Analysis
-
max time kernel
948s -
max time network
908s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
11-05-2024 06:19
Static task
static1
Behavioral task
behavioral1
Sample
recroom doxes.exe
Resource
win11-20240426-en
General
-
Target
recroom doxes.exe
-
Size
10KB
-
MD5
b2d64d7351a733c044c35df29e128b8f
-
SHA1
dbea99efefe266261bff99208c07336a2ff1e92a
-
SHA256
2f435d8698369f6d6cf9cb68fda56fd61cf266c0df911f4a634d701dd0a40ca6
-
SHA512
5f09b1ff9028983a88fbefdb462ac4811303e277016efb7fa21b7ae3b9fd083011dc2a7cf06ee9233d7e009ce4b2ed4448ebedff701dbebbbf6662473c8f5231
-
SSDEEP
96:NKMPnZ4eNF/pedzDv99S+6xxX5ZQMdeMvqnr4lmjOCq+f/fXa6LG2sVzcPlDLzNt:s4hfpedzb9EPxXnrunHHsVz2DN
Malware Config
Extracted
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]
wannacry
13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Drops file in Drivers directory 2 IoCs
Processes:
Procmon64.exedescription ioc process File created C:\Windows\system32\Drivers\PROCMON23.SYS Procmon64.exe File opened for modification C:\Windows\system32\Drivers\PROCMON23.SYS Procmon64.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
Procmon64.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\PROCMON23\ImagePath = "\\??\\C:\\Windows\\system32\\Drivers\\PROCMON23.SYS" Procmon64.exe -
Drops startup file 2 IoCs
Processes:
wcry.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\~SD119E.tmp wcry.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\~SD11A5.tmp wcry.exe -
Executes dropped EXE 64 IoCs
Processes:
taskdl.exe@[email protected]@[email protected]@[email protected]taskhsvc.exe@[email protected]@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exe@[email protected]taskse.exetaskdl.exetaskse.exe@[email protected]taskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exeProcmon64.exetaskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exetaskse.exe@[email protected]taskdl.exepid process 2672 taskdl.exe 2816 @[email protected] 2436 @[email protected] 3392 @[email protected] 1724 taskhsvc.exe 3808 @[email protected] 3380 @[email protected] 4352 taskdl.exe 3336 taskse.exe 3356 @[email protected] 896 taskdl.exe 2612 @[email protected] 4916 taskse.exe 1148 taskdl.exe 1016 taskse.exe 1180 @[email protected] 2616 taskse.exe 4008 @[email protected] 1716 taskdl.exe 4444 taskse.exe 960 @[email protected] 4360 taskdl.exe 1984 taskse.exe 3492 @[email protected] 4268 taskdl.exe 1932 taskse.exe 3392 @[email protected] 4604 taskdl.exe 2140 taskse.exe 2592 @[email protected] 1432 taskdl.exe 4156 taskse.exe 780 @[email protected] 4032 taskdl.exe 4956 taskse.exe 4416 @[email protected] 3012 taskdl.exe 2180 Procmon64.exe 4020 taskse.exe 3080 @[email protected] 5084 taskdl.exe 1048 taskse.exe 3492 @[email protected] 1812 taskdl.exe 1588 taskse.exe 1704 @[email protected] 2352 taskdl.exe 3892 taskse.exe 1508 @[email protected] 5136 taskdl.exe 5468 taskse.exe 4424 @[email protected] 5416 taskdl.exe 59032 59068 39436 34744 35964 52020 58364 33192 53064 42336 60292 -
Loads dropped DLL 6 IoCs
Processes:
taskhsvc.exepid process 1724 taskhsvc.exe 1724 taskhsvc.exe 1724 taskhsvc.exe 1724 taskhsvc.exe 1724 taskhsvc.exe 1724 taskhsvc.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/1652-3483-0x0000000000E50000-0x00000000010C8000-memory.dmp upx behavioral1/memory/1652-3560-0x0000000000E50000-0x00000000010C8000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\kiqhvmgs156 = "\"C:\\Users\\Admin\\Downloads\\Computer-Virus-master\\Computer-Virus-master\\WannaCry\\EternalBlue\\sources\\tasksche.exe\"" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
-
Sets desktop wallpaper using registry 2 TTPs 4 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Downloads\\Computer-Virus-master\\Computer-Virus-master\\WannaCry\\BlueSpider\\sources\\1.jpg" BlueSpider.exe Set value (str) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" @[email protected] Set value (str) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" wcry.exe Set value (str) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" @[email protected] -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 15 IoCs
Processes:
msedge.exemsedge.exemsedge.exemsedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 64 IoCs
Processes:
BlueSpider.exeProcmon64.exemsedge.exeProcmon.exemsedge.exeMiniSearchHost.exemsedge.exemsedge.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\e\Shell BlueSpider.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\e\DefaultIcon BlueSpider.exe Key created \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\.PML Procmon64.exe Set value (int) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\18\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByDirection = "1" Procmon64.exe Key created \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\19 Procmon64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\e\Shell\Open\Command\ = "\"C:\\Users\\Admin\\Downloads\\Computer-Virus-master\\Computer-Virus-master\\WannaCry\\BlueSpider\\sources\\BlueSpider.exe\" \"%1\"" BlueSpider.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Procmon64.exe Set value (int) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\18\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:PID = "0" Procmon64.exe Set value (data) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202020202020202020202020202020202 Procmon64.exe Set value (int) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\19\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Mode = "4" Procmon64.exe Set value (int) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\19\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:PID = "0" Procmon64.exe Key created \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings msedge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202020202020202020202020202020202 Procmon64.exe Set value (data) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0000000001000000ffffffff Procmon64.exe Set value (int) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\18\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\LogicalViewMode = "1" Procmon64.exe Set value (int) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\18\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\IconSize = "16" Procmon64.exe Set value (int) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\18\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1" Procmon64.exe Key created \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0 Procmon64.exe Set value (int) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\19\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\LogicalViewMode = "1" Procmon64.exe Key created \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Procmon64.exe Key created \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Procmon64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\e\Shell\Open\Command BlueSpider.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.e BlueSpider.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Procmon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\ProcMon.Logfile.1\DefaultIcon\ = "\"C:\\Users\\Admin\\Downloads\\Computer-Virus-master\\Computer-Virus-master\\panda\\sources\\Procmon.exe\",0" Procmon64.exe Set value (int) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\NodeSlot = "18" Procmon64.exe Set value (int) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\19\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\IconSize = "16" Procmon64.exe Set value (int) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\19\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1" Procmon64.exe Set value (int) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\19\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupView = "0" Procmon64.exe Set value (int) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\19\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByDirection = "1" Procmon64.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3938118698-2964058152-2337880935-1000\{D5CF4779-6110-4E6E-B217-9B7D2105F62B} msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\e BlueSpider.exe Key created \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\ProcMon.Logfile.1\shell Procmon64.exe Set value (str) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\18\Shell\SniffedFolderType = "Documents" Procmon64.exe Key created \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\18\ComDlg Procmon64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.e\ = "e" BlueSpider.exe Set value (str) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\.PML\ = "ProcMon.Logfile.1" Procmon64.exe Set value (int) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0\NodeSlot = "19" Procmon64.exe Set value (int) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\19\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1092616257" Procmon64.exe Set value (str) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\19\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Procmon64.exe Key created \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3938118698-2964058152-2337880935-1000\{65B4926B-9584-4368-9E91-F826556B3214} msedge.exe Key created \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\ProcMon.Logfile.1 Procmon64.exe Set value (data) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 0100000000000000ffffffff Procmon64.exe Set value (int) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\18\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1092616257" Procmon64.exe Set value (int) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\18\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupView = "0" Procmon64.exe Set value (data) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\MRUListEx = 00000000ffffffff Procmon64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\e\EditFlags = "2" BlueSpider.exe Set value (data) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0 = 6c00310000000000ab580e3310004f4e454e4f547e310000540009000400efbe9a588a79ab580e332e000000489f02000000010000000000000000000000000000006f981f014f006e0065004e006f007400650020004e006f007400650062006f006f006b007300000018000000 Procmon64.exe Key created \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings msedge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\e\ BlueSpider.exe Set value (data) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1 = 14002e80922b16d365937a46956b92703aca08af0000 Procmon64.exe Set value (data) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\MRUListEx = ffffffff Procmon64.exe Set value (int) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\18\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Mode = "4" Procmon64.exe Key created \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\19\ComDlg Procmon64.exe Key created \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\ProcMon.Logfile.1\DefaultIcon Procmon64.exe Key created \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Procmon64.exe Set value (data) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202020202020202020202020202020202 Procmon64.exe Key created \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Procmon64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\e\Shell\Open BlueSpider.exe Key created \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\ProcMon.Logfile.1\shell\open\command Procmon64.exe Key created \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell Procmon64.exe Set value (data) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\18\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Procmon64.exe Set value (data) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\18\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Procmon64.exe -
Modifies registry key 1 TTPs 1 IoCs
-
NTFS ADS 2 IoCs
Processes:
msedge.exemsedge.exedescription ioc process File opened for modification C:\Users\Admin\Downloads\Computer-Virus-master.zip:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\CuteVirusCollection-master.zip:Zone.Identifier msedge.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
Processes:
msedge.exemsedge.exemsedge.exemsedge.exeidentity_helper.exemsedge.exemsedge.exetaskhsvc.exemsedge.exemsedge.exeidentity_helper.exemsedge.exemsedge.exemsedge.exemsedge.exemsedge.exeidentity_helper.exemsedge.exemsedge.exemsedge.exemsedge.exemsedge.exepid process 2660 msedge.exe 2660 msedge.exe 1160 msedge.exe 1160 msedge.exe 1164 msedge.exe 1164 msedge.exe 1808 msedge.exe 1808 msedge.exe 4860 identity_helper.exe 4860 identity_helper.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 32 msedge.exe 32 msedge.exe 1724 taskhsvc.exe 1724 taskhsvc.exe 1724 taskhsvc.exe 1724 taskhsvc.exe 1724 taskhsvc.exe 1724 taskhsvc.exe 776 msedge.exe 776 msedge.exe 2336 msedge.exe 2336 msedge.exe 2944 identity_helper.exe 2944 identity_helper.exe 1344 msedge.exe 1344 msedge.exe 4784 msedge.exe 4784 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 2864 msedge.exe 2864 msedge.exe 5080 msedge.exe 5080 msedge.exe 2380 identity_helper.exe 2380 identity_helper.exe 2592 msedge.exe 2592 msedge.exe 1416 msedge.exe 1416 msedge.exe 2892 msedge.exe 2892 msedge.exe 5680 msedge.exe 5680 msedge.exe 5348 msedge.exe 5348 msedge.exe 51060 51060 55096 55096 53728 53728 58996 58996 -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
@[email protected]Procmon64.exepid process 2816 @[email protected] 2180 Procmon64.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
Procmon64.exepid process 2180 Procmon64.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 51 IoCs
Processes:
msedge.exemsedge.exemsedge.exemsedge.exepid process 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 55096 55096 55096 55096 -
Suspicious use of AdjustPrivilegeToken 50 IoCs
Processes:
AUDIODG.EXEtaskse.exetaskse.exetaskse.exetaskse.exetaskse.exetaskse.exetaskse.exetaskse.exetaskse.exetaskse.exeProcmon64.exetaskse.exetaskse.exetaskse.exetaskse.exetaskse.exedescription pid process Token: 33 4496 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4496 AUDIODG.EXE Token: SeTcbPrivilege 3336 taskse.exe Token: SeTcbPrivilege 3336 taskse.exe Token: SeTcbPrivilege 4916 taskse.exe Token: SeTcbPrivilege 4916 taskse.exe Token: SeTcbPrivilege 1016 taskse.exe Token: SeTcbPrivilege 1016 taskse.exe Token: SeTcbPrivilege 2616 taskse.exe Token: SeTcbPrivilege 2616 taskse.exe Token: SeTcbPrivilege 4444 taskse.exe Token: SeTcbPrivilege 4444 taskse.exe Token: SeTcbPrivilege 1984 taskse.exe Token: SeTcbPrivilege 1984 taskse.exe Token: SeTcbPrivilege 1932 taskse.exe Token: SeTcbPrivilege 1932 taskse.exe Token: SeTcbPrivilege 2140 taskse.exe Token: SeTcbPrivilege 2140 taskse.exe Token: SeTcbPrivilege 4156 taskse.exe Token: SeTcbPrivilege 4156 taskse.exe Token: SeTcbPrivilege 4956 taskse.exe Token: SeTcbPrivilege 4956 taskse.exe Token: SeDebugPrivilege 2180 Procmon64.exe Token: SeLoadDriverPrivilege 2180 Procmon64.exe Token: SeTcbPrivilege 4020 taskse.exe Token: SeTcbPrivilege 4020 taskse.exe Token: SeTcbPrivilege 1048 taskse.exe Token: SeTcbPrivilege 1048 taskse.exe Token: SeTcbPrivilege 1588 taskse.exe Token: SeTcbPrivilege 1588 taskse.exe Token: SeTcbPrivilege 3892 taskse.exe Token: SeTcbPrivilege 3892 taskse.exe Token: SeTcbPrivilege 5468 taskse.exe Token: SeTcbPrivilege 5468 taskse.exe Token: SeTcbPrivilege 59032 Token: SeTcbPrivilege 59032 Token: SeTcbPrivilege 34744 Token: SeTcbPrivilege 34744 Token: SeTcbPrivilege 58364 Token: SeTcbPrivilege 58364 Token: SeTcbPrivilege 42336 Token: SeTcbPrivilege 42336 Token: SeTcbPrivilege 58824 Token: SeTcbPrivilege 58824 Token: SeTcbPrivilege 41340 Token: SeTcbPrivilege 41340 Token: SeTcbPrivilege 38944 Token: SeTcbPrivilege 38944 Token: SeTcbPrivilege 50748 Token: SeTcbPrivilege 50748 -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
msedge.exemsedge.exepid process 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
msedge.exemsedge.exeProcmon64.exemsedge.exemsedge.exepid process 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2180 Procmon64.exe 2180 Procmon64.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 55096 55096 55096 55096 55096 55096 -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
