Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
31s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18/01/2024, 00:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
64028b0dc46078f1e2e49f41372d3273.exe
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
64028b0dc46078f1e2e49f41372d3273.exe
Resource
win10v2004-20231222-en
4 signatures
150 seconds
General
-
Target
64028b0dc46078f1e2e49f41372d3273.exe
-
Size
196KB
-
MD5
64028b0dc46078f1e2e49f41372d3273
-
SHA1
bdb89a3aaabbc31167c8e5ccd4b23dfd178255d1
-
SHA256
62834214d7284ddb935afd40b7b6ec0d2b9a138333bb33a0e386c6793afbf077
-
SHA512
18790a92ac918af35df3c36d8b20e5beacd075a25309b1e50acf13c5e06e6550618c51f702877b8e051c4be227ef446ce74fc0d5a46b704850edbcd4f3a427fd
-
SSDEEP
6144:0xg+KSsJsbCvxRmv8SGKBtw30F5Tvv6x1V:29KfJ+A8B/Ftvv6x1
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2296 wmi.exe 2728 wmi.exe 3036 wmi.exe 2712 wmi.exe 2608 wmi.exe 2868 wmi.exe 660 wmi.exe 272 wmi.exe 2972 wmi.exe 2808 wmi.exe 2564 wmi.exe 560 wmi.exe 2888 wmi.exe 1904 wmi.exe 2936 wmi.exe 1796 wmi.exe 1640 wmi.exe 616 wmi.exe 1992 wmi.exe 3048 wmi.exe 2424 wmi.exe 2752 wmi.exe 1544 wmi.exe 2056 wmi.exe 412 wmi.exe 2024 wmi.exe 484 wmi.exe 1392 wmi.exe 2440 wmi.exe 1348 wmi.exe 912 wmi.exe 1676 wmi.exe 1664 wmi.exe 1280 wmi.exe 1100 wmi.exe 2244 wmi.exe 1456 wmi.exe 2252 wmi.exe 2124 wmi.exe 2112 wmi.exe 2452 wmi.exe 1708 wmi.exe 872 wmi.exe 2096 wmi.exe 2496 wmi.exe 2448 wmi.exe 1584 wmi.exe 1612 wmi.exe 2432 wmi.exe 2680 wmi.exe 2840 wmi.exe 1980 wmi.exe 2708 wmi.exe 2604 wmi.exe 2324 wmi.exe 2612 wmi.exe 2588 wmi.exe 2740 wmi.exe 2688 wmi.exe 2696 wmi.exe 1272 wmi.exe 2172 wmi.exe 576 wmi.exe 1088 wmi.exe -
Loads dropped DLL 64 IoCs
pid Process 2100 64028b0dc46078f1e2e49f41372d3273.exe 2100 64028b0dc46078f1e2e49f41372d3273.exe 2296 wmi.exe 2296 wmi.exe 2728 wmi.exe 2728 wmi.exe 3036 wmi.exe 3036 wmi.exe 2712 wmi.exe 2712 wmi.exe 2608 wmi.exe 2608 wmi.exe 2868 wmi.exe 2868 wmi.exe 660 wmi.exe 660 wmi.exe 272 wmi.exe 272 wmi.exe 2972 wmi.exe 2972 wmi.exe 2808 wmi.exe 2808 wmi.exe 2564 wmi.exe 2564 wmi.exe 560 wmi.exe 560 wmi.exe 2888 wmi.exe 2888 wmi.exe 1904 wmi.exe 1904 wmi.exe 2936 wmi.exe 2936 wmi.exe 1796 wmi.exe 1796 wmi.exe 1640 wmi.exe 1640 wmi.exe 616 wmi.exe 616 wmi.exe 1992 wmi.exe 1992 wmi.exe 3048 wmi.exe 3048 wmi.exe 2424 wmi.exe 2424 wmi.exe 2752 wmi.exe 2752 wmi.exe 1544 wmi.exe 1544 wmi.exe 2056 wmi.exe 2056 wmi.exe 412 wmi.exe 412 wmi.exe 2024 wmi.exe 2024 wmi.exe 484 wmi.exe 484 wmi.exe 1392 wmi.exe 1392 wmi.exe 2440 wmi.exe 2440 wmi.exe 1348 wmi.exe 1348 wmi.exe 912 wmi.exe 912 wmi.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe wmi.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2100 64028b0dc46078f1e2e49f41372d3273.exe 2100 64028b0dc46078f1e2e49f41372d3273.exe 2100 64028b0dc46078f1e2e49f41372d3273.exe 2296 wmi.exe 2296 wmi.exe 2296 wmi.exe 2728 wmi.exe 2728 wmi.exe 2728 wmi.exe 3036 wmi.exe 3036 wmi.exe 3036 wmi.exe 2712 wmi.exe 2712 wmi.exe 2712 wmi.exe 2608 wmi.exe 2608 wmi.exe 2608 wmi.exe 2868 wmi.exe 2868 wmi.exe 2868 wmi.exe 660 wmi.exe 660 wmi.exe 660 wmi.exe 272 wmi.exe 272 wmi.exe 272 wmi.exe 2972 wmi.exe 2972 wmi.exe 2972 wmi.exe 2808 wmi.exe 2808 wmi.exe 2808 wmi.exe 2564 wmi.exe 2564 wmi.exe 2564 wmi.exe 560 wmi.exe 560 wmi.exe 560 wmi.exe 2888 wmi.exe 2888 wmi.exe 2888 wmi.exe 1904 wmi.exe 1904 wmi.exe 1904 wmi.exe 2936 wmi.exe 2936 wmi.exe 2936 wmi.exe 1796 wmi.exe 1796 wmi.exe 1796 wmi.exe 1640 wmi.exe 1640 wmi.exe 1640 wmi.exe 616 wmi.exe 616 wmi.exe 616 wmi.exe 1992 wmi.exe 1992 wmi.exe 1992 wmi.exe 3048 wmi.exe 3048 wmi.exe 3048 wmi.exe 2424 wmi.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2100 64028b0dc46078f1e2e49f41372d3273.