Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    62s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    06/12/2022, 16:46

General

  • Target

    e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c.exe

  • Size

    700KB

  • MD5

    bdf17ff679149c3b8149bb9a7f5b882c

  • SHA1

    1778fc7682d99c896da7e27328901a64763df2a3

  • SHA256

    e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

  • SHA512

    19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

  • SSDEEP

    12288:vbKlFwfZCvqTtABYhuQF0bFtNU9jPldHNnJ9Is7rG5C37TZHXxFnrxO+uNUqx:vb4wfZdTts8uQeuJR8d5uTrZA/x

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 35 IoCs
  • Executes dropped EXE 64 IoCs
  • Sets file to hidden 1 TTPs 64 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Loads dropped DLL 64 IoCs
  • Adds Run key to start application 2 TTPs 35 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of SetThreadContext 35 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs ping.exe 1 TTPs 35 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 35 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c.exe
    "C:\Users\Admin\AppData\Local\Temp\e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1104
    • C:\Users\Admin\AppData\Local\Temp\e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c.exe
      "C:\Users\Admin\AppData\Local\Temp\e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:976
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c.exe" +s +h
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1608
        • C:\Windows\SysWOW64\attrib.exe
          attrib "C:\Users\Admin\AppData\Local\Temp\e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c.exe" +s +h
          4⤵
          • Sets file to hidden
          • Views/modifies file attributes
          PID:1652
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1088
        • C:\Windows\SysWOW64\attrib.exe
          attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
          4⤵
          • Sets file to hidden
          • Views/modifies file attributes
          PID:520
      • C:\Windows\SysWOW64\etc\wnlogon.exe
        "C:\Windows\system32\etc\wnlogon.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1760
        • C:\Windows\SysWOW64\etc\wnlogon.exe
          "C:\Windows\SysWOW64\etc\wnlogon.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1576
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
            5⤵
              PID:288
              • C:\Windows\SysWOW64\attrib.exe
                attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                6⤵
                • Sets file to hidden
                • Drops file in System32 directory
                • Views/modifies file attributes
                PID:1748
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc" +s +h
              5⤵
                PID:1984
              • C:\Windows\SysWOW64\etc\wnlogon.exe
                "C:\Windows\system32\etc\wnlogon.exe"
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of SetWindowsHookEx
                PID:812
                • C:\Windows\SysWOW64\etc\wnlogon.exe
                  "C:\Windows\SysWOW64\etc\wnlogon.exe"
                  6⤵
                  • Modifies WinLogon for persistence
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Adds Run key to start application
                  • Drops file in System32 directory
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1684
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                    7⤵
                      PID:1440
                      • C:\Windows\SysWOW64\attrib.exe
                        attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                        8⤵
                        • Sets file to hidden
                        • Drops file in System32 directory
                        PID:936
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc" +s +h
                      7⤵
                        PID:1996
                        • C:\Windows\SysWOW64\attrib.exe
                          attrib "C:\Windows\SysWOW64\etc" +s +h
                          8⤵
                          • Sets file to hidden
                          • Drops file in System32 directory
                          • Views/modifies file attributes
                          PID:1704
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Windows\SysWOW64\etc\wnlogon.exe"
                        7⤵
                          PID:1876
                          • C:\Windows\SysWOW64\PING.EXE
                            ping 127.0.0.1 -n 5
                            8⤵
                            • Runs ping.exe
                            PID:1820
                        • C:\Windows\SysWOW64\etc\wnlogon.exe
                          "C:\Windows\system32\etc\wnlogon.exe"
                          7⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • Suspicious use of SetWindowsHookEx
                          PID:1036
                          • C:\Windows\SysWOW64\etc\wnlogon.exe
                            "C:\Windows\SysWOW64\etc\wnlogon.exe"
                            8⤵
                            • Modifies WinLogon for persistence
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Adds Run key to start application
                            • Drops file in System32 directory
                            PID:968
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc" +s +h
                              9⤵
                                PID:2032
                                • C:\Windows\SysWOW64\attrib.exe
                                  attrib "C:\Windows\SysWOW64\etc" +s +h
                                  10⤵
                                  • Sets file to hidden
                                  • Views/modifies file attributes
                                  PID:1988
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                9⤵
                                  PID:1144
                                  • C:\Windows\SysWOW64\attrib.exe
                                    attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                    10⤵
                                    • Sets file to hidden
                                    • Views/modifies file attributes
                                    PID:1480
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                  9⤵
                                    PID:1148
                                    • C:\Windows\SysWOW64\PING.EXE
                                      ping 127.0.0.1 -n 5
                                      10⤵
                                      • Runs ping.exe
                                      PID:2024
                                  • C:\Windows\SysWOW64\etc\wnlogon.exe
                                    "C:\Windows\system32\etc\wnlogon.exe"
                                    9⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetThreadContext
                                    • Suspicious use of SetWindowsHookEx
                                    PID:584
                                    • C:\Windows\SysWOW64\etc\wnlogon.exe
                                      "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                      10⤵
                                      • Modifies WinLogon for persistence
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Adds Run key to start application
                                      • Drops file in System32 directory
                                      PID:1744
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                        11⤵
                                          PID:1096
                                          • C:\Windows\SysWOW64\attrib.exe
                                            attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                            12⤵
                                            • Sets file to hidden
                                            • Views/modifies file attributes
                                            PID:612
                                            • C:\Windows\SysWOW64\attrib.exe
                                              attrib "C:\Windows\SysWOW64\etc" +s +h
                                              13⤵
                                              • Sets file to hidden
                                              • Views/modifies file attributes
                                              PID:1572
                                        • C:\Windows\SysWOW64\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc" +s +h
                                          11⤵
                                            PID:1960
                                            • C:\Windows\SysWOW64\attrib.exe
                                              attrib "C:\Windows\SysWOW64\etc" +s +h
                                              12⤵
                                              • Sets file to hidden
                                              • Views/modifies file attributes
                                              PID:652
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                            11⤵
                                              PID:1988
                                              • C:\Windows\SysWOW64\PING.EXE
                                                ping 127.0.0.1 -n 5
                                                12⤵
                                                • Runs ping.exe
                                                PID:1396
                                            • C:\Windows\SysWOW64\etc\wnlogon.exe
                                              "C:\Windows\system32\etc\wnlogon.exe"
                                              11⤵
                                                PID:1488
                                                • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                  "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                  12⤵
                                                  • Modifies WinLogon for persistence
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Adds Run key to start application
                                                  • Drops file in System32 directory
                                                  PID:1452
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                    13⤵
                                                      PID:1180
                                                      • C:\Windows\SysWOW64\attrib.exe
                                                        attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                        14⤵
                                                        • Sets file to hidden
                                                        • Views/modifies file attributes
                                                        PID:1544
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                      13⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetThreadContext
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:1488
                                                    • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                      "C:\Windows\system32\etc\wnlogon.exe"
                                                      13⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetThreadContext
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:996
                                                      • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                        "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                        14⤵
                                                        • Modifies WinLogon for persistence
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • Adds Run key to start application
                                                        • Drops file in System32 directory
                                                        PID:1676
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                          15⤵
                                                            PID:860
                                                            • C:\Windows\SysWOW64\attrib.exe
                                                              attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                              16⤵
                                                              • Sets file to hidden
                                                              • Drops file in System32 directory
                                                              • Views/modifies file attributes
                                                              PID:932
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc" +s +h
                                                            15⤵
                                                              PID:364
                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                16⤵
                                                                • Sets file to hidden
                                                                • Drops file in System32 directory
                                                                • Views/modifies file attributes
                                                                PID:1132
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                              15⤵
                                                                PID:2080
                                                              • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                "C:\Windows\system32\etc\wnlogon.exe"
                                                                15⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetThreadContext
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:2060
                                                                • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                  "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                  16⤵
                                                                  • Modifies WinLogon for persistence
                                                                  • Executes dropped EXE
                                                                  • Loads dropped DLL
                                                                  • Adds Run key to start application
                                                                  • Drops file in System32 directory
                                                                  PID:2156
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                    17⤵
                                                                      PID:2204
                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                        attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                        18⤵
                                                                        • Sets file to hidden
                                                                        • Views/modifies file attributes
                                                                        PID:2264
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                      17⤵
                                                                        PID:2224
                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                          attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                          18⤵
                                                                          • Sets file to hidden
                                                                          • Views/modifies file attributes
                                                                          PID:2272
                                                                      • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                        "C:\Windows\system32\etc\wnlogon.exe"
                                                                        17⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious use of SetThreadContext
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:2296
                                                                        • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                          "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                          18⤵
                                                                          • Modifies WinLogon for persistence
                                                                          • Executes dropped EXE
                                                                          • Loads dropped DLL
                                                                          • Adds Run key to start application
                                                                          • Drops file in System32 directory
                                                                          PID:2400
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                            19⤵
                                                                              PID:2440
                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                20⤵
                                                                                • Sets file to hidden
                                                                                • Drops file in System32 directory
                                                                                • Views/modifies file attributes
                                                                                PID:2508
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                              19⤵
                                                                                PID:2448
                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                  attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                  20⤵
                                                                                  • Sets file to hidden
                                                                                  • Views/modifies file attributes
                                                                                  PID:2516
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                19⤵
                                                                                  PID:2548
                                                                                  • C:\Windows\SysWOW64\PING.EXE
                                                                                    ping 127.0.0.1 -n 5
                                                                                    20⤵
                                                                                    • Runs ping.exe
                                                                                    PID:2588
                                                                                • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                  "C:\Windows\system32\etc\wnlogon.exe"
                                                                                  19⤵
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious use of SetThreadContext
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  PID:2528
                                                                                  • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                    "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                    20⤵
                                                                                    • Modifies WinLogon for persistence
                                                                                    • Executes dropped EXE
                                                                                    • Loads dropped DLL
                                                                                    • Adds Run key to start application
                                                                                    PID:2620
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                      21⤵
                                                                                        PID:2676
                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                          attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                          22⤵
                                                                                          • Views/modifies file attributes
                                                                                          PID:2736
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                        21⤵
                                                                                          PID:2684
                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                            attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                            22⤵
                                                                                            • Sets file to hidden
                                                                                            • Views/modifies file attributes
                                                                                            PID:2744
                                                                                        • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                          "C:\Windows\system32\etc\wnlogon.exe"
                                                                                          21⤵
                                                                                          • Executes dropped EXE
                                                                                          • Suspicious use of SetThreadContext
                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                          PID:2756
                                                                                          • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                            "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                            22⤵
                                                                                            • Modifies WinLogon for persistence
                                                                                            • Executes dropped EXE
                                                                                            • Loads dropped DLL
                                                                                            • Adds Run key to start application
                                                                                            • Drops file in System32 directory
                                                                                            PID:2844
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                              23⤵
                                                                                                PID:2892
                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                  attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                  24⤵
                                                                                                  • Sets file to hidden
                                                                                                  • Views/modifies file attributes
                                                                                                  PID:2960
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                23⤵
                                                                                                  PID:2900
                                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                                    attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                    24⤵
                                                                                                    • Sets file to hidden
                                                                                                    • Views/modifies file attributes