BlueSpider.exeBlueSpider.exeBlueSpider.exeBlueSpider.exeBlueSpider.exeBlueSpider.exeBlueSpider.exe@[email protected]@[email protected]@[email protected]@[email protected]@[email protected]@[email protected]BlueSpider.exeBlueSpider.exeBlueSpider.exeBlueSpider.exeBlueSpider.exeBlueSpider.exeBlueSpider.exeBlueSpider.exeBlueSpider.exeBlueSpider.exeBlueSpider.exeBlueSpider.exe@[email protected]BlueSpider.exeBlueSpider.exeBlueSpider.exeBlueSpider.exeBlueSpider.exeMiniSearchHost.exe@[email protected]@[email protected]BlueSpider.exe@[email protected]@[email protected]@[email protected]pid process 2852 BlueSpider.exe 2852 BlueSpider.exe 4484 BlueSpider.exe 4484 BlueSpider.exe 1872 BlueSpider.exe 1872 BlueSpider.exe 4752 BlueSpider.exe 4752 BlueSpider.exe 2816 BlueSpider.exe 2816 BlueSpider.exe 4800 BlueSpider.exe 4800 BlueSpider.exe 4964 BlueSpider.exe 4964 BlueSpider.exe 2816 @[email protected] 2816 @[email protected] 2436 @[email protected] 3392 @[email protected] 3808 @[email protected] 3380 @[email protected] 3356 @[email protected] 4360 BlueSpider.exe 4360 BlueSpider.exe 2016 BlueSpider.exe 2016 BlueSpider.exe 4160 BlueSpider.exe 4160 BlueSpider.exe 2940 BlueSpider.exe 2940 BlueSpider.exe 4220 BlueSpider.exe 4220 BlueSpider.exe 3292 BlueSpider.exe 3292 BlueSpider.exe 4272 BlueSpider.exe 4272 BlueSpider.exe 4012 BlueSpider.exe 4012 BlueSpider.exe 4448 BlueSpider.exe 4448 BlueSpider.exe 1776 BlueSpider.exe 1776 BlueSpider.exe 1560 BlueSpider.exe 1560 BlueSpider.exe 132 BlueSpider.exe 132 BlueSpider.exe 2612 @[email protected] 5080 BlueSpider.exe 5080 BlueSpider.exe 444 BlueSpider.exe 444 BlueSpider.exe 2556 BlueSpider.exe 2556 BlueSpider.exe 712 BlueSpider.exe 712 BlueSpider.exe 3380 BlueSpider.exe 3380 BlueSpider.exe 2396 MiniSearchHost.exe 1180 @[email protected] 4008 @[email protected] 4400 BlueSpider.exe 4400 BlueSpider.exe 960 @[email protected] 3492 @[email protected] 3392 @[email protected] -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2660 wrote to memory of 5096 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 5096 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 3152 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 1160 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 1160 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 2156 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 2156 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 2156 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 2156 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 2156 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 2156 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 2156 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 2156 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 2156 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 2156 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 2156 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 2156 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 2156 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 2156 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 2156 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 2156 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 2156 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 2156 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 2156 2660 msedge.exe msedge.exe PID 2660 wrote to memory of 2156 2660 msedge.exe msedge.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 3716 attrib.exe 2824 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\recroom doxes.exe"C:\Users\Admin\AppData\Local\Temp\recroom doxes.exe"1⤵PID:444
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa00a63cb8,0x7ffa00a63cc8,0x7ffa00a63cd82⤵PID:5096
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1708,3745523927296177695,15340885028036041634,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1912 /prefetch:22⤵PID:3152
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1708,3745523927296177695,15340885028036041634,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1160 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1708,3745523927296177695,15340885028036041634,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2560 /prefetch:82⤵PID:2156
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,3745523927296177695,15340885028036041634,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2336
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,3745523927296177695,15340885028036041634,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2056
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,3745523927296177695,15340885028036041634,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:4236
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,3745523927296177695,15340885028036041634,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:2320
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1708,3745523927296177695,15340885028036041634,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4728 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1164 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,3745523927296177695,15340885028036041634,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:3092
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,3745523927296177695,15340885028036041634,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:2904
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1708,3745523927296177695,15340885028036041634,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5272 /prefetch:82⤵PID:2944
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1708,3745523927296177695,15340885028036041634,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=3600 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1808 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,3745523927296177695,15340885028036041634,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:792
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,3745523927296177695,15340885028036041634,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:2816
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,3745523927296177695,15340885028036041634,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:12⤵PID:3720
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1708,3745523927296177695,15340885028036041634,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3628 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4860 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,3745523927296177695,15340885028036041634,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:1960
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,3745523927296177695,15340885028036041634,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:4808
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,3745523927296177695,15340885028036041634,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4620 /prefetch:12⤵PID:2104
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,3745523927296177695,15340885028036041634,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:4032
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1708,3745523927296177695,15340885028036041634,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5204 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4744 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,3745523927296177695,15340885028036041634,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6276 /prefetch:12⤵PID:3092
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1708,3745523927296177695,15340885028036041634,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6340 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:32 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,3745523927296177695,15340885028036041634,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:12⤵PID:1908
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1708,3745523927296177695,15340885028036041634,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6572 /prefetch:12⤵PID:1792
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1344
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2200
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2396
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exe"C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exe"1⤵
- Sets desktop wallpaper using registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2852 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exeC:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:4484 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exeC:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:1872 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exeC:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exe4⤵
- Suspicious use of SetWindowsHookEx
PID:4752 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exeC:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exe5⤵
- Suspicious use of SetWindowsHookEx
PID:2816 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exeC:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exe6⤵
- Suspicious use of SetWindowsHookEx
PID:4800 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exeC:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exe7⤵
- Suspicious use of SetWindowsHookEx
PID:4964 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exeC:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exe8⤵
- Suspicious use of SetWindowsHookEx
PID:4360 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exeC:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exe9⤵
- Suspicious use of SetWindowsHookEx
PID:2016 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exeC:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exe10⤵
- Suspicious use of SetWindowsHookEx
PID:4160 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exeC:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exe11⤵
- Suspicious use of SetWindowsHookEx
PID:2940 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exeC:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exe12⤵
- Suspicious use of SetWindowsHookEx
PID:4220 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exeC:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exe13⤵
- Suspicious use of SetWindowsHookEx
PID:3292 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exeC:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exe14⤵
- Suspicious use of SetWindowsHookEx
PID:4272 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exeC:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exe15⤵
- Suspicious use of SetWindowsHookEx
PID:4012 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exeC:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exe16⤵
- Suspicious use of SetWindowsHookEx
PID:4448 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exeC:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exe17⤵
- Suspicious use of SetWindowsHookEx
PID:1776 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exeC:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exe18⤵
- Suspicious use of SetWindowsHookEx
PID:1560 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exeC:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exe19⤵
- Suspicious use of SetWindowsHookEx
PID:132 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exeC:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exe20⤵
- Suspicious use of SetWindowsHookEx
PID:5080 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exeC:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exe21⤵
- Suspicious use of SetWindowsHookEx
PID:444 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exeC:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exe22⤵
- Suspicious use of SetWindowsHookEx
PID:2556 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exeC:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exe23⤵
- Suspicious use of SetWindowsHookEx
PID:712 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exeC:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exe24⤵
- Suspicious use of SetWindowsHookEx
PID:3380 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exeC:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exe25⤵
- Suspicious use of SetWindowsHookEx
PID:4400 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exeC:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exe26⤵PID:2140
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exeC:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exe27⤵PID:2828
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exeC:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\BlueSpider\sources\BlueSpider.exe28⤵PID:4044
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004D4 0x00000000000004D01⤵
- Suspicious use of AdjustPrivilegeToken
PID:4496
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\wcry.exe"C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\wcry.exe"1⤵
- Drops startup file
- Sets desktop wallpaper using registry
PID:3992 -
C:\Windows\SysWOW64\attrib.exeattrib +h .2⤵
- Views/modifies file attributes
PID:3716 -
C:\Windows\SysWOW64\icacls.exeicacls . /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:3036 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:2672 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 27131715408663.bat2⤵PID:1908
-
C:\Windows\SysWOW64\cscript.execscript.exe //nologo m.vbs3⤵PID:408
-
C:\Windows\SysWOW64\attrib.exeattrib +h +s F:\$RECYCLE2⤵
- Views/modifies file attributes
PID:2824 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]PID:2436
-
C:\Windows\SysWOW64\cmd.exePID:5116
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]PID:3392
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:4352 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\taskse.exetaskse.exe C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3336 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]PID:3356
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "kiqhvmgs156" /t REG_SZ /d "\"C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\tasksche.exe\"" /f2⤵PID:4236
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "kiqhvmgs156" /t REG_SZ /d "\"C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\tasksche.exe\"" /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:2284 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:896 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\taskse.exetaskse.exe C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4916 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]PID:2612
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:1148 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\taskse.exetaskse.exe C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1016 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]PID:1180
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\taskse.exetaskse.exe C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2616 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]PID:4008
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:1716 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\taskse.exetaskse.exe C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4444 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]PID:960
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:4360 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\taskse.exetaskse.exe C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1984 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]PID:3492
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:4268 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\taskse.exetaskse.exe C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1932 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]PID:3392
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:4604 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\taskse.exetaskse.exe C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2140 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]PID:2592
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:1432 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\taskse.exetaskse.exe C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4156 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]PID:780
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:4032 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\taskse.exetaskse.exe C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4956 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]PID:4416
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:3012 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\taskse.exetaskse.exe C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4020 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]PID:3080
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:5084 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\taskse.exetaskse.exe C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1048 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]PID:3492
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:1812 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\taskse.exetaskse.exe C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1588 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]PID:1704
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:2352 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\taskse.exetaskse.exe C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3892 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]PID:1508
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:5136 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\taskse.exetaskse.exe C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5468 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]PID:4424
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:5416
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]"C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]"1⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2816 -
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\TaskData\Tor\taskhsvc.exeTaskData\Tor\taskhsvc.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1724
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]"C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3808
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]"C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3380
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2396
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2336 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa00a63cb8,0x7ffa00a63cc8,0x7ffa00a63cd82⤵PID:1756
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1864,8823012358620444074,13975374495593756449,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1944 /prefetch:22⤵PID:176
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1864,8823012358620444074,13975374495593756449,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2424 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:776 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1864,8823012358620444074,13975374495593756449,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:4424
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,8823012358620444074,13975374495593756449,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3608 /prefetch:12⤵PID:2508
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,8823012358620444074,13975374495593756449,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3644 /prefetch:12⤵PID:2384
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,8823012358620444074,13975374495593756449,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2020 /prefetch:12⤵PID:1660