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2296 2100 64028b0dc46078f1e2e49f41372d3273.exe 28 PID 2100 wrote to memory of 2296 2100 64028b0dc46078f1e2e49f41372d3273.exe 28 PID 2100 wrote to memory of 2296 2100 64028b0dc46078f1e2e49f41372d3273.exe 28 PID 2100 wrote to memory of 2296 2100 64028b0dc46078f1e2e49f41372d3273.exe 28 PID 2296 wrote to memory of 2728 2296 wmi.exe 29 PID 2296 wrote to memory of 2728 2296 wmi.exe 29 PID 2296 wrote to memory of 2728 2296 wmi.exe 29 PID 2296 wrote to memory of 2728 2296 wmi.exe 29 PID 2728 wrote to memory of 3036 2728 wmi.exe 30 PID 2728 wrote to memory of 3036 2728 wmi.exe 30 PID 2728 wrote to memory of 3036 2728 wmi.exe 30 PID 2728 wrote to memory of 3036 2728 wmi.exe 30 PID 3036 wrote to memory of 2712 3036 wmi.exe 31 PID 3036 wrote to memory of 2712 3036 wmi.exe 31 PID 3036 wrote to memory of 2712 3036 wmi.exe 31 PID 3036 wrote to memory of 2712 3036 wmi.exe 31 PID 2712 wrote to memory of 2608 2712 wmi.exe 45 PID 2712 wrote to memory of 2608 2712 wmi.exe 45 PID 2712 wrote to memory of 2608 2712 wmi.exe 45 PID 2712 wrote to memory of 2608 2712 wmi.exe 45 PID 2608 wrote to memory of 2868 2608 wmi.exe 44 PID 2608 wrote to memory of 2868 2608 wmi.exe 44 PID 2608 wrote to memory of 2868 2608 wmi.exe 44 PID 2608 wrote to memory of 2868 2608 wmi.exe 44 PID 2868 wrote to memory of 660 2868 wmi.exe 32 PID 2868 wrote to memory of 660 2868 wmi.exe 32 PID 2868 wrote to memory of 660 2868 wmi.exe 32 PID 2868 wrote to memory of 660 2868 wmi.exe 32 PID 660 wrote to memory of 272 660 wmi.exe 41 PID 660 wrote to memory of 272 660 wmi.exe 41 PID 660 wrote to memory of 272 660 wmi.exe 41 PID 660 wrote to memory of 272 660 wmi.exe 41 PID 272 wrote to memory of 2972 272 wmi.exe 38 PID 272 wrote to memory of 2972 272 wmi.exe 38 PID 272 wrote to memory of 2972 272 wmi.exe 38 PID 272 wrote to memory of 2972 272 wmi.exe 38 PID 2972 wrote to memory of 2808 2972 wmi.exe 36 PID 2972 wrote to memory of 2808 2972 wmi.exe 36 PID 2972 wrote to memory of 2808 2972 wmi.exe 36 PID 2972 wrote to memory of 2808 2972 wmi.exe 36 PID 2808 wrote to memory of 2564 2808 wmi.exe 33 PID 2808 wrote to memory of 2564 2808 wmi.exe 33 PID 2808 wrote to memory of 2564 2808 wmi.exe 33 PID 2808 wrote to memory of 2564 2808 wmi.exe 33 PID 2564 wrote to memory of 560 2564 wmi.exe 34 PID 2564 wrote to memory of 560 2564 wmi.exe 34 PID 2564 wrote to memory of 560 2564 wmi.exe 34 PID 2564 wrote to memory of 560 2564 wmi.exe 34 PID 560 wrote to memory of 2888 560 wmi.exe 35 PID 560 wrote to memory of 2888 560 wmi.exe 35 PID 560 wrote to memory of 2888 560 wmi.exe 35 PID 560 wrote to memory of 2888 560 wmi.exe 35 PID 2888 wrote to memory of 1904 2888 wmi.exe 37 PID 2888 wrote to memory of 1904 2888 wmi.exe 37 PID 2888 wrote to memory of 1904 2888 wmi.exe 37 PID 2888 wrote to memory of 1904 2888 wmi.exe 37 PID 1904 wrote to memory of 2936 1904 wmi.exe 39 PID 1904 wrote to memory of 2936 1904 wmi.exe 39 PID 1904 wrote to memory of 2936 1904 wmi.exe 39 PID 1904 wrote to memory of 2936 1904 wmi.exe 39 PID 2936 wrote to memory of 1796 2936 wmi.exe 40 PID 2936 wrote to memory of 1796 2936 wmi.exe 40 PID 2936 wrote to memory of 1796 2936 wmi.exe 40 PID 2936 wrote to memory of 1796 2936 wmi.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\64028b0dc46078f1e2e49f41372d3273.exe"C:\Users\Admin\AppData\Local\Temp\64028b0dc46078f1e2e49f41372d3273.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2608
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f /q "C:\Windows\SysWOW64\GROUPP~1\User\Scripts\Logon\wmi.exe" > nul3⤵PID:3148
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f /q "C:\Users\Admin\AppData\Local\Temp\64028B~1.EXE" > nul2⤵PID:3092
-
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:272
-
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1796 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1640
-
-
-
-
-
-
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2808
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2972
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:616 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1992 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3048 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2424 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2752 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1544 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2056 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:412 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2024 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:484 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1392 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2440 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1348 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:912 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe15⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1676 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe16⤵