                                                                                                    PID:2952
                                                                                                • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                  "C:\Windows\system32\etc\wnlogon.exe"
                                                                                                  23⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Suspicious use of SetThreadContext
                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                  PID:2968
                                                                                                  • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                    "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                    24⤵
                                                                                                    • Modifies WinLogon for persistence
                                                                                                    • Executes dropped EXE
                                                                                                    • Loads dropped DLL
                                                                                                    • Adds Run key to start application
                                                                                                    • Drops file in System32 directory
                                                                                                    PID:3052
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                      25⤵
                                                                                                        PID:2096
                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                          attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                          26⤵
                                                                                                          • Sets file to hidden
                                                                                                          • Views/modifies file attributes
                                                                                                          PID:1132
                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                        "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                        25⤵
                                                                                                          PID:1920
                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                            attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                            26⤵
                                                                                                            • Sets file to hidden
                                                                                                            • Views/modifies file attributes
                                                                                                            PID:2136
                                                                                                        • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                          "C:\Windows\system32\etc\wnlogon.exe"
                                                                                                          25⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • Suspicious use of SetThreadContext
                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                          PID:2112
                                                                                                          • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                            "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                            26⤵
                                                                                                            • Modifies WinLogon for persistence
                                                                                                            • Executes dropped EXE
                                                                                                            • Loads dropped DLL
                                                                                                            • Adds Run key to start application
                                                                                                            • Drops file in System32 directory
                                                                                                            PID:2272
                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                              27⤵
                                                                                                                PID:2336
                                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                                  attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                  28⤵
                                                                                                                  • Sets file to hidden
                                                                                                                  • Views/modifies file attributes
                                                                                                                  PID:1176
                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                27⤵
                                                                                                                  PID:2196
                                                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                                                    attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                    28⤵
                                                                                                                    • Views/modifies file attributes
                                                                                                                    PID:2396
                                                                                                                • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                  "C:\Windows\system32\etc\wnlogon.exe"
                                                                                                                  27⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                  PID:1556
                                                                                                                  • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                    "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                    28⤵
                                                                                                                    • Modifies WinLogon for persistence
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Loads dropped DLL
                                                                                                                    • Adds Run key to start application
                                                                                                                    • Drops file in System32 directory
                                                                                                                    PID:2560
                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                      29⤵
                                                                                                                        PID:2612
                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                          attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                          30⤵
                                                                                                                          • Sets file to hidden
                                                                                                                          • Drops file in System32 directory
                                                                                                                          • Views/modifies file attributes
                                                                                                                          PID:2628
                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                        "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                        29⤵
                                                                                                                          PID:604
                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                            attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                            30⤵
                                                                                                                            • Sets file to hidden
                                                                                                                            • Views/modifies file attributes
                                                                                                                            PID:2640
                                                                                                                        • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                          "C:\Windows\system32\etc\wnlogon.exe"
                                                                                                                          29⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Suspicious use of SetThreadContext
                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                          PID:2660
                                                                                                                          • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                            "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                            30⤵
                                                                                                                            • Modifies WinLogon for persistence
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Loads dropped DLL
                                                                                                                            • Adds Run key to start application
                                                                                                                            • Drops file in System32 directory
                                                                                                                            PID:2656
                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                              31⤵
                                                                                                                                PID:2140
                                                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                  attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                  32⤵
                                                                                                                                  • Sets file to hidden
                                                                                                                                  • Views/modifies file attributes
                                                                                                                                  PID:2964
                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                31⤵
                                                                                                                                  PID:2132
                                                                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                    attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                    32⤵
                                                                                                                                    • Sets file to hidden
                                                                                                                                    • Views/modifies file attributes
                                                                                                                                    PID:2884
                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                  "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                  31⤵
                                                                                                                                    PID:3000
                                                                                                                                    • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                      ping 127.0.0.1 -n 5
                                                                                                                                      32⤵
                                                                                                                                      • Runs ping.exe
                                                                                                                                      PID:3004
                                                                                                                                  • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                    "C:\Windows\system32\etc\wnlogon.exe"
                                                                                                                                    31⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Suspicious use of SetThreadContext
                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                    PID:2932
                                                                                                                                    • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                      "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                      32⤵
                                                                                                                                      • Modifies WinLogon for persistence
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      • Loads dropped DLL
                                                                                                                                      • Adds Run key to start application
                                                                                                                                      • Drops file in System32 directory
                                                                                                                                      PID:2384
                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                        "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                        33⤵
                                                                                                                                          PID:1832
                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                            attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                            34⤵
                                                                                                                                            • Sets file to hidden
                                                                                                                                            • Views/modifies file attributes
                                                                                                                                            PID:2176
                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                          "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                          33⤵
                                                                                                                                            PID:1132
                                                                                                                                            • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                              attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                              34⤵
                                                                                                                                              • Sets file to hidden
                                                                                                                                              • Drops file in System32 directory
                                                                                                                                              • Views/modifies file attributes
                                                                                                                                              PID:1808
                                                                                                                                          • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                            "C:\Windows\system32\etc\wnlogon.exe"
                                                                                                                                            33⤵
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            • Suspicious use of SetThreadContext
                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                            PID:1716
                                                                                                                                            • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                              "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                              34⤵
                                                                                                                                              • Modifies WinLogon for persistence
                                                                                                                                              • Executes dropped EXE
                                                                                                                                              • Loads dropped DLL
                                                                                                                                              • Adds Run key to start application
                                                                                                                                              PID:1176
                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                35⤵
                                                                                                                                                  PID:2508
                                                                                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                    attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                    36⤵
                                                                                                                                                    • Sets file to hidden
                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                    • Views/modifies file attributes
                                                                                                                                                    PID:2024
                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                  "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                                  35⤵
                                                                                                                                                    PID:2352
                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                    "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                    35⤵
                                                                                                                                                      PID:1396
                                                                                                                                                      • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                        ping 127.0.0.1 -n 5
                                                                                                                                                        36⤵
                                                                                                                                                        • Runs ping.exe
                                                                                                                                                        PID:2428
                                                                                                                                                    • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                                      "C:\Windows\system32\etc\wnlogon.exe"
                                                                                                                                                      35⤵
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      • Suspicious use of SetThreadContext
                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                      PID:1356
                                                                                                                                                      • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                                        "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                        36⤵
                                                                                                                                                        • Modifies WinLogon for persistence
                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                        • Loads dropped DLL
                                                                                                                                                        • Adds Run key to start application
                                                                                                                                                        PID:2572
                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                          "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                                          37⤵
                                                                                                                                                            PID:2696
                                                                                                                                                            • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                              attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                                              38⤵
                                                                                                                                                              • Sets file to hidden
                                                                                                                                                              • Views/modifies file attributes
                                                                                                                                                              PID:2148