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,8823012358620444074,13975374495593756449,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3984 /prefetch:12⤵PID:2424
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,8823012358620444074,13975374495593756449,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4240 /prefetch:12⤵PID:2592
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,8823012358620444074,13975374495593756449,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:12⤵PID:1652
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,8823012358620444074,13975374495593756449,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4224 /prefetch:12⤵PID:3900
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1864,8823012358620444074,13975374495593756449,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2944 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1864,8823012358620444074,13975374495593756449,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5040 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1344 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,8823012358620444074,13975374495593756449,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:1324
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1864,8823012358620444074,13975374495593756449,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5576 /prefetch:82⤵PID:1688
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1864,8823012358620444074,13975374495593756449,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5776 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4784 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,8823012358620444074,13975374495593756449,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:2304
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,8823012358620444074,13975374495593756449,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5924 /prefetch:12⤵PID:3832
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1864,8823012358620444074,13975374495593756449,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:728
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4352
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\9bb8d0067ba7472e9c977fb8aa139a20 /t 3040 /p 28161⤵PID:2492
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\panda\sources\Procmon.exe"C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\panda\sources\Procmon.exe"1⤵
- Modifies registry class
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\Procmon64.exe"C:\Users\Admin\AppData\Local\Temp\Procmon64.exe" /originalpath "C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\panda\sources\Procmon.exe"2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
PID:2180
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of SendNotifyMessage
PID:5080 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa00a63cb8,0x7ffa00a63cc8,0x7ffa00a63cd82⤵PID:2552
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,10823210822810259909,580924927561949886,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1924 /prefetch:22⤵PID:5040
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1908,10823210822810259909,580924927561949886,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2864 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1908,10823210822810259909,580924927561949886,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2608 /prefetch:82⤵PID:2672
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,10823210822810259909,580924927561949886,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:1792
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,10823210822810259909,580924927561949886,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:1464
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,10823210822810259909,580924927561949886,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:3964
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,10823210822810259909,580924927561949886,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:728
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1908,10823210822810259909,580924927561949886,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3856 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2380 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,10823210822810259909,580924927561949886,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3612 /prefetch:12⤵PID:3220
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1908,10823210822810259909,580924927561949886,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5088 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2592 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1908,10823210822810259909,580924927561949886,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5028 /prefetch:82⤵PID:1932
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1908,10823210822810259909,580924927561949886,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=4936 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1416 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,10823210822810259909,580924927561949886,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:3268
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,10823210822810259909,580924927561949886,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:4832
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,10823210822810259909,580924927561949886,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:4572
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,10823210822810259909,580924927561949886,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5956 /prefetch:12⤵PID:2204
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,10823210822810259909,580924927561949886,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:3836
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,10823210822810259909,580924927561949886,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:4360
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1908,10823210822810259909,580924927561949886,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5696 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:2892 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,10823210822810259909,580924927561949886,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6400 /prefetch:12⤵PID:4592
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,10823210822810259909,580924927561949886,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6560 /prefetch:12⤵PID:4896
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,10823210822810259909,580924927561949886,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6072 /prefetch:12⤵PID:5160
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,10823210822810259909,580924927561949886,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7052 /prefetch:12⤵PID:5168
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,10823210822810259909,580924927561949886,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6804 /prefetch:12⤵PID:5360
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,10823210822810259909,580924927561949886,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6680 /prefetch:12⤵PID:5468
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,10823210822810259909,580924927561949886,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7008 /prefetch:12⤵PID:5476
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1932
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3728
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\browser_breaker.html1⤵PID:3876
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x110,0x114,0x118,0xec,0x11c,0x7ffa00a63cb8,0x7ffa00a63cc8,0x7ffa00a63cd82⤵PID:3480
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\memory_crash.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of SendNotifyMessage
PID:5348 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x104,0x108,0x10c,0xb8,0x110,0x7ffa00a63cb8,0x7ffa00a63cc8,0x7ffa00a63cd82⤵PID:5380
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,5894693162391892371,7408269600824971532,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1924 /prefetch:22⤵PID:5672
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1896,5894693162391892371,7408269600824971532,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5680 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1896,5894693162391892371,7408269600824971532,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2564 /prefetch:82⤵PID:1372
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,5894693162391892371,7408269600824971532,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:444
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,5894693162391892371,7408269600824971532,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1936
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,5894693162391892371,7408269600824971532,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:780
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5780
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5820
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\unclosable.html1⤵PID:6048
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa00a63cb8,0x7ffa00a63cc8,0x7ffa00a63cd82⤵PID:6052
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\folder_flooder.bat" "1⤵PID:2364
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\prank_master.vbs"1⤵PID:2268
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat" "1⤵PID:5808
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""2⤵PID:6024
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""3⤵PID:5936
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""4⤵PID:2204
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""5⤵PID:5308
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""6⤵PID:5864
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:5480
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:9808
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:9816
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:3824
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:6340
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:7360
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:11352
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:11360
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:7380
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:11408
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:13132
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:15036
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:15044
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:13140
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:11416
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:14036
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:14048
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:6356
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:9536
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:9552
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:14132
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:15112
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""6⤵PID:5848
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:564
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:9392
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:9400
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:11252
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:11260
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:13796
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:14840
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:14848
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:13804
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:5284
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:11184
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:11192
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""5⤵PID:5312
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""6⤵PID:868
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:5684
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:2176
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:7572
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:7580
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:10408
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:10416
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:3840
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:9956
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:13316
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:13332
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:9964
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:15208
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:15216
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:3120
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:6456
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:10308
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:10976
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:6464
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:10316
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:11800
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:13120
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:13996
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:11812
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:10328
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""6⤵PID:4920
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:4648
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:5416
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:9160
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:9168
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:9756
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:9776
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:6240
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:8364
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:11092
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:11100
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:8376
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:9872
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:14180
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:9880
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:2104
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:3084
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:7424
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:10104
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:10676
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:7744
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:10124
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:14204
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:15260
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:10132
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:4080
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:8220
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:15372
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:15388
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:8236
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:13344
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:13352
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""4⤵PID:2824
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""5⤵PID:5136
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""6⤵PID:6092
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:2248
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:2864
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:6488
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:6968
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:11920
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:11928
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:6976
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:7968
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:13624
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:13644
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:7984
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:10444
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:10452
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:6496
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:7604
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:12792
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:12804
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:7612
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:13612
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:13696
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:5444
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:8332
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:8340
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:9204
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:9212
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:13568
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:14600
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:4064
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:4228
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:8680
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:14428
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:14436
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:8692
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:12588
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:13464
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:3040
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:6924
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:9196
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:10996
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:11004
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:9764
