\AppData\Local\Temp\27E6.tmp"C:\Users\Admin\AppData\Local\Temp\27E6.tmp"171⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\2853.tmp"C:\Users\Admin\AppData\Local\Temp\2853.tmp"172⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\28E0.tmp"C:\Users\Admin\AppData\Local\Temp\28E0.tmp"173⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\294D.tmp"C:\Users\Admin\AppData\Local\Temp\294D.tmp"174⤵PID:5052
-
C:\Users\Admin\AppData\Local\Temp\29DA.tmp"C:\Users\Admin\AppData\Local\Temp\29DA.tmp"175⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\2A66.tmp"C:\Users\Admin\AppData\Local\Temp\2A66.tmp"176⤵PID:988
-
C:\Users\Admin\AppData\Local\Temp\2AE3.tmp"C:\Users\Admin\AppData\Local\Temp\2AE3.tmp"177⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\2B70.tmp"C:\Users\Admin\AppData\Local\Temp\2B70.tmp"178⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\2BDD.tmp"C:\Users\Admin\AppData\Local\Temp\2BDD.tmp"179⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\2C5A.tmp"C:\Users\Admin\AppData\Local\Temp\2C5A.tmp"180⤵PID:1340
-
C:\Users\Admin\AppData\Local\Temp\2D35.tmp"C:\Users\Admin\AppData\Local\Temp\2D35.tmp"181⤵PID:4288
-
C:\Users\Admin\AppData\Local\Temp\2DA3.tmp"C:\Users\Admin\AppData\Local\Temp\2DA3.tmp"182⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\2E10.tmp"C:\Users\Admin\AppData\Local\Temp\2E10.tmp"183⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\2E7D.tmp"C:\Users\Admin\AppData\Local\Temp\2E7D.tmp"184⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\2F29.tmp"C:\Users\Admin\AppData\Local\Temp\2F29.tmp"185⤵PID:748
-
C:\Users\Admin\AppData\Local\Temp\2F97.tmp"C:\Users\Admin\AppData\Local\Temp\2F97.tmp"186⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\3004.tmp"C:\Users\Admin\AppData\Local\Temp\3004.tmp"187⤵PID:792
-
C:\Users\Admin\AppData\Local\Temp\3091.tmp"C:\Users\Admin\AppData\Local\Temp\3091.tmp"188⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\311D.tmp"C:\Users\Admin\AppData\Local\Temp\311D.tmp"189⤵PID:3692
-
C:\Users\Admin\AppData\Local\Temp\318B.tmp"C:\Users\Admin\AppData\Local\Temp\318B.tmp"190⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\3217.tmp"C:\Users\Admin\AppData\Local\Temp\3217.tmp"191⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\32A4.tmp"C:\Users\Admin\AppData\Local\Temp\32A4.tmp"192⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\3311.tmp"C:\Users\Admin\AppData\Local\Temp\3311.tmp"193⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\33AD.tmp"C:\Users\Admin\AppData\Local\Temp\33AD.tmp"194⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\343A.tmp"C:\Users\Admin\AppData\Local\Temp\343A.tmp"195⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\34B7.tmp"C:\Users\Admin\AppData\Local\Temp\34B7.tmp"196⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\3534.tmp"C:\Users\Admin\AppData\Local\Temp\3534.tmp"197⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\35E0.tmp"C:\Users\Admin\AppData\Local\Temp\35E0.tmp"198⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\365D.tmp"C:\Users\Admin\AppData\Local\Temp\365D.tmp"199⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\36F9.tmp"C:\Users\Admin\AppData\Local\Temp\36F9.tmp"200⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\3795.tmp"C:\Users\Admin\AppData\Local\Temp\3795.tmp"201⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\3832.tmp"C:\Users\Admin\AppData\Local\Temp\3832.tmp"202⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\38BE.tmp"C:\Users\Admin\AppData\Local\Temp\38BE.tmp"203⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\393B.tmp"C:\Users\Admin\AppData\Local\Temp\393B.tmp"204⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\39D8.tmp"C:\Users\Admin\AppData\Local\Temp\39D8.tmp"205⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\3A55.tmp"C:\Users\Admin\