                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                            37⤵
                                                                                                                                                              PID:2712
                                                                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                                38⤵
                                                                                                                                                                • Sets file to hidden
                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                • Views/modifies file attributes
                                                                                                                                                                PID:2664
                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                              "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                              37⤵
                                                                                                                                                                PID:2964
                                                                                                                                                                • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                  ping 127.0.0.1 -n 5
                                                                                                                                                                  38⤵
                                                                                                                                                                  • Runs ping.exe
                                                                                                                                                                  PID:3028
                                                                                                                                                              • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                                                "C:\Windows\system32\etc\wnlogon.exe"
                                                                                                                                                                37⤵
                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                PID:2960
                                                                                                                                                                • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                                                  "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                  38⤵
                                                                                                                                                                  • Modifies WinLogon for persistence
                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                  • Loads dropped DLL
                                                                                                                                                                  • Adds Run key to start application
                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                  PID:3068
                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                                                    39⤵
                                                                                                                                                                      PID:2152
                                                                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                        attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                                                        40⤵
                                                                                                                                                                        • Sets file to hidden
                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                        • Views/modifies file attributes
                                                                                                                                                                        PID:1640
                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                                      39⤵
                                                                                                                                                                        PID:1552
                                                                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                          attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                                          40⤵
                                                                                                                                                                          • Sets file to hidden
                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                          • Views/modifies file attributes
                                                                                                                                                                          PID:2212
                                                                                                                                                                      • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                                                        "C:\Windows\system32\etc\wnlogon.exe"
                                                                                                                                                                        39⤵
                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                                        PID:2184
                                                                                                                                                                        • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                                                          "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                          40⤵
                                                                                                                                                                          • Modifies WinLogon for persistence
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          • Loads dropped DLL
                                                                                                                                                                          • Adds Run key to start application
                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                          PID:1460
                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                                                            41⤵
                                                                                                                                                                              PID:2624
                                                                                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                                                                42⤵
                                                                                                                                                                                • Sets file to hidden
                                                                                                                                                                                • Views/modifies file attributes
                                                                                                                                                                                PID:2956
                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                                              41⤵
                                                                                                                                                                                PID:2920
                                                                                                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                  attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                                                  42⤵
                                                                                                                                                                                  • Views/modifies file attributes
                                                                                                                                                                                  PID:2876
                                                                                                                                                                              • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                                                                "C:\Windows\system32\etc\wnlogon.exe"
                                                                                                                                                                                41⤵
                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                PID:2564
                                                                                                                                                                                • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                                                                  "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                  42⤵
                                                                                                                                                                                  • Modifies WinLogon for persistence
                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                  • Loads dropped DLL
                                                                                                                                                                                  • Adds Run key to start application
                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                  PID:2288
                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                                                                    43⤵
                                                                                                                                                                                      PID:2600
                                                                                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                        attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                                                                        44⤵
                                                                                                                                                                                        • Sets file to hidden
                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                        • Views/modifies file attributes
                                                                                                                                                                                        PID:2708
                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                                                      43⤵
                                                                                                                                                                                        PID:2652
                                                                                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                          attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                                                          44⤵
                                                                                                                                                                                          • Sets file to hidden
                                                                                                                                                                                          • Views/modifies file attributes
                                                                                                                                                                                          PID:516
                                                                                                                                                                                      • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                                                                        "C:\Windows\system32\etc\wnlogon.exe"
                                                                                                                                                                                        43⤵
                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                        PID:2664
                                                                                                                                                                                        • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                                                                          "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                          44⤵
                                                                                                                                                                                          • Modifies WinLogon for persistence
                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                          • Loads dropped DLL
                                                                                                                                                                                          • Adds Run key to start application
                                                                                                                                                                                          PID:1480
                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                                                                            45⤵
                                                                                                                                                                                              PID:1420
                                                                                                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                                                                                46⤵
                                                                                                                                                                                                • Sets file to hidden
                                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                                PID:2488
                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                                                              45⤵
                                                                                                                                                                                                PID:3056
                                                                                                                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                  attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                                                                  46⤵
                                                                                                                                                                                                  • Sets file to hidden
                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                  PID:2480
                                                                                                                                                                                              • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                                                                                "C:\Windows\system32\etc\wnlogon.exe"
                                                                                                                                                                                                45⤵
                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                PID:2500
                                                                                                                                                                                                • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                                                                                  "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                                  46⤵
                                                                                                                                                                                                  • Modifies WinLogon for persistence
                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                  • Loads dropped DLL
                                                                                                                                                                                                  • Adds Run key to start application
                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                  PID:2640
                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                                                                                    47⤵
                                                                                                                                                                                                      PID:2328
                                                                                                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                        attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                                                                                        48⤵
                                                                                                                                                                                                        • Sets file to hidden
                                                                                                                                                                                                        • Views/modifies file attributes
                                                                                                                                                                                                        PID:2500
                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                                                                      47⤵
                                                                                                                                                                                                        PID:2872
                                                                                                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                          attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                                                                          48⤵
                                                                                                                                                                                                          • Sets file to hidden
                                                                                                                                                                                                          • Views/modifies file attributes
                                                                                                                                                                                                          PID:2480
                                                                                                                                                                                                      • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                                                                                        "C:\Windows\system32\etc\wnlogon.exe"
                                                                                                                                                                                                        47⤵
                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                        PID:892
                                                                                                                                                                                                        • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                                                                                          "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                                          48⤵
                                                                                                                                                                                                          • Modifies WinLogon for persistence
                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                          • Loads dropped DLL
                                                                                                                                                                                                          • Adds Run key to start application
                                                                                                                                                                                                          PID:2480
                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                                                                                            49⤵
                                                                                                                                                                                                              PID:2564
                                                                                                                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                                                                                                50⤵
                                                                                                                                                                                                                • Sets file to hidden
                                                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                                                • Views/modifies file attributes
                                                                                                                                                                                                                PID:3128
                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                                                                              49⤵