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:14608
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:14620
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:6932
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:7896
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:12752
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:12760
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:7908
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:11076
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:11084
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""6⤵PID:5328
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:5784
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:6040
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:1688
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:8428
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:8440
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:14792
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:14800
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:3808
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:6160
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:6436
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:7856
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""13⤵PID:12636
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""13⤵PID:12644
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:8320
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""13⤵PID:12700
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""13⤵PID:12708
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:6444
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:10912
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""13⤵PID:14448
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""13⤵PID:15568
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:12612
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:6168
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:8660
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:13400
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""13⤵PID:14400
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""13⤵PID:15468
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:13416
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""13⤵PID:15476
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""13⤵PID:15484
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:8672
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:13432
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:13440
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:3392
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:7188
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:9656
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:15512
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:15524
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:9668
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:7204
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:7504
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:8312
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:8744
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:14488
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:14500
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:7836
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:13544
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:13552
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:3100
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:5916
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:1944
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:7724
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:8200
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:8208
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:13256
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""13⤵PID:14160
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""13⤵PID:14168
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:13264
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:7732
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:9024
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:11484
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:11496
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:9032
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:15128
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:15140
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:5812
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:6844
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:12504
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:13360
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:6856
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:9640
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:12444
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:12452
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:9648
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:5908
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:5180
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:3280
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:6264
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:7636
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""13⤵PID:8024
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""14⤵PID:14704
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""14⤵PID:14712
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""13⤵PID:8036
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""14⤵PID:8884
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""15⤵PID:11996
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""15⤵PID:12004
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""16⤵PID:14932
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""16⤵PID:14944
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""14⤵PID:9384
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""15⤵PID:10532
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""15⤵PID:11236
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:8004
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""13⤵PID:11948
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""13⤵PID:12844
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:6524
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:8812
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:8824
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""13⤵PID:14684
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""13⤵PID:14692
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:3104
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:6504
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:9824
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""13⤵PID:11116
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""13⤵PID:11124
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:9836
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""13⤵PID:14228
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""13⤵PID:14244
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:6512
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:9860
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""13⤵PID:13672
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""13⤵PID:13680
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:10396
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:5164
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:7044
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:7324
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:14724
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:8048
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:7052
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:9356
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:9928
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:14212
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:15268
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""5⤵PID:5152
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""6⤵PID:5944
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:5676
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:6696
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:11784
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:12720
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:6708
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:11020
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:11840
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:14968
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:3360
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:7760
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:12524
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:12532
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:14368
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:14376
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:7768
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:13368
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:13376
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""6⤵PID:5932
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:5988
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:5220
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:3552
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:8724
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:8732
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:9728
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:14272
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:15348
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:10336
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:6228
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:7544
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:14576
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:14584
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:7872
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:10360
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:10368
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:11048
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:11056
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""13⤵PID:11880
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""13⤵PID:11888
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:5188
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:6892
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:15536
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:6904
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:7528
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:11848
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:11860
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:7536
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:5204
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:7688
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:9460
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:14236
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:14252
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:15328
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:15336
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:9472
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:10624
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:10640
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:12184
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:13040
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:14900
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:14912
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:8084
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:14816
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:14824
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""3⤵PID:5844
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""4⤵PID:3892
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""5⤵PID:1992
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""6⤵PID:4792
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:1704
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:6384
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:10184
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:10192
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:12472
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:12480
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:6400
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:6664
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:6872
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:9120
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:9128
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:12676
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:12684
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:6884
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:9092
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:9700
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:9712
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""13⤵PID:15200
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:9100
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:10288
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:10300
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:6672
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:10844
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:10852
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:5692
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:7408
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:12284
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:12300
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:7416
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:10660
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:10668
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:12316
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:12328
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""6⤵PID:1544
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:5580
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:4376
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:8256
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:13476
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:13488
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:8264
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:13448
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:13456
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:4704
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:7828
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:10924
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:15584
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:15592
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:10936
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:8284
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:15544
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:15556
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:4736
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:7388
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:11424
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:12252
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:13168
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:14068
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:14076
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:11432
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:7396
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:11448
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:11460
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""5⤵PID:1312
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""6⤵PID:3032
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:6248
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:9792
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:12432
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:13296
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:9800
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:6256
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:7928
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:11904
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:11912
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:7936
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:9284
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:13740
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:13748
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:9888
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:14220
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:15292
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""6⤵PID:5324
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:6300
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:7072
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:9364
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:9944
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:10520
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:9372
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:13304
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:14280
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:14292
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:14260
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:7084
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:11216
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:12932
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:12940
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:11224