- Executes dropped EXE
PID:1664 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe17⤵
- Executes dropped EXE
PID:1280 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe18⤵
- Executes dropped EXE
PID:1100 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe19⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2244 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe20⤵
- Executes dropped EXE
PID:1456 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe21⤵
- Executes dropped EXE
PID:2252 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2124 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe23⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2112 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe24⤵
- Executes dropped EXE
PID:2452 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe25⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1708 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe26⤵
- Executes dropped EXE
PID:872 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe27⤵
- Executes dropped EXE
PID:2096 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe28⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2496 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2448 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe30⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1584 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe31⤵
- Executes dropped EXE
PID:1612 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe32⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2432 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe33⤵
- Executes dropped EXE
PID:2680 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe34⤵
- Executes dropped EXE
PID:2840 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe35⤵
- Executes dropped EXE
PID:1980 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe36⤵
- Executes dropped EXE
PID:2708 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2604 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe38⤵
- Executes dropped EXE
PID:2324 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe39⤵
- Executes dropped EXE
PID:2612 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe40⤵
- Executes dropped EXE
PID:2588 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe41⤵
- Executes dropped EXE
PID:2740 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe42⤵
- Executes dropped EXE
PID:2688 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe43⤵
- Executes dropped EXE
PID:2696 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe44⤵
- Executes dropped EXE
PID:1272 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe45⤵
- Executes dropped EXE
PID:2172 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:576 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe47⤵
- Executes dropped EXE
PID:1088 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe48⤵PID:936
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe49⤵PID:2984
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe50⤵PID:2812
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe51⤵
- Drops file in System32 directory
PID:2956 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe52⤵PID:2988
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe53⤵
- Drops file in System32 directory
PID:3016 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe54⤵PID:2996
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe55⤵
- Drops file in System32 directory
PID:1984 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe56⤵PID:296
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe57⤵PID:1940
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe58⤵PID:2644
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe59⤵
- Drops file in System32 directory
PID:1060 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe60⤵PID:1236
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe61⤵
- Drops file in System32 directory
PID:580 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe62⤵PID:1692
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe63⤵PID:2916
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe64⤵
- Drops file in System32 directory
PID:2912 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe65⤵PID:1468