                                                                                                                                                                                                                PID:3080
                                                                                                                                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                  attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                                                                                  50⤵
                                                                                                                                                                                                                  • Sets file to hidden
                                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                                  • Views/modifies file attributes
                                                                                                                                                                                                                  PID:3136
                                                                                                                                                                                                              • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                                                                                                "C:\Windows\system32\etc\wnlogon.exe"
                                                                                                                                                                                                                49⤵
                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                PID:3144
                                                                                                                                                                                                                • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                                                                                                  "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                                                  50⤵
                                                                                                                                                                                                                  • Modifies WinLogon for persistence
                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                  • Loads dropped DLL
                                                                                                                                                                                                                  • Adds Run key to start application
                                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                                  PID:3212
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                                                                                                    51⤵
                                                                                                                                                                                                                      PID:3252
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                        attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                                                                                                        52⤵
                                                                                                                                                                                                                        • Sets file to hidden
                                                                                                                                                                                                                        • Views/modifies file attributes
                                                                                                                                                                                                                        PID:3316
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                                                                                      51⤵
                                                                                                                                                                                                                        PID:3260
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                          attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                                                                                          52⤵
                                                                                                                                                                                                                          • Sets file to hidden
                                                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                                                          • Views/modifies file attributes
                                                                                                                                                                                                                          PID:3324
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                                                                                                        "C:\Windows\system32\etc\wnlogon.exe"
                                                                                                                                                                                                                        51⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                        PID:3332
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                                                                                                          "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                                                          52⤵
                                                                                                                                                                                                                          • Modifies WinLogon for persistence
                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                          • Loads dropped DLL
                                                                                                                                                                                                                          • Adds Run key to start application
                                                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                                                          PID:3408
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                                                                                                            53⤵
                                                                                                                                                                                                                              PID:3448
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                                                                                                                54⤵
                                                                                                                                                                                                                                • Views/modifies file attributes
                                                                                                                                                                                                                                PID:3488
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                                                                                              53⤵
                                                                                                                                                                                                                                PID:3464
                                                                                                                                                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                  attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                                                                                                  54⤵
                                                                                                                                                                                                                                  • Sets file to hidden
                                                                                                                                                                                                                                  • Views/modifies file attributes
                                                                                                                                                                                                                                  PID:3516
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                                                                                                                "C:\Windows\system32\etc\wnlogon.exe"
                                                                                                                                                                                                                                53⤵
                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                PID:3528
                                                                                                                                                                                                                                • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                                                                                                                  "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                                                                  54⤵
                                                                                                                                                                                                                                  • Modifies WinLogon for persistence
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  • Loads dropped DLL
                                                                                                                                                                                                                                  • Adds Run key to start application
                                                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                                                  PID:3600
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                                                                                                                    55⤵
                                                                                                                                                                                                                                      PID:3636
                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                        attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                                                                                                                        56⤵
                                                                                                                                                                                                                                        • Sets file to hidden
                                                                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                                                                        • Views/modifies file attributes
                                                                                                                                                                                                                                        PID:3704
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                                                                                                      55⤵
                                                                                                                                                                                                                                        PID:3644
                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                          attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                                                                                                          56⤵
                                                                                                                                                                                                                                          • Sets file to hidden
                                                                                                                                                                                                                                          • Views/modifies file attributes
                                                                                                                                                                                                                                          PID:3712
                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                                                                                                                        "C:\Windows\system32\etc\wnlogon.exe"
                                                                                                                                                                                                                                        55⤵
                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                        PID:3720
                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                                                                                                                          "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                                                                          56⤵
                                                                                                                                                                                                                                          • Modifies WinLogon for persistence
                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                          • Loads dropped DLL
                                                                                                                                                                                                                                          • Adds Run key to start application
                                                                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                                                                          PID:3792
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                                                                                                                            57⤵
                                                                                                                                                                                                                                              PID:3836
                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                                                                                                                                58⤵
                                                                                                                                                                                                                                                • Sets file to hidden
                                                                                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                                                                                • Views/modifies file attributes
                                                                                                                                                                                                                                                PID:3896
                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                                                                                                              57⤵
                                                                                                                                                                                                                                                PID:3852
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                  attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                                                                                                                  58⤵
                                                                                                                                                                                                                                                  • Sets file to hidden
                                                                                                                                                                                                                                                  PID:3904
                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                                                                                                                                "C:\Windows\system32\etc\wnlogon.exe"
                                                                                                                                                                                                                                                57⤵
                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                PID:3916
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                                                                                                                                  "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                                                                                  58⤵
                                                                                                                                                                                                                                                  • Modifies WinLogon for persistence
                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                  • Loads dropped DLL
                                                                                                                                                                                                                                                  • Adds Run key to start application
                                                                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                                                                  PID:3988
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                                                                                                                                    59⤵
                                                                                                                                                                                                                                                      PID:4024
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                        attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                                                                                                                                        60⤵
                                                                                                                                                                                                                                                        • Sets file to hidden
                                                                                                                                                                                                                                                        • Views/modifies file attributes
                                                                                                                                                                                                                                                        PID:2544
                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                                                                                                                      59⤵
                                                                                                                                                                                                                                                        PID:4036
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                          attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                                                                                                                          60⤵
                                                                                                                                                                                                                                                          • Sets file to hidden
                                                                                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                                                                                          • Views/modifies file attributes
                                                                                                                                                                                                                                                          PID:4088
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                                                                                                                                        "C:\Windows\system32\etc\wnlogon.exe"
                                                                                                                                                                                                                                                        59⤵
                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                        PID:3108
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                                                                                                                                          "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                                                                                          60⤵
                                                                                                                                                                                                                                                          • Modifies WinLogon for persistence