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:6308
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:8488
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:10572
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:12988
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:13820
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:10580
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:8496
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:11280
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:12112
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:12120
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:11288
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""4⤵PID:5156
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""5⤵PID:4016
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""6⤵PID:5124
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:5716
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:3580
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:8228
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:8640
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:9608
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:14316
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:14332
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:9616
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:4464
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:7160
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:14344
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:14352
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:7172
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:7488
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:8296
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:11764
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:11776
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:8304
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:8756
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""13⤵PID:10956
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""13⤵PID:10968
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:8764
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:7812
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:9688
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:12656
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:12664
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""13⤵PID:14516
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""13⤵PID:14528
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:10272
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:14468
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:5336
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:6408
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:10220
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:12556
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:12580
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:10828
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:6420
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:8652
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:10236
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:15432
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:15440
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:10860
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:9068
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""6⤵PID:4972
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:5424
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:7656
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:8068
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:11272
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:12064
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:13944
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:14988
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:15000
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:13956
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:8076
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:7668
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:11208
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:12012
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:5436
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:7348
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:11328
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:12176
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:13032
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:13884
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:13892
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:11340
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:7716
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:8168
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:10084
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:10096
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:8176
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:12224
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:13152
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""5⤵PID:4348
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""6⤵PID:2016
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:6348
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:6624
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:8996
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:15072
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:15084
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:9016
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:13228
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:13236
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:6632
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:10116
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:15248
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:10688
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:6364
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:10052
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:10064
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""6⤵PID:2028
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:1064
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:9408
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:9416
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:1180
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:7704
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:8136
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:11312
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:11320
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:8144
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:14860
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:14868
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:8120
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:12104
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:13008
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""2⤵PID:6012
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""3⤵PID:3988
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""4⤵PID:4004
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""5⤵PID:2712
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""6⤵PID:2840
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:4596
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:7268
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:12888
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:12904
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:7596
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:11132
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:11148
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:4760
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:6960
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:10424
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:10432
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:6984
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:11140
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:13636
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:13664
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:11164
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""6⤵PID:6036
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:6180
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:7788
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:11712
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:11720
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:7800
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:10904
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:11736
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:15608
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:11744
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:12604
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:6188
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:10248
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:15500
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:10256
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:10884
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:10892
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:13504
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:13512
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""5⤵PID:3344
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""6⤵PID:4784
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:5260
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:6780
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:12128
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:12144
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:6788
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:8556
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:13180
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:13188
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:8580
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:14016
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:14024
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:5172
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:6208
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:7228
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:7888
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:9228
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:9240
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:8352
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:11032
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:13984
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:14004
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:11040
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:7236
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:9248
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:13580
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:13588
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:9256
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:6220
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:8772
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:14540
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:14548
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:8780
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:14556
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:14568
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""6⤵PID:4964
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:6808
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:11384
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:11392
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:6816
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:9572
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:10720
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:15152
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:15160
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:11504
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:9580
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""4⤵PID:964
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""5⤵PID:2736
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""6⤵PID:912
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:1464
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:6724
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:7016
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:11960
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:11968
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:7036
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:10476
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:10484
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:6732
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:9320
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:9900
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:5648
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:9264
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:12360
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:12380
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:9844
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:14664
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:14672
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""6⤵PID:5268
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:7292
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:10460
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:10468
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:7300
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:13688
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:13704
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""5⤵PID:2860
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""6⤵PID:5472
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:7060
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:12836
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:12852
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:7316
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:12864
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:12872
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""6⤵PID:5544
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:4092
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:6596
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:8528
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:8536
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:12208
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:12216
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:6772
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:8548
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:9516
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:9524
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:11560
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:11572
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:14304
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:14324
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:8560
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:8976
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:12276
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:14100
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:14116
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""13⤵PID:15096
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""13⤵PID:15104
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:13204
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:8984
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:9544
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:10152
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""13⤵PID:15276
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""13⤵PID:15284
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:10704
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:9560
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:4676
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:8092
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:12072
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:12976
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:8100
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:8948
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:10632
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:13852
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:13860
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:11368
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:13056
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:13064
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:8960
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""3⤵PID:1296
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""4⤵PID:6060
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""5⤵PID:2764
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""6⤵PID:5748
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:3900
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:7008
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:8848
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:12816
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:12824
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:8860
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:7024
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:10492
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:10504
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:14760
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:14768