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe66⤵PID:1528
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe67⤵PID:2472
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe68⤵
- Drops file in System32 directory
PID:756 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe69⤵PID:3060
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe70⤵PID:2532
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe71⤵PID:1144
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe72⤵
- Drops file in System32 directory
PID:2400 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe73⤵PID:2520
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe74⤵PID:2540
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe75⤵PID:1480
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe76⤵
- Drops file in System32 directory
PID:672 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe77⤵PID:1856
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe78⤵PID:932
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe79⤵PID:2136
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe80⤵PID:760
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe81⤵PID:1672
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe82⤵
- Drops file in System32 directory
PID:852 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe83⤵
- Drops file in System32 directory
PID:536 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe84⤵
- Drops file in System32 directory
PID:2060 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe85⤵PID:2304
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe86⤵PID:516
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe87⤵PID:2280
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe88⤵PID:2508
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe89⤵PID:2156
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe90⤵PID:1720
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe91⤵PID:2780
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe92⤵PID:2828
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe93⤵
- Drops file in System32 directory
PID:2684 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe94⤵PID:2872
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe95⤵
- Drops file in System32 directory
PID:2600 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe96⤵
- Drops file in System32 directory
PID:2572 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe97⤵PID:2584
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe98⤵PID:2628
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe99⤵PID:2580
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe100⤵PID:1312
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe101⤵PID:2560
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe102⤵PID:3012
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe103⤵PID:2408
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe104⤵PID:2484
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe105⤵PID:2764
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe106⤵
- Drops file in System32 directory
PID:824 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe107⤵PID:1592
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe108⤵PID:2824
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe109⤵PID:2676
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe110⤵PID:1736
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe111⤵PID:2204
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe112⤵PID:1788
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe113⤵
- Drops file in System32 directory
PID:2180 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe114⤵PID:2360
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe115⤵PID:2264
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe116⤵
- Drops file in System32 directory
PID:624 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe117⤵PID:2544
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe118⤵
- Drops file in System32 directory
PID:1624 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe119⤵PID:1028
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe120⤵PID:816
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe121⤵PID:2316
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe122⤵PID:688
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-