                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                          • Loads dropped DLL
                                                                                                                                                                                                                                                          • Adds Run key to start application
                                                                                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                                                                                          PID:3116
                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                                                                                                                                            61⤵
                                                                                                                                                                                                                                                              PID:3232
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                                                                                                                                                62⤵
                                                                                                                                                                                                                                                                • Sets file to hidden
                                                                                                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                                                                                                • Views/modifies file attributes
                                                                                                                                                                                                                                                                PID:3244
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                                                                                                                              61⤵
                                                                                                                                                                                                                                                                PID:3284
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                  attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                                                                                                                                  62⤵
                                                                                                                                                                                                                                                                  • Sets file to hidden
                                                                                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                                                                                  • Views/modifies file attributes
                                                                                                                                                                                                                                                                  PID:3364
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                                                                                                                                                "C:\Windows\system32\etc\wnlogon.exe"
                                                                                                                                                                                                                                                                61⤵
                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                PID:1640
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                                                                                                                                                  "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                                                                                                  62⤵
                                                                                                                                                                                                                                                                  • Modifies WinLogon for persistence
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  • Loads dropped DLL
                                                                                                                                                                                                                                                                  • Adds Run key to start application
                                                                                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                                                                                  PID:1356
                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                                                                                                                                                    63⤵
                                                                                                                                                                                                                                                                      PID:3432
                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                        attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                                                                                                                                                        64⤵
                                                                                                                                                                                                                                                                        • Sets file to hidden
                                                                                                                                                                                                                                                                        • Views/modifies file attributes
                                                                                                                                                                                                                                                                        PID:3656
                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                                                                                                                                      63⤵
                                                                                                                                                                                                                                                                        PID:3544
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                          attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                                                                                                                                          64⤵
                                                                                                                                                                                                                                                                          • Sets file to hidden
                                                                                                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                                                                                                          • Views/modifies file attributes
                                                                                                                                                                                                                                                                          PID:3708
                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                        "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                                                                                                        63⤵
                                                                                                                                                                                                                                                                          PID:3736
                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                                                                                            ping 127.0.0.1 -n 5
                                                                                                                                                                                                                                                                            64⤵
                                                                                                                                                                                                                                                                            • Runs ping.exe
                                                                                                                                                                                                                                                                            PID:3748
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                                                                                                                                                          "C:\Windows\system32\etc\wnlogon.exe"
                                                                                                                                                                                                                                                                          63⤵
                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                          • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                          PID:3716
                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                                                                                                                                                            "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                                                                                                            64⤵
                                                                                                                                                                                                                                                                            • Modifies WinLogon for persistence
                                                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                                                            • Loads dropped DLL
                                                                                                                                                                                                                                                                            • Adds Run key to start application
                                                                                                                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                                                                                                                            PID:2824
                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                                                                                                                                                              65⤵
                                                                                                                                                                                                                                                                                PID:3896
                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                  attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                                                                                                                                                                  66⤵
                                                                                                                                                                                                                                                                                  • Sets file to hidden
                                                                                                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                                                                                                  • Views/modifies file attributes
                                                                                                                                                                                                                                                                                  PID:3936
                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                                                                                                                                                65⤵
                                                                                                                                                                                                                                                                                  PID:3904
                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                    attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                                                                                                                                                    66⤵
                                                                                                                                                                                                                                                                                    • Views/modifies file attributes
                                                                                                                                                                                                                                                                                    PID:3948
                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                                                                                                                                                                  "C:\Windows\system32\etc\wnlogon.exe"
                                                                                                                                                                                                                                                                                  65⤵
                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                  PID:3820
                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                                                                                                                                                                    "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                                                                                                                    66⤵
                                                                                                                                                                                                                                                                                    • Modifies WinLogon for persistence
                                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                                    • Adds Run key to start application
                                                                                                                                                                                                                                                                                    PID:2316
                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                                                                                                                                                                      67⤵
                                                                                                                                                                                                                                                                                        PID:3204
                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                          attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                                                                                                                                                                          68⤵
                                                                                                                                                                                                                                                                                          • Sets file to hidden
                                                                                                                                                                                                                                                                                          • Views/modifies file attributes
                                                                                                                                                                                                                                                                                          PID:3296
                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                        "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                                                                                                                                                        67⤵
                                                                                                                                                                                                                                                                                          PID:3192
                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                            attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                                                                                                                                                            68⤵
                                                                                                                                                                                                                                                                                            • Sets file to hidden
                                                                                                                                                                                                                                                                                            • Views/modifies file attributes
                                                                                                                                                                                                                                                                                            PID:3248
                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                                                                                                                                                                          "C:\Windows\system32\etc\wnlogon.exe"
                                                                                                                                                                                                                                                                                          67⤵
                                                                                                                                                                                                                                                                                          • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                          PID:3360
                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                                                                                                                                                                            "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                                                                                                                            68⤵
                                                                                                                                                                                                                                                                                            • Modifies WinLogon for persistence
                                                                                                                                                                                                                                                                                            • Adds Run key to start application
                                                                                                                                                                                                                                                                                            PID:3308
                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                                                                                                                                                                              69⤵
                                                                                                                                                                                                                                                                                                PID:3412
                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                  attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                                                                                                                                                                                  70⤵
                                                                                                                                                                                                                                                                                                  • Sets file to hidden
                                                                                                                                                                                                                                                                                                  PID:3628