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:3204
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:5516
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:7096
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:8912
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:12044
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:12056
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:8924
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:9992
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:10596
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:7104
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:10012
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:14188
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""12⤵PID:15240
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:14196
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:10024
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:2180
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:9496
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:10076
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:12260
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:12268
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""6⤵PID:5896
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:5984
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:6992
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:11156
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:11940
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:7276
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:7976
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:7996
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:8448
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:8456
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:12880
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:12896
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:5660
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:8628
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:9624
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:15400
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:15408
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:10212
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:9040
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""5⤵PID:4572
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""6⤵PID:248
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:5532
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:9304
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:15188
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:9312
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:10788
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:11660
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""10⤵PID:11668
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:12564
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""11⤵PID:13408
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:10800
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:5536
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:8892
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:13760
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:13772
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:8900
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:15300
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:15308
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""6⤵PID:4908
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:5492
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:7464
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:14360
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:15416
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:7472
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:14408
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:14420
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:1492
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:7436
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:10168
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:10176
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:7444
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:12496
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:12512
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""4⤵PID:6136
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""5⤵PID:5972
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""6⤵PID:6548
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:7696
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:10588
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:10604
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:13828
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""9⤵PID:13836
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:8128
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:12136
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""8⤵PID:13000
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""6⤵PID:6556
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:10548
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:10556
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""5⤵PID:444
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""6⤵PID:7680
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:12952
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""7⤵PID:12964
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" "C:\Users\Admin\Downloads\CuteVirusCollection-master\CuteVirusCollection-master\cpu_eater.bat""6⤵PID:8504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\@[email protected]Filesize
1KB
MD5198dae2e41b3a0c5b164b85e8b70e2fb
SHA1dea3118924d5fc0f8a679dc4461ee060483efc26
SHA25688269645e9a08950f2556d09cd59a9c7ac676d7e9f4cfb5d1f4d23df08f5d229
SHA51276eaa5d2a0aaf2c4bbe0c9cef44181e5daca5eec898dbcefe9227b98e9269d5cd1191d0ec124bf318ba7371ba792fe691abe157be4bab7297a11eed1603e10b9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5046d49efac191159051a8b2dea884f79
SHA1d0cf8dc3bc6a23bf2395940cefcaad1565234a3a
SHA25600dfb1705076450a45319666801a3a7032fc672675343434cb3d68baccb8e1f7
SHA51246961e0f0e4d7f82b4417e4aac4434e86f2130e92b492b53a194255bd3bba0855069524cd645f910754d4d2dbf3f1dc467bcc997f01dc6b1d8d6028e2d957236
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD50feba345f2fa3faa3f0e50acc8986490
SHA14a765f9cdb65717cf9722d0527eed54b137d26f1
SHA256a6167f21c59c41df4bcb0027b716b97b84c91a0d94e5168ad1ed998d11cafdef
SHA5123319cf0711f6758eb316be835cdeab63b31992e97dfa581ef9c3a42114a8df61947f1f449ab77e3b2c7d5104e76d0e6c538deda780e0a73b985c79fe17950237
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD525a0ec5f58d77c27a65138e774be0301
SHA1f6c795102922a17aed3dbe5ad18a4e1d29b524d0
SHA2565a123fc972ec478f21f9c6e56d581b277901ab50b7d286b2072eeb1ecf5f6a22
SHA5122414349ea07440bdb04bc694a597e6e16137b41d2532ced2ee7417a82bfc3aeac8f90e79871c96356870e54bff086e645c354fb0fca4193a2a67d50514cfed10
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD514a02fb13351685c6dc46ca193e46e6d
SHA1473b0732bf7417796a1ba4d106a4f87b821b69a8
SHA2564f8455c7baec35e21cae8d2f086206c7a22dd8085759f8e704e69b086989cdda
SHA51296a55488304726eb780bd9d6d589a1f589e961a31d3e26ba73a687aafb03abe8edd59dfc3c78fba1714a64660c9c0c9560634b228f78b5727a53d1029dc08893
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD560d49ee1b7a37a39cc668d0e644fc226
SHA1a5edcdcf0c246dba57b18e76df97df15d1879784
SHA256b1df77f0d3c0e0ead0a2c394484753c73f26cbf3662287b2f9a1780189796348
SHA51204bd2b8444e45220e3ebd14bff1a97b180b44872d1170de3425a19918a0524d156359cd6aeee9c643b0e0c8eca8a9ffe7f56fcf914bda77c73231dc757a6850e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD534d22039bc7833a3a27231b8eb834f70
SHA179c4290a2894b0e973d3c4b297fad74ef45607bb
SHA256402defe561006133623c2a4791b2baf90b92d5708151c2bcac6d02d2771cd3d6
SHA512c69ee22d8c52a61e59969aa757d58ab4f32492854fc7116975efc7c6174f5d998cc236bbf15bce330d81e39a026b18e29683b6d69c93d21fea6d14e21460a0a7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\5ee9b9ba-33ca-4587-b7ad-bc41cac2a7cb.tmpFilesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000002Filesize
69KB
MD5aac57f6f587f163486628b8860aa3637
SHA1b1b51e14672caae2361f0e2c54b72d1107cfce54
SHA2560cda72f2d9b6f196897f58d5de1fe1b43424ce55701eac625e591a0fd4ce7486
SHA5120622796aab85764434e30cbe78b4e80e129443744dd13bc376f7a124ed04863c86bb1dcd5222bb1814f6599accbd45c9ee2b983da6c461b68670ae59141a6c1a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000003Filesize
38KB
MD51edd3d912257000ff5323d9f99d19afc
SHA13de2661f92b1ad140510f94e586240a0b0c78afd
SHA256976cbf636911cd61d2be6ddf2e971df169cea7a7c2b210b852196bd7c81eac62
SHA512a06bd0e28bdc3d5196d683e375c6c45ec7d673db9df1438623b856a66ba63f1e2b78a60ff729c6ee74202be7ce4264fd3770e912bca6fd9249a66532e88dfc16
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000004Filesize
64KB
MD5d6b36c7d4b06f140f860ddc91a4c659c
SHA1ccf16571637b8d3e4c9423688c5bd06167bfb9e9
SHA25634013d7f3f0186a612bef84f2984e2767b32c9e1940df54b01d5bd6789f59e92
SHA5122a9dd9352298ec7d1b439033b57ee9a390c373eeb8502f7f36d6826e6dd3e447b8ffd4be4f275d51481ef9a6ac2c2d97ef98f3f9d36a5a971275bf6cee48e487
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000005Filesize
19KB
MD576a3f1e9a452564e0f8dce6c0ee111e8
SHA111c3d925cbc1a52d53584fd8606f8f713aa59114
SHA256381396157ed5e8021dd8e660142b35eb71a63aecd33062a1103ce9c709c7632c
SHA512a1156a907649d6f2c3f7256405d9d5c62a626b8d4cd717fa2f29d2fbe91092a2b3fdd0716f8f31e59708fe12274bc2dea6c9ae6a413ea290e70ddf921fe7f274
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000006Filesize
65KB
MD556d57bc655526551f217536f19195495
SHA128b430886d1220855a805d78dc5d6414aeee6995
SHA256f12de7e272171cda36389813df4ba68eb2b8b23c58e515391614284e7b03c4d4
SHA5127814c60dc377e400bbbcc2000e48b617e577a21045a0f5c79af163faa0087c6203d9f667e531bbb049c9bd8fb296678e6a5cdcad149498d7f22ffa11236b51cb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000007Filesize
84KB
MD574e33b4b54f4d1f3da06ab47c5936a13
SHA16e5976d593b6ee3dca3c4dbbb90071b76e1cd85c
SHA256535fc48679c38decd459ad656bdd6914e539754265244d0cc7b1da6bddf3e287
SHA51279218e8ee50484af968480ff9b211815c97c3f3035414e685aa5d15d9b4152682d87b66202339f212bf3b463a074bf7a4431107b50303f28e2eb4b17843991c2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000008Filesize
1.2MB
MD5be529a907c265364aea60b32d2a6b43f
SHA14e36681dc58aaaa130238083d0aa43d4604019e8
SHA2561790bffabda47de3ac63c09728874fec01d03bd240361e81dbef964f8ed179bd
SHA51237e65201a514127811d0f92dce4ca096401af92b4c90441d1e0673c1829cdf5d47f513a63f8ee1593987ac3dd542f197654423b0fe24d50aea4794001356004b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
5KB
MD50441143a284a23f85fafdf28d4a807dd
SHA1a2d249aecb6de45da82d744bf55ed8f57a940d87
SHA256f7c1881d2d2917843d10d4b3d1a3d72f5f67b1c14904f5411008660460770a7e
SHA5129f8aab0a4fbca3b4fba89772dbc089e64a77a5df8c92b9a3a342c24f6ec1713559c1696088d68a8710cdc022eb52e9812184c72e0e89c6bd2cbfdf7019277be3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
3KB
MD52fe61ba93038b918109f93f19e4a1529
SHA19c2370f5608eb40db29376e13fc42402427c2040
SHA2560aceea8d3979a1bce41532372edef5be1b1e41c86fe6cc851f57dec7c5758fd4
SHA5122eb0e90c9cc3bffddfa4f4f4fa9e0ac99b148a6a92a3679795937698a23fefb6aa3ef14162715d7d2142c3a7a733877082ea80e88f488f8bdb51f7c5325c914a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
5KB
MD5e01664fa4650fc8e08c01e14da1d02a7
SHA1c62a82f7300778e9aa4c6d1ed3a070f771b79abd
SHA256a225b8e845b7fc2b8c63d60128cce4990cd27bb00f48ffa7760cec9bf65b8891
SHA512716d3544d01f51ead75826e9249187e8dab3e2ac55f38c872f7bf1b9baf3351238a376d6288c97f8293191f63a5d222590d17df256ed8845aea3d89e23b4619c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
4KB
MD590840a089f35832043d9fc13e77059c3
SHA1d40066bedb052a028f2ee547eb92527783f063b2
SHA256c6bc2868dd121d283fb2a3c2fd82e9f450a61f1f143d02cd7437c6c61cbf61ba
SHA512efef11dd3b38321e9329cbee346fab95836e71a1efd91679caf0f40a303c27f9ed16c4d87d43e195f0444d8d711a28624839a6c9ce0534ec107bf3aab68d0646
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
4KB
MD51abd4181abe3683853c98dcbca655f15
SHA1e20d393dc649042b51c775f9ca1b8ba47ed76994
SHA256a44279bcb63a4c5363a65d50a36c119b8c9c159fbf9844c99af36ad17d6a04f6
SHA51257f6c05a0e6c8403280863d3f9251dae79dda5531a07ee7f1ad7a3f0c29e648e3c33e62dff3987d5c6bb4b4399937ad34873d7f365ce2a28eb54fccb6c7de359
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
4KB
MD5b3446e300a7ca7dbe89be1a0be41348f
SHA148c9196989cad0d17e3000155a815888243a22ca
SHA25681ce10d43d5bea28f6dd5a64fa7ba99f07be8aa7950338570abf2f677ebefaaf
SHA512e1fb1d1589cb12ef012a45cd08b636ea9d1332b9e7a33ba4e6711be8272ca67486376fce320e080debf6a580bd179046802ff08e02df821b749c41416cf8227d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
6KB
MD5edc35d77b7d65fa92ae83ece1328a4b1
SHA1a997e5ea43cdf9c346254fde50ba7f360bf2f6d9
SHA256dadffa745d13cc2a26d4e77e5fd736835b025ccff891c85de3cdf827bb664e12
SHA512798e6044f77f26fe43b96f5f5b6ad284ad66f060b1d7ead407238909fd56ba31bbf0844f71ad70281d127bb8984fc7ec1c95e4181d2c33250f37dc7c8c187aa2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
5KB
MD5ff3e5b476fec7120f4331982ae5f1382
SHA149683a95ba284292b6027a4d119265b9f72f6103
SHA256113b1e8bba189befae90fde5364314a1a1e3e4d8e5316ca43a731b37573fc8b7
SHA512f9e7f0a856bb05ef48f2a759159d2228ea3008f2269ab5268bec56b8e66b53f13024b5a92f546addcf75445b3106a9ea9e99d02bec89b3464125f90371cc98f5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe5edb99.TMPFilesize
4KB
MD5bc88e0c3824c510ede4a1959704d68bf
SHA1489b8bbf22a4bf95a2a390fcd532252f050ab2ef
SHA2567bb0e1c2172970f3f6ed8e9342acfb8c6d326548e89027c79592c3420d49e61c
SHA5123b9e83b9896c70a75e1e03a39f1e03f67c4e4d55e472ea4dd2353b18088ac560f2d057365e5f685c6ad0463b432fc6ab6355f5c0e08e51ab3840029e589a58fb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
992B
MD5281467d7a88709d6861aaa8f04d01fb0
SHA1ae47c6909bc923af25656699982a79ab139ed4e0
SHA256beef0d4859e36d619153a7776bd9122536ce958a077b806fb7092b1c78ce874d
SHA512e308110edfa6b7f0ceef0324f452a3e7019c0f1990e5e81a8d6f0d39e6e775c87f359281e059b8f0238d4aaf38679180a0d929585a6aa992d24f2ece325ebd4b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
1KB
MD5852f41412764a6a877da5c94ec2d61d0
SHA15ab56eb9931c26aff6ae8d3f5a90bd8f415becbb
SHA256c77ec998e06aba1755e1431592ff73b23896098a9f10432d1e50fb0c4813ad29
SHA5123ca754260fd2f491efa979b47019c57edb450979a4921977e97e1f4c9c91122c6c77ded6ab2e23811cae9b11bd972b58922fe9c731004b2992788828894c1014
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
5KB
MD574a27f657f9120b0d33250ae214b7256
SHA1b5ce9e181569bcf19e16e5d7965a927866cce4c9
SHA256911ed9eda0bdf857394726038588b209b8007f9ea8749243be54a1a48b5cd297
SHA512247893227486b50184bc1e9b2863639597222e9ad055faaa10e8965ab8f2bee90286398b80fb8ddd3d64481f17ce9c4b67be2408197a7991f111754c1a3d65f8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
4KB
MD5ab465bdd5d652d7b52b4154748db9536
SHA1889485e80ee544dfcbe7b02d5aa8b4911c67759e
SHA256d640e0dac0e8be966abe1d4fce76f61fb9abcca72217ab5e6e1934f4e1dbd990
SHA512a8ced469868b468ca2a355ecb3c72dcd48ba12921c40f966fab8ad1dad3e7bbed9d056512cfe3c6174f68716021bb8e66d56aebaba5daa1e05dbeb573e2fdd85
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
2KB
MD5298d5cbc5b7a474b4a9e8ec080741744
SHA11f002d025859701bd39f5904c8f6d436d73a9252
SHA25625643c6c230d1dce6b34aa5727bc9646dc015e139b9dcde7a91a3652dad65bd4
SHA51284e477b3dffcf327ed0a70fcfc0b29be5b03e7bd6ab4985647cb1fb83adcce69acbf6f0d70e54f0f5da0fe7141b54de3ed66b00ed29a2299836cdb55cf915467
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
1KB
MD5746ddb2133dd0899627e4e652e29973f
SHA1abda53ad59fa4a47906da803cc5f4770fbff59b8
SHA25681d33efbc1adbcc1f79344d36d156413855a497f64a5c5501d7be6f5db6a6543
SHA512aaed8afac2bc16a745c37a2419c0ab2730a172391f32f024aaec8b00c5ee7a3309893d9831aff2304a861a563587fee5f9d7f84459431ab30188cf52192d72f9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
2KB
MD5e5c7e215c8424c8896b2b9dcd8e91694
SHA1d8e51f87ceca4c9e51f7ce2fdcbcf6a0d8155aa6
SHA25631ee0d6824e7f9acb3af735522aeb0ef53ba179ed72490797f883e5632a9c77f
SHA512d8bde581452d7940725918ff0a8d99e17c0aee9af7f5ff3a55c5cec33b80fc7d7e68090514c012c87b84fda0ce15cf54ca3aa79d2b245cd2bba4889d0b723751
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
5KB
MD5126b3cf39b8a28407b12dce20b0eff6e
SHA1deceedf5560dcf836e50f63a42d62ed2f024050b
SHA256c5f4d262a698c238d26b0061f43cdb62967c80127cc0991ac948a6c983e59bb0
SHA51272b3539cf74f2f6a64f1ab7359fafb99c458bb25c1b7168efd1a6f85756290bb13acc91ba716d9633ac116add5742a0b2c44e8f312cb7e0938e6a977df2a2d4d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD5620b8a7b60fed765c3f7aca5f5756c29
SHA14f699f1533be41a2bced051628ed912702b06ad4
SHA25603cce403c7c8c70091086a6a918316f74e84f827927acf6aed3c02c4f8c02f61
SHA51282ee9e15907e367f2f9236bfdc777281b7d7572506846053162549febd8a33a99214c0d0490252b821dcc24ab2f6a60474c026acee4cbe4e418efab5122d17c4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD565672bf4ad995e1e1d1e3b201d0030e2
SHA137d0f9062723e2e7cd015b35023de61666132e63
SHA2567e0f78da1b2bb6445841beb8b70dda43194b0f7c369a8a99ba0178170cdef82e
SHA5128f9b3fe4b9543610c623d00b75ed9cf93c34231d78bce1e07376892afda8914e1c23a7e0baec3e7f9c5214f12e85ceaf2eabafa73e6639b54cb2b33f7e5f77f9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
7KB
MD54ef859612ba564bc64af120a75882fb7
SHA166f42a039b39abc0bc33b617da5a350dda4ff7b5
SHA256e8a00205dd957b669a9528e80ed27455445126d2f86217ab87f260f5eabba6fe
SHA512907659041d96570c42c6527cb40695e496105f520a8caf5045ded266e102d781b2b4f559a16733aaa42620a3f49605d9e48761ab820f4527579539ebbc81a392
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD593de9994c3685abca26d4e0577dd8fa6
SHA18ba870f2591d3bb92a3e5d924d3b7957b274a1c5
SHA25691d0d88411910663b7eaba62d7b55663f31729bc89ea137261fd92987a83a01f
SHA5122271972943238c3d8be9c9b28c4bc640a7309d440ceb7e426013c96537f54de0a0fe9da81c9b9d024efab49248b488718a1e0675076f6e89864e3ae19a72f77b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5b0ef3afd9fc890c79c9d68bd0e1a8f26