AppData\Local\Temp\3A55.tmp"206⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\3AD2.tmp"C:\Users\Admin\AppData\Local\Temp\3AD2.tmp"207⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\3B3F.tmp"C:\Users\Admin\AppData\Local\Temp\3B3F.tmp"208⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\3BAC.tmp"C:\Users\Admin\AppData\Local\Temp\3BAC.tmp"209⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\3C49.tmp"C:\Users\Admin\AppData\Local\Temp\3C49.tmp"210⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\3CE5.tmp"C:\Users\Admin\AppData\Local\Temp\3CE5.tmp"211⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\3D71.tmp"C:\Users\Admin\AppData\Local\Temp\3D71.tmp"212⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\3E0E.tmp"C:\Users\Admin\AppData\Local\Temp\3E0E.tmp"213⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\3E8B.tmp"C:\Users\Admin\AppData\Local\Temp\3E8B.tmp"214⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\3F08.tmp"C:\Users\Admin\AppData\Local\Temp\3F08.tmp"215⤵PID:4144
-
C:\Users\Admin\AppData\Local\Temp\3F75.tmp"C:\Users\Admin\AppData\Local\Temp\3F75.tmp"216⤵PID:4136
-
C:\Users\Admin\AppData\Local\Temp\3FE2.tmp"C:\Users\Admin\AppData\Local\Temp\3FE2.tmp"217⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\405F.tmp"C:\Users\Admin\AppData\Local\Temp\405F.tmp"218⤵PID:4308
-
C:\Users\Admin\AppData\Local\Temp\40CD.tmp"C:\Users\Admin\AppData\Local\Temp\40CD.tmp"219⤵PID:376
-
C:\Users\Admin\AppData\Local\Temp\413A.tmp"C:\Users\Admin\AppData\Local\Temp\413A.tmp"220⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\41B7.tmp"C:\Users\Admin\AppData\Local\Temp\41B7.tmp"221⤵PID:3608
-
C:\Users\Admin\AppData\Local\Temp\4253.tmp"C:\Users\Admin\AppData\Local\Temp\4253.tmp"222⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\42C1.tmp"C:\Users\Admin\AppData\Local\Temp\42C1.tmp"223⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\433E.tmp"C:\Users\Admin\AppData\Local\Temp\433E.tmp"224⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\43CA.tmp"C:\Users\Admin\AppData\Local\Temp\43CA.tmp"225⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\4486.tmp"C:\Users\Admin\AppData\Local\Temp\4486.tmp"226⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\44F3.tmp"C:\Users\Admin\AppData\Local\Temp\44F3.tmp"227⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\4561.tmp"C:\Users\Admin\AppData\Local\Temp\4561.tmp"228⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\45CE.tmp"C:\Users\Admin\AppData\Local\Temp\45CE.tmp"229⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\467A.tmp"C:\Users\Admin\AppData\Local\Temp\467A.tmp"230⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\46F7.tmp"C:\Users\Admin\AppData\Local\Temp\46F7.tmp"231⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\4764.tmp"C:\Users\Admin\AppData\Local\Temp\4764.tmp"232⤵PID:4288
-
C:\Users\Admin\AppData\Local\Temp\47F1.tmp"C:\Users\Admin\AppData\Local\Temp\47F1.tmp"233⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\487E.tmp"C:\Users\Admin\AppData\Local\Temp\487E.tmp"234⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\490A.tmp"C:\Users\Admin\AppData\Local\Temp\490A.tmp"235⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\4997.tmp"C:\Users\Admin\AppData\Local\Temp\4997.tmp"236⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\4A23.tmp"C:\Users\Admin\AppData\Local\Temp\4A23.tmp"237⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\4AC0.tmp"C:\Users\Admin\AppData\Local\Temp\4AC0.tmp"238⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\4B4C.tmp"C:\Users\Admin\AppData\Local\Temp\4B4C.tmp"239⤵PID:492
-
C:\Users\Admin\AppData\Local\Temp\4BD9.tmp"C:\Users\Admin\AppData\Local\Temp\4BD9.tmp"240⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\4C46.tmp"C:\Users\Admin\AppData\Local\Temp\4C46.tmp"241⤵PID:2932
-