                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                                                                                                                                                                69⤵
                                                                                                                                                                                                                                                                                                  PID:3704
                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                    attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                                                                                                                                                                    70⤵
                                                                                                                                                                                                                                                                                                    • Sets file to hidden
                                                                                                                                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                                                                                                                                    • Views/modifies file attributes
                                                                                                                                                                                                                                                                                                    PID:3528
                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                                                                                                                                                                                  "C:\Windows\system32\etc\wnlogon.exe"
                                                                                                                                                                                                                                                                                                  69⤵
                                                                                                                                                                                                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                                  PID:3604
                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                                                                                                                                                                                    "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                                                                                                                                    70⤵
                                                                                                                                                                                                                                                                                                    • Modifies WinLogon for persistence
                                                                                                                                                                                                                                                                                                    • Adds Run key to start application
                                                                                                                                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                                                                                                                                    PID:3768
                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                                                                                                                                                                                      71⤵
                                                                                                                                                                                                                                                                                                        PID:3888
                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                          attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                                                                                                                                                                                          72⤵
                                                                                                                                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                                                                                                                                          • Views/modifies file attributes
                                                                                                                                                                                                                                                                                                          PID:3208
                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                        "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                                                                                                                                                                        71⤵
                                                                                                                                                                                                                                                                                                          PID:3812
                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                                            attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                                                                                                                                                                            72⤵
                                                                                                                                                                                                                                                                                                            • Sets file to hidden
                                                                                                                                                                                                                                                                                                            • Views/modifies file attributes
                                                                                                                                                                                                                                                                                                            PID:1888
                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\etc\wnlogon.exe
                                                                                                                                                                                                                                                                                                          "C:\Windows\system32\etc\wnlogon.exe"
                                                                                                                                                                                                                                                                                                          71⤵
                                                                                                                                                                                                                                                                                                            PID:3296
                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                            "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                                                                                                                                            71⤵
                                                                                                                                                                                                                                                                                                              PID:3248
                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                                                                                                                                ping 127.0.0.1 -n 5
                                                                                                                                                                                                                                                                                                                72⤵
                                                                                                                                                                                                                                                                                                                • Runs ping.exe
                                                                                                                                                                                                                                                                                                                PID:3200
                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                          "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                                                                                                                                          69⤵
                                                                                                                                                                                                                                                                                                            PID:3584
                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                                                                                                                              ping 127.0.0.1 -n 5
                                                                                                                                                                                                                                                                                                              70⤵
                                                                                                                                                                                                                                                                                                              • Runs ping.exe
                                                                                                                                                                                                                                                                                                              PID:3724
                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                        "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                                                                                                                                        67⤵
                                                                                                                                                                                                                                                                                                          PID:3392
                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                                                                                                                            ping 127.0.0.1 -n 5
                                                                                                                                                                                                                                                                                                            68⤵
                                                                                                                                                                                                                                                                                                            • Runs ping.exe
                                                                                                                                                                                                                                                                                                            PID:3228
                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                                                                                                                                      65⤵
                                                                                                                                                                                                                                                                                                        PID:3884
                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                                                                                                                          ping 127.0.0.1 -n 5
                                                                                                                                                                                                                                                                                                          66⤵
                                                                                                                                                                                                                                                                                                          • Runs ping.exe
                                                                                                                                                                                                                                                                                                          PID:4048
                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                                                                                                                                61⤵
                                                                                                                                                                                                                                                                                                  PID:2212
                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                                                                                                                    ping 127.0.0.1 -n 5
                                                                                                                                                                                                                                                                                                    62⤵
                                                                                                                                                                                                                                                                                                    • Runs ping.exe
                                                                                                                                                                                                                                                                                                    PID:3460
                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                              "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                                                                                                                              59⤵
                                                                                                                                                                                                                                                                                                PID:2628
                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                                                                                                                  ping 127.0.0.1 -n 5
                                                                                                                                                                                                                                                                                                  60⤵
                                                                                                                                                                                                                                                                                                  • Runs ping.exe
                                                                                                                                                                                                                                                                                                  PID:3124
                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                            "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                                                                                                                            57⤵
                                                                                                                                                                                                                                                                                              PID:3924
                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                                                                                                                ping 127.0.0.1 -n 5
                                                                                                                                                                                                                                                                                                58⤵
                                                                                                                                                                                                                                                                                                • Runs ping.exe
                                                                                                                                                                                                                                                                                                PID:3964
                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                          "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                                                                                                                          55⤵
                                                                                                                                                                                                                                                                                            PID:3728
                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                                                                                                              ping 127.0.0.1 -n 5
                                                                                                                                                                                                                                                                                              56⤵
                                                                                                                                                                                                                                                                                              • Runs ping.exe
                                                                                                                                                                                                                                                                                              PID:3768
                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                        "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                                                                                                                        53⤵
                                                                                                                                                                                                                                                                                          PID:3536
                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                                                                                                            ping 127.0.0.1 -n 5
                                                                                                                                                                                                                                                                                            54⤵
                                                                                                                                                                                                                                                                                            • Runs ping.exe
                                                                                                                                                                                                                                                                                            PID:3576
                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                                                                                                                      51⤵
                                                                                                                                                                                                                                                                                        PID:3340
                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                                                                                                          ping 127.0.0.1 -n 5
                                                                                                                                                                                                                                                                                          52⤵