SHA1c30f3bfdd959b3c9a59b9f7c4e04bcf5ce5e0d5c
SHA2561f11382cfd39fab06448b98564d0c81284a4b286dbdc037de9565194e0103799
SHA512669ee5dc8866c128bdc265c2885255968191bc2fdb417d94b385bc85668921190161613b91402942dc71e48de517325d8e10fc11481d0cf3118e51885575c8fd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD56d4fb0708230a5f1ce572bcd807f23d4
SHA199bfb95ee1fb1e3b5a64668d3ce2c7d7900b4623
SHA2568a840d31f59457cf184feb7fb3a3a2d24afa573a0b9858ba5a9f5902309b1d1b
SHA512264f304d0f4848508d0f70b733b0df4c00a54e8f71c90d1aeca1b5786d499f7a45e18c13ef9fb9510aaa3e1d2c0cb9f944ff582e61fe5605e6fceaa9040227ed
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
10KB
MD59b180585115b4e2848839c470b7a88ac
SHA1e8c05c21f974e47a25b4f14e2115786552546ebc
SHA2567545f90668dc0af5106b67347f76b81c83c64492526f3e903b4f757bcbe6e4eb
SHA5128dac1503bfd16fd4988c919a24f21857432b47405aabed4b0f866995d0c4d20f034157c2cd623d8bd91189e574ae7a25d688cba75f48de8ae787d55edb715a3a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
7KB
MD5253c9d822f487c11d32ec4665bb9e42b
SHA114e46ee5b25ff15e3fc2c94ed0803871d2a1041b
SHA256234786a7637f42cd5089731cccb1c61045f1e49d083a707ddb54c7357a977fda
SHA5126204a508707ed64da10bad8c1d91365b416dbc81fa73c7f42441e84e1623a2c9d6f1d6b55d68f7ee3bda37c0fdfb0d2e240a2dad7a09d25f682503c25a3d0573
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD583fb2b1f5771521add2f50638315de38
SHA10e9b491dde2195fe0d6c56fdd8cdfe59966670d7
SHA256985672f218e44a0800e3f30675bebfe7e67044089bba94bbfea2776fa5db3ded
SHA512c8ff8a1af9bd9a8bcfd710fd0d6e7c336d136b013dd6d0f706fbd5e3fc22b9049505c2b6a6be447041b5e16a7c4107494695e2bb82f908d21ef5992b65c34c6d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5fd0c69a805c6fbb1290967d2c605372f
SHA1d7095331f02ca56562755333590d49bbfe7d0e69
SHA256203d54173ebc7b0cc6565e119c27b8ed5c4b5fc1689be515faac286f71eeb370
SHA51280cb98232f96d4d3d7d690cab2387259f38a639107aa46a165ef574dec0a0d761c320ed2782ab3421ec697ef33b37af86606908c225f032674940d4a84d3ea3f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
7KB
MD50a42066dcd5f789efa82d900074abe39
SHA1b8a6855972f47c30f895d9dfa150686cd81bb4c2
SHA2569a6c151ef72e73d7ba922858c0b76a34055a72db1c48c6bc5e6a3de41d5076df
SHA512ec10b9f071c0ce011ff3fce87d122eeebfbcab9ab4f1ddec16e3fa7641bddd31d9bf20cfe06bf6cd8aa149ec4258f8ec3a4e15022a4b0fa4f43cf4d66f704cc9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
7KB
MD591c3c41ccfee469cb86d0592a62ae0fe
SHA12cea42a5cd8ad1d38913789240ff14ce6a2ea12e
SHA2564cb85051fc00acd3150c374d918d60f6ad559ff086af9a37e14ef21b33872281
SHA51220e72261d3f96d1a08ded6a748b7a8b969c2a71fb0c45de66606a4597014b69666bcb719a8e50904ac8610dda06cf49f16ba13cb99ce2ce2a01275a30b41c9df
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
7KB
MD546cce58a39264d57ebdab58d229fbe4d
SHA1823565eb1a88a0dfe834335b2cd430c84b90caa3
SHA2563f1c3e141f04349b911c7599acae12a80ccd08fa84e8a931e1fdba6a2151541b
SHA5128dd4f7ff33fcf4932cb1ba3c67fde1195e3da6ac52a3aa70e8985b4f7fd424a95fc84dc8692be24f97b76d4fd90a00172c6fa4bcfef96e022601063dd143aa3f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
7KB
MD55761a483139cb3a853379f5964991d9f
SHA1033473e0cc2f9a800d3a32feb58fcf10e519605e
SHA2564fb84a434b77622470441e6d3450d4ee2dd565fd39141615b58019c7e54cfda1
SHA51272a48f028040461092509703ceb95a8700f8ac7044dbf33b4c392eb37e15dbecf4cb14cbc90283af8d1a180f24d58f6b1052808ae109d36a67480d4952ea378d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
7KB
MD5461e2784aa013e11406c267278fa6c9d
SHA174a92ec710299326ee87403a9a0bae4660f941b3
SHA256831176b7d14beb4d67f1d1fa976ea74087908d8d4fc7a21ecf88c567ea8495f2
SHA51293a73afce86f94031ff4ceb28bb604e7f1a422ab9e7a9623da9d4c39251ca390fc3a550020faea47f21a50e5a75d824895984433392a0f5052becb8a14d03920
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
9KB
MD52ce073030bc1f68a9b0d5b4e220dd8b0
SHA1dffbb269297532fa3c4e1c04f06e421bf1120158
SHA25654946eca79584bf3130d73ca856bd2249ee8b24ece4e120a1e9442d52fd6ed1e
SHA512887e3884290c0336dd52055176ff5b07c1659241f88695f075ea045112fdb1f5688a782cb994b4e95198b4beda6565ee37b1087f9995eddbbdd43295a470b3ed
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
9KB
MD51741b1f2d854ed4d1c2c9fe7a0629f57
SHA19d4bf391625d15d007e6a9319bbe1c47610ddd0e
SHA256b0591003eaf91cf12ba140c3b644ffd55e71f6e6dd6b908f607381ed6cf7e08f
SHA51232958241a4abb129ad8c45c253183e93368ca568d22536fdd5d75607eb4ef2d2f5bc377dd52511d5f273350691bbbf3a8ea9828027e485e5c39b3bdf5834ea2f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
7KB
MD530e042aa0f6a0952632479a0b4a2a6cf
SHA1c6bac6d33e1cbaab704e28276d8b8a5b5fa38a0b
SHA256e2b6656848ef147edd2656245466c76a5c62c5bf5fa1551d14c8cb8538d6c959
SHA512ac212106b450815cfab7cc807f2e2e0d473957a1a76b373ab1eab96d449961ab105a75fd7b6f1145092ea08b55a7648b42005c9c4a9c516721215c3d2e962871
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
8KB
MD557415c2264833924d5ddb8307d5fc50b
SHA1a9f28e2602a632b783b04e78785c2e81f55421db
SHA2561c9d50c8329fb80596f115de43198e03b773375dc4a1806303df87bc8cc85900
SHA51212e8f3b629fdec1e862957adcdefb02d5edcff67e0c5dcda79b8ecb1483d4a7fb0179efdca203e922b3c91693e421a1bd14c1f2f2b9f30c1b097fda12ae0440c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
9KB
MD527e833c02081e663b94ef72728aecfc2
SHA16bd76de8f5bfcdc630ba66c770880c51cad22603
SHA2560681bed1627fec0301a425d125b96a7e3a5482cdcebf87f70ed985a55820cda0
SHA51279b79de4b6113673fe753c22fcba1ce614cd3719a90e9ecbfedee1884a14bb82df21c6ba654f8d752f5f68eb5f8e5848d2f55040016697da61b573b965648e6c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
9KB
MD5e96daa5e2994796fff56fc47d25fa2cb
SHA164fd50759dc594cb25e3893979918a9e2cad9d3b
SHA256a1fe187783d862b5e97776cba12ec089cfd2adb607ed0cb39f920499636141d0
SHA51202e386499e73cfb5abe769a0adf8dbac74d9ea6343501504810010cda147ff16595a2bba9b927a3d4755d65d9efbb80e210cf0b27fb50e0bf2fb06485ecc1814
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
9KB
MD53fdd4da684101e74e63e9539869d31dd
SHA197c99cc9ca4d4bdb2bd79fa9c28cbf6a23ec5a9b
SHA256c3d6f3b65a23ee0617f2e7186ca12cd990339869d7254d75dfed1def8c98b78d
SHA512ada6090168e13577421f23b888bf9a3896370c812cf70cb6a394002e5046472fcbb982a501304cd6c60d34d7a75221378330b2fd2cabd2a47eb49b9cee61ce50
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
9KB
MD57b4141a367db0f50885617183d0b3507
SHA129cb4579e7b363d0a5b9d96e058c6cb607b7d49a
SHA256d3db1854a9321f9d64d56e3d456a1d4e76dd266825db570f7b2a68920b875966
SHA512258e21321ed20171577cc1135b3ae8881696e7ce502668597ebaeefa1a5a22e993c9b5cf2f104f73edf499fb2c44d37449335d6d2c93ee9f70aaa4ff40d4ccc1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
9KB
MD51bfaff9fcde2552aef72f96ecf8a27f4
SHA14717ea5d1f09cdcae37e53e4a03e069917ca221c
SHA256ed7b322f0eb85b58b722b2913823a55949fabbb348f6d2015ab25d13fa12e978
SHA512ab8bb504caebb31afcd8e8e6416c769f1f5cd1c146dd9d41fd57280fcf244214d56d2281e6e4693375b01ae3b01c349617daa658fb955dc99742d3f58321ebea
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
9KB
MD5163d4d2a7bd3b1b02e34ab267666c952
SHA134206f547da5be2f7bd767cdaae35371e3ef1804
SHA25662eee754202a4aa2f71b6bb28d9670247aaad232f481bd9debc530c84b67903a
SHA5126f977963c67da83457715a4e2f3957ecb9d6b02e9e0b85eb6961d6941640a83df77957219c222636d4224b511d538a3e72055a4ac2937aedb9d4d5553dbdad15
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD5169e7ed545532b938d740a66267000df
SHA178906329c7cb3d584c6508e805e547ecf8fd26a8
SHA256fd1a235bd304707798b4dd4f5cb73e5a98bc3a22ad3114724a715a48fa4a9180
SHA5123b17bcf677c3d74463bb7e76a34b6dd5f673d657d3461e0e3ce1d0114ca25a0b0a1eafc77fcc06f725a9042fae0335764a3cb4b721d610fffd088717ba52680d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD5a58a2903e45c14fa9b57d640a8209024
SHA123e1644beb44b7453831b50cac0272d4e80d1d89
SHA256e9fa2569eabda09f9a2619919287c3179226bc74ae682086fec3a79b52767778
SHA512b23feccef5b03f0cbfd6222b95fc57c3b0f9c0eeb6ba3b9f846f6bbd3836dce268b37b31a0317f836835abb075e6df19785b768cbc5ff98b025a890269805024
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD5ef7ea1e322c10128e0189257aca35f5f
SHA1b8048347e2a5c1ff9fad9c5255c90f8e4965f243
SHA25679036f80c14c3c6da4cfe48deccc267c2ba501774faf18645f35427212fc9de7
SHA512b34b6ca661a88dccfef44aa10151656e06e8ab0f5a22facb5356a12a99d3888d301142a13c16161e1e7956330b0cb860d488cfdefee22d05c483fda0190ce729
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD510a9277879b3fbfb3f0b987ae6c5e660
SHA13e323c9efcddbdf611a66d089d5edb27f72690cb
SHA2567a6f1bd82eab25d8af20edc5f3e325daf1bf965d5049d10a2a6bd4d57b50dd2a
SHA512254bcf2bef9aba229fd5a8f0c04195ce649b55b7b6458dce69f2e84bd145b9290594e519182a9365f5af07e4a407e9fdc194570d3158664a18357be11706e1fd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD59c1003f7c0fa95bcbc39686cd354fc0c
SHA16a9466d29b840bba4482782ecdcaef89db475c33
SHA256b4f01ed54379abd1689db4907a4759abe7a11b1a7dd9fd0adcc6513155e4b7cc
SHA5128425cbce9c1da7a4d4653c83077127f5fc68822c206a71a4ae1f14c1419f427bc8115b35fcb2a7cb78d32fda718ff49a5d82bf3c22b29c286f7bae461599175f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
3KB
MD5cdd20077369d28ee444a35273d8a27c7
SHA102ed0fe6ccba3878d900c1338281b511fd3b5b76
SHA256d81d7b7049af66028d939d66f052ff73a78eb8ab4b6c12bdf5ace0224df8f8a1
SHA512c3a557717f3908a072119e40dbf019433285be0c070de9a9e5529dda6180cc1d473b9d0362d5cc62b2511f039ded50738b92531570506568770066bfc9a7ae98
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
3KB
MD5542a3172bf28500ff9e2dc818becca48
SHA1376ed0eaa4ea7ab1c0625bdbc2701070973ec993
SHA256bbae9505347bf64aca4600358bb7e9849410c71f37e3c270910ba7862735f714
SHA51217ac47c99c04d80e8e52147478e78b08e6d5bafae4972414996378f3c1368c516f5ae74062f22fda4eafcd55588afc5ad63c49d0aa03643a25ffb89a0a83fa50
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD501981919bf06e7984fcf2105c928f965
SHA1305b854d175b2129c6beaa8502c14e2e9db22ca6
SHA25618e9cc5375fe41fa5cc4a41e8dba3e5d9c4b0e204e54b79d5b5364aa7eed3915
SHA51282a771ea2cfe1c4b2b1cba3c5c0976694171e0773467a774386948f34f8d8ddc0480b7d853a8136267c3107c1da8cd81cd524591cb3b09f715b8a9a290250ac1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD5b26a39643e552f6174b0953cd4abe76b
SHA19eb2701f62c621de56e5b5475899a3049cb3658e
SHA256e59cf96b3195ff48ab99fdae90a13d1c709c9ca03cf5132767adb9f62ac67050
SHA512590355754f4dadf4204ff3b46ea9a6d5a71c9d6373636fe42a27b239924c36b5f10faeeee4207569a1e266d5bfa9c50e526ac3e004437718bc37a51a4e2335bb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
2KB
MD5350d1c23a2d7b8f7dfce976d39655218
SHA150b9f02ccd24cf6dc3e77843cf6c6254598b1b10
SHA256e7ff5f907cd79482beb917467a35454dbe04df505b5b2fc247c993ca1073867b
SHA512125a727cde6e7818d93ef2216c41a56d558f3df345405b296aaa6323cd41e4315efd34f843fd102e2eff955f663998db8e6e8628540f6ae72e71a861e7de97a9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
3KB
MD5260e283a363c867741a35c088982f4ff
SHA16c60c272fcaeeec23ba2ffa33acf72c8d5b3fc14
SHA25650ba68fa5c1ae208d711e822db3c2e35c5a27dcedcf440d5eb2164ed8237f444
SHA51297b23dd036d18f090b8157961960b70e999fe902f8590d8797b50bd29de6354812ddeec6ae02542b76aaabb288b1aee6a858dfc90206b2a415906221c07a7f03
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
3KB
MD5ef886b7dce23fde9d8fd7eb7a1aa075b
SHA10419e76f467917b9209d32b2c27c518832b31d96
SHA25649b10d96e64800c7b54c27bfc6a98ad94f04e6628d97dd36b40c910e630d741a
SHA5120af2c8f7aaadaf7c5c5a13688eefb15c5b28cda9b2da88caa39eda87b15f4fc93091c66c78ce3c1795ca3206c5c29e188db0953b7d2fa9a7c68cadf277a32b99
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
3KB
MD5a8d96640b731361de8a144fd222f6554
SHA1989a7972cf519b1e99b0478e8c261ce50fc166eb
SHA256ac51ece7e68df2d80a6c9ad5cc83f2670f7336a3c6f6035a8b9a3b25cd3b02be
SHA512644659f1cdc7c35b002e2c35fe0e9f5763503211299912beda496e58f5ff9974e8e577d58d9223863117be239b67f111037fc2ac40517caf15b105ab3aeb229a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe582594.TMPFilesize
1KB
MD5c9ec23c915a3fbf58441fbeef55f1f9e
SHA17eb08dcb838721660e5ad9613de9f70f266011f1
SHA256c850be696e88b6dc297496363f0eea5b3fe2483d50e44a2672832acf6a89592e
SHA512c8db58038378a32063ceae55827d31f4c9b377e203f4325298b6378c3838f117886ac5fbaa910de776de03dcb35623f1bb59af40741fc442ea26193593106b68
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD5589c49f8a8e18ec6998a7a30b4958ebc
SHA1cd4e0e2a5cb1fd5099ff88daf4f48bdba566332e
SHA25626d067dbb5e448b16f93a1bb22a2541beb7134b1b3e39903346d10b96022b6b8
SHA512e73566a037838d1f7db7e9b728eba07db08e079de471baca7c8f863c7af7beb36221e9ff77e0a898ce86d4ef4c36f83fb3af9c35e342061b7a5442ca3b9024d2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\000003.logFilesize
19KB
MD5839650fb12428d68175ca43d23b46435
SHA14b8118001e873c11c3801af290338e7e75be3050
SHA25601a0058f7c562e561517f324f4a790aa144ae36101011817029dbfa9679e4ed2
SHA5122777b619cf73bcd5385aa298d4453a670376fef76c5cd544a4d8f5668ff83c3a41a471fa8b70baf986c02d31e6f2f4a9b4da7bb4ca22de2d456e2bdbb17c78ee
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Last VersionFilesize
11B
MD5b29bcf9cd0e55f93000b4bb265a9810b
SHA1e662b8c98bd5eced29495dbe2a8f1930e3f714b8
SHA256f53ab2877a33ef4dbde62f23f0cbfb572924a80a3921f47fc080d680107064b4
SHA512e15f515e4177d38d6bb83a939a0a8f901ce64dffe45e635063161497d527fbddaf2b1261195fde90b72b4c3e64ac0a0500003faceffcc749471733c9e83eb011
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD5c3906510050e0c85c0588be44374212f
SHA11644f0bab6ea45d2a47936254dc5afcdb77576b1
SHA25673d459fe1c2a16baa216dd0e1577ea2a23dd7bc037ceca53a5aeb3b051242b0e
SHA512311998cebdec3316d377a4b663d130f36c744cdcc173a1940f857b8b6085d80e61e8339e8fac5cb62c3b1d46529baefa8aa37c7cd12df3a9febfcaed7ec4c8b1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD57e3a822448fcb3e1bf558c70635fba89
SHA171fe37f472ac0a42167467876d13d70e753cb97e
SHA2560339b2f9bd9acf3f237668136f08eb10d8e2784bc50a27a0a5028a890cea37da
SHA512bc637163027a0fabeb6e5b5ba96fbb5e51343c33368bd21b90af4a62e8617fbed8f1df7e8c493f2c4309cf33d70ba6cce7ac59526e8b1016844e0199cd7c992d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD575568e0f2a9cf95c938fcfc9288b45f6
SHA142534268087f891e702f9f2785e9f337f30bb392
SHA256e599718f56cf96c76db3fe2494503cfd3185099504a04a80980319ce7a2373ec
SHA512fae702ea7bea5ed6f9dc6ca8d3cf7a0e0f44ddae719f88c0d3eb1ae5e8c2827bfdddf76eea97a7a4bcf3cf1ce31e245ddce8065e6563784a915045f154580731
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
12KB
MD53c7135e90febf76f22e3b7a66684e196
SHA180eccaa826ec1c6b221b57667f28d15ad72132f1
SHA2560ec9c824f02379b859a30c4d783527e93bfdf5dca2649a2f52f5ed2314a3af4f
SHA51259afea57e1b5408d61b9085931685f175799a3b640b2f79a1843d649a92f09fa912f96a4d89a526130d5765864a7e9f0854b160be81f012d5abdf8bcdfa05804
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD507cd7cab2f6a230ddfd2675813c64753
SHA13d6982a11bf59dc9eb85cede202905327d3d624b
SHA2560ea07a37c53eedeb7ec56aeac05c43b794c74d8bfdf53a84e39deba7c3fa858c
SHA512a621f4527498a0d7ba234d58c3ddc02d855c62b34faa2b0f494ec9ed447e281f9e43e99d73ad3eec243b9eed6a101764dba763e4d4f7cb3d9c23643e4e51f6c2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD57c718cf0451cb51f9ec44bd7f84929a7
SHA19a9c205c921effee2b7f0d654516f2d2c3c29a16
SHA2569a31add347ae2a173c2155632ff6c4d765bc092b24298ca0caff8e0e15b0a38b
SHA51219cb61abc485096cc6d3c74953edc5eeb63d6ed4ec28b46d4085f50339937a87735d15fc2c5609fb1e8e39ee3fb78e0d520e977cfdb5cf9abd642d06386a4f5d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
12KB
MD53dbe02c8c9e971d90bdd689a2ed80243
SHA1f4351f608cbc33b320716885afed6fa944cbac47
SHA256e71092bb990429273be0cf43a65c2afc243403a9b0b42c44f704c6b04440685e
SHA512076eaf196a4b1fe9d8fdb78de11cda73fc1945c23845129a83d2a9c8ba8940e089fff20150d2a16bb5140f1f4b88fb053524ee1c268024de21b4344e57811fef
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD52f70c7dd522afad1c9eef8d971455be0
SHA1f113d56a92bd21b9e2a53c81a442270984f0270d
SHA2560cfc92a7dfd55f49e3d0b07015a40d88a1d19d35742909f31181dd22e386dcf8
SHA5129ff5a690777caa67d2d234025f28a18ae75b1e2978569cb0770118edf55f9961fcfac6b0983c97781680d4a30edaa9b4e994bdb18b79a174205e92b1a35e4aca
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD5feb050d9ab4ef0f25b5cc822c8e16d55
SHA1da62b43c909648794c52d3ed69c1f1c1100dd292
SHA2565e7d3002fce7593e42f7d7696e95b6b46ba3005bf42e5488c05e5de3ce7b777b
SHA512e35ab937db387bf19e32889a9d295b6de077d9a8085ad2e70b93114ae5cbf021a51da8ff1417e8284536ec2e5c3837b5e5a07c7efae6c5fa0cdcbde1e674150f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD560d26e74e5a360d8269d9e1fdc1a906b
SHA16057c11539ade7769e80128fb34341effa41d488
SHA256085a52c155c7b9608cf331f83f0f25d60654795551a6cf6faac4d6de458866a8
SHA512ed983d7183e4273e90dc3b315eb1ec57d0273b85063b802aac3c9e170e627a1656bea8889681c32710345183089559daeda364e00374e28f4e219d74a7a008e5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD51e524d0cee6790ce09304bf0a526a752
SHA156a6597a317e544af14a9f5f504ebf9cf1e4ff11
SHA2567a6b50bf4c0e3515eacdc82502d016abfd949793922f067ca61ddeba5587c666
SHA512a6d71da00142d637544545756b25c9171ff3eaec935c04853d94abf48e2d4987829fcccee9d13fb42eb0ca5ed7e2f7560a21cfd6a71fda7f946f9185f127da2e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1Filesize
264KB
MD57c2885fff1553d7ca21d0cc74886bf11
SHA16625b3072186c42b9bcc056eef713bfd5351d1ef
SHA256e01c45c2f88831579cc84138af821962361f8b35200271b7d3263c54103535ce
SHA512e0741cc8dd38ba9ee76ac43b454d0736d1ba7b8cd3d48e7f136aad86607a7de22f6270286290d3371f29932a6c81154bb7f9e96b40ef182c1502f02f44738db4
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.datFilesize
10KB
MD56e2dd918b2c22ec9d38424b34577d88b
SHA1ce9b5ec7934ace13a02d64f494ec8cf6de8ce5c9
SHA256037e7f2cd9d518cafd37f55edee61feac13b4dfdd35f67b41d7af525d93b7f0f
SHA512fe292b07ea0f7db690e00640f29b5cf7de32ddcdc887c24075801e1b7ad756e94dab31e297efff6c9def49ec3ac20e22c71ba40afb7e4fb75bf0678b64328eca
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SettingsCache.txtFilesize
846KB
MD5766f5efd9efca73b6dfd0fb3d648639f
SHA171928a29c3affb9715d92542ef4cf3472e7931fe
SHA2569111e9a5093f97e15510bf3d3dc36fd4a736981215f79540454ce86893993fdc
SHA5121d4bb423d9cc9037f6974a389ff304e5b9fbd4bfd013a09d4ceeff3fd2a87ad81fe84b2ee880023984978391daf11540f353d391f35a4236b241ccced13a3434
-
C:\Users\Admin\AppData\Local\Temp\Procmon64.exeFilesize
1.2MB
MD58058758ae1fc0731cbdde5e3096d69fd
SHA19b8f4d4714f317d4d76213dc91c963426cff1e9d
SHA2562a5de6edf8da870633d1363b6e7030ef4fc5e4068d73cddf3fd32775e57d69cf
SHA512702715bb51b19dd1b0b1bc51034690b389bca6bda668f5492f5f15a06a8acd712c4c6e5f3a6dd7cbf4d457cd7ea2058bbe8257759f0f78013d57806a136f95af
-
C:\Users\Admin\AppData\Roaming\tor\cached-microdescs.newFilesize
18.6MB
MD584c369272178f23723af83bb1223e74e
SHA1f06fd0237f88f2abe989120de7ee939f785853b9
SHA256bb5108ca7c8e3e30dfc6549df5604c182ad4de4da5a2d766c45777b420d8647a
SHA512f86c1a0ea11c620b5572db7f374c09aa46fac6e471365a4451704108888f0a0591df74d4f2310df316047b634cb89abd203509981adb73720ba2ea51ba808bf4
-
C:\Users\Admin\Downloads\Computer-Virus-master.zipFilesize
37.3MB
MD559c2e5c19964bc8ad1a783a987627e45
SHA159a1cf1fcb0d081772f385cbdd1637f8fd562533
SHA2561924361f1e1a4507f8e46d22b984dc61f32eed47ee8ed524c73404f522ffb3f7
SHA512280e74f2f3750f38ff7731d76bb3d89f50b9345ffe469ac5f127a546bfa90622b3ec0d38d232b53ef095e383b398fa910cd86b16eead0e66d6e83832ff22aa65
-
C:\Users\Admin\Downloads\Computer-Virus-master.zip:Zone.IdentifierFilesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\27131715408663.batFilesize
468B
MD5b74544e34315b1d1d11c419f48aeb415
SHA183c7e4cf0c92985c05b04f71ba3868be9a76cb69
SHA25640e1acf2558f4ef1dd83295db48ada73bd11ddba854dfbbd08768d0dacd21193
SHA512bb656ced70a018704463b3995a5c08194747ca88d8ea4c66f75676cee1f03da8320545d30252984a0387b953cbf16fab8cbb40ec398c8307d34210c175c126a7
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\@[email protected]Filesize
933B
MD57e6b6da7c61fcb66f3f30166871def5b
SHA100f699cf9bbc0308f6e101283eca15a7c566d4f9
SHA2564a25d98c121bb3bd5b54e0b6a5348f7b09966bffeec30776e5a731813f05d49e
SHA512e5a56137f325904e0c7de1d0df38745f733652214f0cdb6ef173fa0743a334f95bed274df79469e270c9208e6bdc2e6251ef0cdd81af20fa1897929663e2c7d3
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\TaskData\Tor\taskhsvc.exeFilesize
3.0MB
MD5fe7eb54691ad6e6af77f8a9a0b6de26d
SHA153912d33bec3375153b7e4e68b78d66dab62671a
SHA256e48673680746fbe027e8982f62a83c298d6fb46ad9243de8e79b7e5a24dcd4eb
SHA5128ac6dc5bb016afc869fcbb713f6a14d3692e866b94f4f1ee83b09a7506a8cb58768bd47e081cf6e97b2dacf9f9a6a8ca240d7d20d0b67dbd33238cc861deae8f
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\b.wnryFilesize
1.4MB
MD5c17170262312f3be7027bc2ca825bf0c
SHA1f19eceda82973239a1fdc5826bce7691e5dcb4fb
SHA256d5e0e8694ddc0548d8e6b87c83d50f4ab85c1debadb106d6a6a794c3e746f4fa
SHA512c6160fd03ad659c8dd9cf2a83f9fdcd34f2db4f8f27f33c5afd52aced49dfa9ce4909211c221a0479dbbb6e6c985385557c495fc04d3400ff21a0fbbae42ee7c
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\c.wnryFilesize
780B
MD593f33b83f1f263e2419006d6026e7bc1
SHA11a4b36c56430a56af2e0ecabd754bf00067ce488
SHA256ef0ed0b717d1b956eb6c42ba1f4fd2283cf7c8416bed0afd1e8805ee0502f2b4
SHA51245bdd1a9a3118ee4d3469ee65a7a8fdb0f9315ca417821db058028ffb0ed145209f975232a9e64aba1c02b9664c854232221eb041d09231c330ae510f638afac
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\msg\m_bulgarian.wnryFilesize
46KB
MD595673b0f968c0f55b32204361940d184
SHA181e427d15a1a826b93e91c3d2fa65221c8ca9cff
SHA25640b37e7b80cf678d7dd302aaf41b88135ade6ddf44d89bdba19cf171564444bd
SHA5127601f1883edbb4150a9dc17084012323b3bfa66f6d19d3d0355cf82b6a1c9dce475d758da18b6d17a8b321bf6fca20915224dbaedcb3f4d16abfaf7a5fc21b92
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\msg\m_chinese (simplified).wnryFilesize
53KB
MD50252d45ca21c8e43c9742285c48e91ad
SHA15c14551d2736eef3a1c1970cc492206e531703c1
SHA256845d0e178aeebd6c7e2a2e9697b2bf6cf02028c50c288b3ba88fe2918ea2834a
SHA5121bfcf6c0e7c977d777f12bd20ac347630999c4d99bd706b40de7ff8f2f52e02560d68093142cc93722095657807a1480ce3fb6a2e000c488550548c497998755
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\msg\m_chinese (traditional).wnryFilesize
77KB
MD52efc3690d67cd073a9406a25005f7cea
SHA152c07f98870eabace6ec370b7eb562751e8067e9
SHA2565c7f6ad1ec4bc2c8e2c9c126633215daba7de731ac8b12be10ca157417c97f3a
SHA5120766c58e64d9cda5328e00b86f8482316e944aa2c26523a3c37289e22c34be4b70937033bebdb217f675e40db9fecdce0a0d516f9065a170e28286c2d218487c
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\msg\m_croatian.wnryFilesize
38KB
MD517194003fa70ce477326ce2f6deeb270
SHA1e325988f68d327743926ea317abb9882f347fa73
SHA2563f33734b2d34cce83936ce99c3494cd845f1d2c02d7f6da31d42dfc1ca15a171
SHA512dcf4ccf0b352a8b271827b3b8e181f7d6502ca0f8c9dda3dc6e53441bb4ae6e77b49c9c947cc3ede0bf323f09140a0c068a907f3c23ea2a8495d1ad96820051c
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\msg\m_czech.wnryFilesize
39KB
MD5537efeecdfa94cc421e58fd82a58ba9e
SHA13609456e16bc16ba447979f3aa69221290ec17d0
SHA2565afa4753afa048c6d6c39327ce674f27f5f6e5d3f2a060b7a8aed61725481150
SHA512e007786ffa09ccd5a24e5c6504c8de444929a2faaafad3712367c05615b7e1b0fbf7fbfff7028ed3f832ce226957390d8bf54308870e9ed597948a838da1137b
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\msg\m_danish.wnryFilesize
36KB
MD52c5a3b81d5c4715b7bea01033367fcb5
SHA1b548b45da8463e17199daafd34c23591f94e82cd
SHA256a75bb44284b9db8d702692f84909a7e23f21141866adf3db888042e9109a1cb6
SHA512490c5a892fac801b853c348477b1140755d4c53ca05726ac19d3649af4285c93523393a3667e209c71c80ac06ffd809f62dd69ae65012dcb00445d032f1277b3
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\msg\m_dutch.wnryFilesize
36KB
MD57a8d499407c6a647c03c4471a67eaad7
SHA1d573b6ac8e7e04a05cbbd6b7f6a9842f371d343b
SHA2562c95bef914da6c50d7bdedec601e589fbb4fda24c4863a7260f4f72bd025799c
SHA512608ef3ff0a517fe1e70ff41aeb277821565c5a9bee5103aa5e45c68d4763fce507c2a34d810f4cd242d163181f8341d9a69e93fe32aded6fbc7f544c55743f12
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\msg\m_english.wnryFilesize
36KB
MD5fe68c2dc0d2419b38f44d83f2fcf232e
SHA16c6e49949957215aa2f3dfb72207d249adf36283
SHA25626fd072fda6e12f8c2d3292086ef0390785efa2c556e2a88bd4673102af703e5
SHA512941fa0a1f6a5756ed54260994db6158a7ebeb9e18b5c8ca2f6530c579bc4455918df0b38c609f501ca466b3cc067b40e4b861ad6513373b483b36338ae20a810
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\msg\m_filipino.wnryFilesize
36KB
MD508b9e69b57e4c9b966664f8e1c27ab09
SHA12da1025bbbfb3cd308070765fc0893a48e5a85fa
SHA256d8489f8c16318e524b45de8b35d7e2c3cd8ed4821c136f12f5ef3c9fc3321324
SHA512966b5ed68be6b5ccd46e0de1fa868cfe5432d9bf82e1e2f6eb99b2aef3c92f88d96f4f4eec5e16381b9c6db80a68071e7124ca1474d664bdd77e1817ec600cb4
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\msg\m_finnish.wnryFilesize
37KB
MD535c2f97eea8819b1caebd23fee732d8f
SHA1e354d1cc43d6a39d9732adea5d3b0f57284255d2
SHA2561adfee058b98206cb4fbe1a46d3ed62a11e1dee2c7ff521c1eef7c706e6a700e
SHA512908149a6f5238fcccd86f7c374986d486590a0991ef5243f0cd9e63cc8e208158a9a812665233b09c3a478233d30f21e3d355b94f36b83644795556f147345bf
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\msg\m_french.wnryFilesize
37KB
MD54e57113a6bf6b88fdd32782a4a381274
SHA10fccbc91f0f94453d91670c6794f71348711061d
SHA2569bd38110e6523547aed50617ddc77d0920d408faeed2b7a21ab163fda22177bc
SHA5124f1918a12269c654d44e9d394bc209ef0bc32242be8833a2fba437b879125177e149f56f2fb0c302330dec328139b34982c04b3fefb045612b6cc9f83ec85aa9
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\msg\m_german.wnryFilesize
36KB
MD53d59bbb5553fe03a89f817819540f469
SHA126781d4b06ff704800b463d0f1fca3afd923a9fe
SHA2562adc900fafa9938d85ce53cb793271f37af40cf499bcc454f44975db533f0b61
SHA51295719ae80589f71209bb3cb953276538040e7111b994d757b0a24283aefe27aadbbe9eef3f1f823ce4cabc1090946d4a2a558607ac6cac6faca5971529b34dac
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\msg\m_greek.wnryFilesize
47KB
MD5fb4e8718fea95bb7479727fde80cb424
SHA11088c7653cba385fe994e9ae34a6595898f20aeb
SHA256e13cc9b13aa5074dc45d50379eceb17ee39a0c2531ab617d93800fe236758ca9
SHA51224db377af1569e4e2b2ebccec42564cea95a30f1ff43bcaf25a692f99567e027bcef4aacef008ec5f64ea2eef0c04be88d2b30bcadabb3919b5f45a6633940cb
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\msg\m_indonesian.wnryFilesize
36KB
MD53788f91c694dfc48e12417ce93356b0f
SHA1eb3b87f7f654b604daf3484da9e02ca6c4ea98b7
SHA25623e5e738aad10fb8ef89aa0285269aff728070080158fd3e7792fe9ed47c51f4
SHA512b7dd9e6dc7c2d023ff958caf132f0544c76fae3b2d8e49753257676cc541735807b4befdf483bcae94c2dcde3c878c783b4a89dca0fecbc78f5bbf7c356f35cd
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\msg\m_italian.wnryFilesize
36KB
MD530a200f78498990095b36f574b6e8690
SHA1c4b1b3c087bd12b063e98bca464cd05f3f7b7882
SHA25649f2c739e7d9745c0834dc817a71bf6676ccc24a4c28dcddf8844093aab3df07
SHA512c0da2aae82c397f6943a0a7b838f60eeef8f57192c5f498f2ecf05db824cfeb6d6ca830bf3715da7ee400aa8362bd64dc835298f3f0085ae7a744e6e6c690511
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\msg\m_japanese.wnryFilesize
79KB
MD5b77e1221f7ecd0b5d696cb66cda1609e
SHA151eb7a254a33d05edf188ded653005dc82de8a46
SHA2567e491e7b48d6e34f916624c1cda9f024e86fcbec56acda35e27fa99d530d017e
SHA512f435fd67954787e6b87460db026759410fbd25b2f6ea758118749c113a50192446861a114358443a129be817020b50f21d27b1ebd3d22c7be62082e8b45223fc
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\msg\m_korean.wnryFilesize
89KB
MD56735cb43fe44832b061eeb3f5956b099
SHA1d636daf64d524f81367ea92fdafa3726c909bee1
SHA256552aa0f82f37c9601114974228d4fc54f7434fe3ae7a276ef1ae98a0f608f1d0
SHA51260272801909dbba21578b22c49f6b0ba8cd0070f116476ff35b3ac8347b987790e4cc0334724244c4b13415a246e77a577230029e4561ae6f04a598c3f536c7e
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\msg\m_latvian.wnryFilesize
40KB
MD5c33afb4ecc04ee1bcc6975bea49abe40
SHA1fbea4f170507cde02b839527ef50b7ec74b4821f
SHA256a0356696877f2d94d645ae2df6ce6b370bd5c0d6db3d36def44e714525de0536
SHA5120d435f0836f61a5ff55b78c02fa47b191e5807a79d8a6e991f3115743df2141b3db42ba8bdad9ad259e12f5800828e9e72d7c94a6a5259312a447d669b03ec44
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\msg\m_norwegian.wnryFilesize
36KB
MD5ff70cc7c00951084175d12128ce02399
SHA175ad3b1ad4fb14813882d88e952208c648f1fd18
SHA256cb5da96b3dfcf4394713623dbf3831b2a0b8be63987f563e1c32edeb74cb6c3a
SHA512f01df3256d49325e5ec49fd265aa3f176020c8ffec60eb1d828c75a3fa18ff8634e1de824d77dfdd833768acff1f547303104620c70066a2708654a07ef22e19
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\msg\m_polish.wnryFilesize
38KB
MD5e79d7f2833a9c2e2553c7fe04a1b63f4
SHA13d9f56d2381b8fe16042aa7c4feb1b33f2baebff
SHA256519ad66009a6c127400c6c09e079903223bd82ecc18ad71b8e5cd79f5f9c053e
SHA512e0159c753491cac7606a7250f332e87bc6b14876bc7a1cf5625fa56ab4f09c485f7b231dd52e4ff0f5f3c29862afb1124c0efd0741613eb97a83cbe2668af5de
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\msg\m_portuguese.wnryFilesize
37KB
MD5fa948f7d8dfb21ceddd6794f2d56b44f
SHA1ca915fbe020caa88dd776d89632d7866f660fc7a
SHA256bd9f4b3aedf4f81f37ec0a028aabcb0e9a900e6b4de04e9271c8db81432e2a66
SHA5120d211bfb0ae953081dca00cd07f8c908c174fd6c47a8001fadc614203f0e55d9fbb7fa9b87c735d57101341ab36af443918ee00737ed4c19ace0a2b85497f41a
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\msg\m_romanian.wnryFilesize
50KB
MD5313e0ececd24f4fa1504118a11bc7986
SHA1e1b9ae804c7fb1d27f39db18dc0647bb04e75e9d
SHA25670c0f32ed379ae899e5ac975e20bbbacd295cf7cd50c36174d2602420c770ac1
SHA512c7500363c61baf8b77fce796d750f8f5e6886ff0a10f81c3240ea3ad4e5f101b597490dea8ab6bd9193457d35d8fd579fce1b88a1c8d85ebe96c66d909630730
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\msg\m_russian.wnryFilesize
46KB
MD5452615db2336d60af7e2057481e4cab5
SHA1442e31f6556b3d7de6eb85fbac3d2957b7f5eac6
SHA25602932052fafe97e6acaaf9f391738a3a826f5434b1a013abbfa7a6c1ade1e078
SHA5127613dc329abe7a3f32164c9a6b660f209a84b774ab9c008bf6503c76255b30ea9a743a6dc49a8de8df0bcb9aea5a33f7408ba27848d9562583ff51991910911f
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\msg\m_slovak.wnryFilesize
40KB
MD5c911aba4ab1da6c28cf86338ab2ab6cc
SHA1fee0fd58b8efe76077620d8abc7500dbfef7c5b0
SHA256e64178e339c8e10eac17a236a67b892d0447eb67b1dcd149763dad6fd9f72729
SHA5123491ed285a091a123a1a6d61aafbb8d5621ccc9e045a237a2f9c2cf6049e7420eb96ef30fdcea856b50454436e2ec468770f8d585752d73fafd676c4ef5e800a
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\msg\m_spanish.wnryFilesize
36KB
MD58d61648d34cba8ae9d1e2a219019add1
SHA12091e42fc17a0cc2f235650f7aad87abf8ba22c2
SHA25672f20024b2f69b45a1391f0a6474e9f6349625ce329f5444aec7401fe31f8de1
SHA51268489c33ba89edfe2e3aebaacf8ef848d2ea88dcbef9609c258662605e02d12cfa4ffdc1d266fc5878488e296d2848b2cb0bbd45f1e86ef959bab6162d284079
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\msg\m_swedish.wnryFilesize
37KB
MD5c7a19984eb9f37198652eaf2fd1ee25c
SHA106eafed025cf8c4d76966bf382ab0c5e1bd6a0ae
SHA256146f61db72297c9c0facffd560487f8d6a2846ecec92ecc7db19c8d618dbc3a4
SHA51243dd159f9c2eac147cbff1dda83f6a83dd0c59d2d7acac35ba8b407a04ec9a1110a6a8737535d060d100ede1cb75078cf742c383948c9d4037ef459d150f6020
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\msg\m_turkish.wnryFilesize
41KB
MD5531ba6b1a5460fc9446946f91cc8c94b
SHA1cc56978681bd546fd82d87926b5d9905c92a5803
SHA2566db650836d64350bbde2ab324407b8e474fc041098c41ecac6fd77d632a36415
SHA512ef25c3cf4343df85954114f59933c7cc8107266c8bcac3b5ea7718eb74dbee8ca8a02da39057e6ef26b64f1dfccd720dd3bf473f5ae340ba56941e87d6b796c9
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\msg\m_vietnamese.wnryFilesize
91KB
MD58419be28a0dcec3f55823620922b00fa
SHA12e4791f9cdfca8abf345d606f313d22b36c46b92
SHA2561f21838b244c80f8bed6f6977aa8a557b419cf22ba35b1fd4bf0f98989c5bdf8
SHA5128fca77e54480aea3c0c7a705263ed8fb83c58974f5f0f62f12cc97c8e0506ba2cdb59b70e59e9a6c44dd7cde6adeeec35b494d31a6a146ff5ba7006136ab9386
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\r.wnryFilesize
864B
MD53e0020fc529b1c2a061016dd2469ba96
SHA1c3a91c22b63f6fe709e7c29cafb29a2ee83e6ade
SHA256402751fa49e0cb68fe052cb3db87b05e71c1d950984d339940cf6b29409f2a7c
SHA5125ca3c134201ed39d96d72911c0498bae6f98701513fd7f1dc8512819b673f0ea580510fa94ed9413ccc73da18b39903772a7cbfa3478176181cee68c896e14cf
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\s.wnryFilesize
2.9MB
MD5ad4c9de7c8c40813f200ba1c2fa33083
SHA1d1af27518d455d432b62d73c6a1497d032f6120e
SHA256e18fdd912dfe5b45776e68d578c3af3547886cf1353d7086c8bee037436dff4b
SHA512115733d08e5f1a514808a20b070db7ff453fd149865f49c04365a8c6502fa1e5c3a31da3e21f688ab040f583cf1224a544aea9708ffab21405dde1c57f98e617
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\t.wnryFilesize
64KB
MD55dcaac857e695a65f5c3ef1441a73a8f
SHA17b10aaeee05e7a1efb43d9f837e9356ad55c07dd
SHA25697ebce49b14c46bebc9ec2448d00e1e397123b256e2be9eba5140688e7bc0ae6
SHA51206eb5e49d19b71a99770d1b11a5bb64a54bf3352f36e39a153469e54205075c203b08128dc2317259db206ab5323bdd93aaa252a066f57fb5c52ff28deedb5e2
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\taskdl.exeFilesize
20KB
MD54fef5e34143e646dbf9907c4374276f5
SHA147a9ad4125b6bd7c55e4e7da251e23f089407b8f
SHA2564a468603fdcb7a2eb5770705898cf9ef37aade532a7964642ecd705a74794b79
SHA5124550dd1787deb353ebd28363dd2cdccca861f6a5d9358120fa6aa23baa478b2a9eb43cef5e3f6426f708a0753491710ac05483fac4a046c26bec4234122434d5
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\taskse.exeFilesize
20KB
MD58495400f199ac77853c53b5a3f278f3e
SHA1be5d6279874da315e3080b06083757aad9b32c23
SHA2562ca2d550e603d74dedda03156023135b38da3630cb014e3d00b1263358c5f00d
SHA5120669c524a295a049fa4629b26f89788b2a74e1840bcdc50e093a0bd40830dd1279c9597937301c0072db6ece70adee4ace67c3c8a4fb2db6deafd8f1e887abe4
-
C:\Users\Admin\Downloads\Computer-Virus-master\Computer-Virus-master\WannaCry\EternalBlue\sources\u.wnryFilesize
240KB
MD57bf2b57f2a205768755c07f238fb32cc
SHA145356a9dd616ed7161a3b9192e2f318d0ab5ad10
SHA256b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25
SHA51291a39e919296cb5c6eccba710b780519d90035175aa460ec6dbe631324e5e5753bd8d87f395b5481bcd7e1ad623b31a34382d81faae06bef60ec28b49c3122a9
-
C:\Users\Admin\Downloads\CuteVirusCollection-master.zipFilesize
47KB
MD5ea987be7e855f60574363ae4fe8a661f
SHA18f2c032dbcf3e92faf5d170a9685434a0f078be5
SHA2563ef41995d33566fdd05e9ff69ad3df99364f3633624230d5858087495389d3fc
SHA5126230bac1b02eb034f91c83f35026c46bae3bdaa96aaed550aba920cc1bf9c711272f3711fa1b2b63de728420763fc30e430184264e3e715881f7918c53bde9cf
-
\??\pipe\LOCAL\crashpad_2660_OJBLZPIQOHRITOOVMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/444-0-0x0000000074CEE000-0x0000000074CEF000-memory.dmpFilesize
4KB
-
memory/444-1-0x0000000000A00000-0x0000000000A08000-memory.dmpFilesize
32KB
-
memory/1652-3560-0x0000000000E50000-0x00000000010C8000-memory.dmpFilesize
2.5MB
-
memory/1652-3483-0x0000000000E50000-0x00000000010C8000-memory.dmpFilesize
2.5MB
-
memory/1724-2862-0x0000000000A00000-0x0000000000CFE000-memory.dmpFilesize
3.0MB
-
memory/1724-2937-0x0000000000A00000-0x0000000000CFE000-memory.dmpFilesize
3.0MB
-
memory/1724-2857-0x00000000734E0000-0x0000000073562000-memory.dmpFilesize
520KB
-
memory/1724-2855-0x0000000073790000-0x0000000073807000-memory.dmpFilesize
476KB
-
memory/1724-2854-0x0000000073810000-0x0000000073832000-memory.dmpFilesize
136KB
-
memory/1724-2853-0x0000000073840000-0x000000007385C000-memory.dmpFilesize
112KB
-
memory/1724-2852-0x0000000073860000-0x00000000738E2000-memory.dmpFilesize
520KB
-
memory/1724-2872-0x0000000000A00000-0x0000000000CFE000-memory.dmpFilesize
3.0MB
-
memory/1724-2883-0x0000000000A00000-0x0000000000CFE000-memory.dmpFilesize
3.0MB
-
memory/1724-2928-0x0000000000A00000-0x0000000000CFE000-memory.dmpFilesize
3.0MB
-
memory/1724-2851-0x0000000000A00000-0x0000000000CFE000-memory.dmpFilesize
3.0MB
-
memory/1724-2856-0x0000000073570000-0x000000007378C000-memory.dmpFilesize
2.1MB
-
memory/1724-2952-0x0000000000A00000-0x0000000000CFE000-memory.dmpFilesize
3.0MB
-
memory/1724-2823-0x00000000734E0000-0x0000000073562000-memory.dmpFilesize
520KB
-
memory/1724-2945-0x0000000000A00000-0x0000000000CFE000-memory.dmpFilesize
3.0MB
-
memory/1724-2824-0x0000000073810000-0x0000000073832000-memory.dmpFilesize
136KB
-
memory/1724-2825-0x0000000000A00000-0x0000000000CFE000-memory.dmpFilesize
3.0MB
-
memory/1724-2822-0x0000000073570000-0x000000007378C000-memory.dmpFilesize
2.1MB
-
memory/1724-2821-0x0000000073860000-0x00000000738E2000-memory.dmpFilesize
520KB
-
memory/1724-2950-0x0000000073570000-0x000000007378C000-memory.dmpFilesize
2.1MB
-
memory/3992-1250-0x0000000010000000-0x0000000010010000-memory.dmpFilesize
64KB