                                                                                                                                                                                                                                                                                          • Runs ping.exe
                                                                                                                                                                                                                                                                                          PID:3380
                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                    "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                                                                                                                    49⤵
                                                                                                                                                                                                                                                                                      PID:3152
                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                                                                                                        ping 127.0.0.1 -n 5
                                                                                                                                                                                                                                                                                        50⤵
                                                                                                                                                                                                                                                                                        • Runs ping.exe
                                                                                                                                                                                                                                                                                        PID:3192
                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                  "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                                                                                                                  47⤵
                                                                                                                                                                                                                                                                                    PID:1556
                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                                                                                                      ping 127.0.0.1 -n 5
                                                                                                                                                                                                                                                                                      48⤵
                                                                                                                                                                                                                                                                                      • Runs ping.exe
                                                                                                                                                                                                                                                                                      PID:3028
                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                                                                                                                45⤵
                                                                                                                                                                                                                                                                                  PID:3040
                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                                                                                                    ping 127.0.0.1 -n 5
                                                                                                                                                                                                                                                                                    46⤵
                                                                                                                                                                                                                                                                                    • Runs ping.exe
                                                                                                                                                                                                                                                                                    PID:2664
                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                              "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                                                                                                              43⤵
                                                                                                                                                                                                                                                                                PID:2744
                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                                                                                                  ping 127.0.0.1 -n 5
                                                                                                                                                                                                                                                                                  44⤵
                                                                                                                                                                                                                                                                                  • Runs ping.exe
                                                                                                                                                                                                                                                                                  PID:3004
                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                            "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                                                                                                            41⤵
                                                                                                                                                                                                                                                                              PID:2468
                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                                                                                                ping 127.0.0.1 -n 5
                                                                                                                                                                                                                                                                                42⤵
                                                                                                                                                                                                                                                                                • Runs ping.exe
                                                                                                                                                                                                                                                                                PID:932
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                          "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                                                                                                          39⤵
                                                                                                                                                                                                                                                                            PID:2188
                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                                                                                              ping 127.0.0.1 -n 5
                                                                                                                                                                                                                                                                              40⤵
                                                                                                                                                                                                                                                                              • Runs ping.exe
                                                                                                                                                                                                                                                                              PID:2024
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                                                                                                33⤵
                                                                                                                                                                                                                                                                  PID:2268
                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                                                                                    ping 127.0.0.1 -n 5
                                                                                                                                                                                                                                                                    34⤵
                                                                                                                                                                                                                                                                    • Runs ping.exe
                                                                                                                                                                                                                                                                    PID:2340
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                          "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                                                                                          29⤵
                                                                                                                                                                                                                                                            PID:2736
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                                                                              ping 127.0.0.1 -n 5
                                                                                                                                                                                                                                                              30⤵
                                                                                                                                                                                                                                                              • Runs ping.exe
                                                                                                                                                                                                                                                              PID:2724
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                        "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                                                                                        27⤵
                                                                                                                                                                                                                                                          PID:2296
                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                                                                            ping 127.0.0.1 -n 5
                                                                                                                                                                                                                                                            28⤵
                                                                                                                                                                                                                                                            • Runs ping.exe
                                                                                                                                                                                                                                                            PID:2468
                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                                                                                      25⤵
                                                                                                                                                                                                                                                        PID:880
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                                                                          ping 127.0.0.1 -n 5
                                                                                                                                                                                                                                                          26⤵
                                                                                                                                                                                                                                                          • Runs ping.exe
                                                                                                                                                                                                                                                          PID:2184
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                    "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                                                                                    23⤵
                                                                                                                                                                                                                                                      PID:2984
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                                                                        ping 127.0.0.1 -n 5
                                                                                                                                                                                                                                                        24⤵
                                                                                                                                                                                                                                                        • Runs ping.exe
                                                                                                                                                                                                                                                        PID:3028
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                  "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                                                                                  21⤵
                                                                                                                                                                                                                                                    PID:2772
                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                                                                      ping 127.0.0.1 -n 5
                                                                                                                                                                                                                                                      22⤵
                                                                                                                                                                                                                                                      • Runs ping.exe
                                                                                                                                                                                                                                                      PID:2816
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                            "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                                                                            17⤵
                                                                                                                                                                                                                                              PID:2320
                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                                                                ping 127.0.0.1 -n 5
                                                                                                                                                                                                                                                18⤵
                                                                                                                                                                                                                                                • Runs ping.exe
                                                                                                                                                                                                                                                PID:2364
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                                                                                                      13⤵
                                                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                                                      PID:612
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                                                    ping 127.0.0.1 -n 5
                                                                                                                                                                                                                                    12⤵
                                                                                                                                                                                                                                    • Runs ping.exe
                                                                                                                                                                                                                                    PID:1544
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Windows\SysWOW64\etc\wnlogon.exe"
                                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                                        PID:1896
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                                          ping 127.0.0.1 -n 5
                                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                                          • Runs ping.exe
                                                                                                                                                                                                                          PID:2000
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                    "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Users\Admin\AppData\Local\Temp\e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c.exe"
                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                    • Suspicious use of WriteProcessMemory
                                                                                                                                                                                                                    PID:1352
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                                      ping 127.0.0.1 -n 5
                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                      • Runs ping.exe
                                                                                                                                                                                                                      PID:1000
                                                                                                                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                attrib "C:\Windows\SysWOW64\etc" +s +h
                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                • Sets file to hidden
                                                                                                                                                                                                                PID:732
                                                                                                                                                                                                              • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                                ping 127.0.0.1 -n 5
                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                • Runs ping.exe
                                                                                                                                                                                                                PID:2128
                                                                                                                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                attrib "C:\Windows\SysWOW64\etc\wnlogon.exe" +s +h
                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                • Sets file to hidden
                                                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                                                • Views/modifies file attributes
                                                                                                                                                                                                                PID:2404

                                                                                                                                                                                                              Network

                                                                                                                                                                                                              MITRE ATT&CK Enterprise v6

                                                                                                                                                                                                              Replay Monitor

                                                                                                                                                                                                              Loading Replay Monitor...

                                                                                                                                                                                                              Downloads

                                                                                                                                                                                                              • C:\Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • C:\Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • C:\Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • C:\Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • C:\Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • C:\Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • C:\Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • C:\Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • C:\Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • C:\Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • C:\Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • C:\Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • C:\Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • C:\Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • C:\Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • C:\Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • C:\Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • C:\Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • C:\Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • C:\Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • C:\Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • C:\Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • C:\Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • C:\Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • C:\Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • C:\Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • C:\Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • C:\Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • C:\Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • \Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • \Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • \Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • \Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • \Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • \Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • \Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • \Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • \Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • \Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • \Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • \Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • \Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • \Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • \Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • \Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • \Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • \Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • \Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • \Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • \Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • \Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • \Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • \Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • \Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • \Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • \Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • \Windows\SysWOW64\etc\wnlogon.exe

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                700KB

                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                bdf17ff679149c3b8149bb9a7f5b882c

                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                1778fc7682d99c896da7e27328901a64763df2a3

                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                e9cb5421c2efcd767017b35b8c5e50f279f467c4c7bde0b6a24a9d6d4465648c

                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                19d27751fe0e35891173eef586247f67de15b75b0a659e52609dc31c0e0e760f4ad5f3242ca867d1760bb42f3ef9911c1bc1289e412c7e491986a9d8208797a2

                                                                                                                                                                                                              • memory/968-133-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/976-65-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/976-60-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/976-59-0x0000000075BB1000-0x0000000075BB3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                8KB

                                                                                                                                                                                                              • memory/976-56-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/976-58-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/976-71-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/1176-307-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/1356-408-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/1452-164-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/1452-173-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/1460-330-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/1460-328-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/1480-344-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/1576-81-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/1576-93-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/1576-82-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/1676-192-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/1684-277-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/1684-101-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/1684-114-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/1744-153-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/2156-212-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/2272-269-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/2272-265-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/2288-337-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/2316-423-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/2384-299-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/2384-298-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/2384-297-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/2400-223-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/2480-358-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/2560-282-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/2560-278-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/2560-276-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/2572-314-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/2620-231-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/2620-235-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/2640-350-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/2656-290-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/2656-289-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/2656-291-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/2824-415-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/2844-246-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/3052-253-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/3052-259-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/3068-320-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/3068-322-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/3116-400-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/3116-402-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/3212-365-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/3212-364-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/3308-430-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/3408-374-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/3408-438-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/3600-379-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/3768-437-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/3792-387-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB

                                                                                                                                                                                                              • memory/3988-393-0x0000000000400000-0x00000000004B3000-memory.dmp

                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                716KB