Analysis
-
max time kernel
4s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2024 00:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
64028b0dc46078f1e2e49f41372d3273.exe
Resource
win7-20231215-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
64028b0dc46078f1e2e49f41372d3273.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
64028b0dc46078f1e2e49f41372d3273.exe
-
Size
196KB
-
MD5
64028b0dc46078f1e2e49f41372d3273
-
SHA1
bdb89a3aaabbc31167c8e5ccd4b23dfd178255d1
-
SHA256
62834214d7284ddb935afd40b7b6ec0d2b9a138333bb33a0e386c6793afbf077
-
SHA512
18790a92ac918af35df3c36d8b20e5beacd075a25309b1e50acf13c5e06e6550618c51f702877b8e051c4be227ef446ce74fc0d5a46b704850edbcd4f3a427fd
-
SSDEEP
6144:0xg+KSsJsbCvxRmv8SGKBtw30F5Tvv6x1V:29KfJ+A8B/Ftvv6x1
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 25 IoCs
pid Process 1704 wmi.exe 4604 wmi.exe 2876 wmi.exe 4556 wmi.exe 2672 wmi.exe 1436 wmi.exe 2692 wmi.exe 4104 wmi.exe 5028 wmi.exe 2412 wmi.exe 2488 wmi.exe 3664 wmi.exe 912 wmi.exe 4372 wmi.exe 4896 wmi.exe 5080 wmi.exe 4544 wmi.exe 2120 wmi.exe 1624 wmi.exe 4580 wmi.exe 4340 wmi.exe 2592 wmi.exe 5040 wmi.exe 536 wmi.exe 2276 wmi.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat 64028b0dc46078f1e2e49f41372d3273.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe 64028b0dc46078f1e2e49f41372d3273.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini 64028b0dc46078f1e2e49f41372d3273.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe 64028b0dc46078f1e2e49f41372d3273.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\gpt.ini 64028b0dc46078f1e2e49f41372d3273.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3316 64028b0dc46078f1e2e49f41372d3273.exe 3316 64028b0dc46078f1e2e49f41372d3273.exe 3316 64028b0dc46078f1e2e49f41372d3273.exe 3316 64028b0dc46078f1e2e49f41372d3273.exe 3316 64028b0dc46078f1e2e49f41372d3273.exe 3316 64028b0dc46078f1e2e49f41372d3273.exe 1704 wmi.exe 1704 wmi.exe 1704 wmi.exe 1704 wmi.exe 1704 wmi.exe 1704 wmi.exe 4604 wmi.exe 4604 wmi.exe 4604 wmi.exe 4604 wmi.exe 4604 wmi.exe 4604 wmi.exe 2876 wmi.exe 2876 wmi.exe 2876 wmi.exe 2876 wmi.exe 2876 wmi.exe 2876 wmi.exe 4556 wmi.exe 4556 wmi.exe 4556 wmi.exe 4556 wmi.exe 4556 wmi.exe 4556 wmi.exe 2672 wmi.exe 2672 wmi.exe 2672 wmi.exe 2672 wmi.exe 2672 wmi.exe 2672 wmi.exe 1436 wmi.exe 1436 wmi.exe 1436 wmi.exe 1436 wmi.exe 1436 wmi.exe 1436 wmi.exe 2692 wmi.exe 2692 wmi.exe 2692 wmi.exe 2692 wmi.exe 2692 wmi.exe 2692 wmi.exe 4104 wmi.exe 4104 wmi.exe 4104 wmi.exe 4104 wmi.exe 4104 wmi.exe 4104 wmi.exe 5028 wmi.exe 5028 wmi.exe 5028 wmi.exe 5028 wmi.exe 5028 wmi.exe 5028 wmi.exe 2412 wmi.exe 2412 wmi.exe 2412 wmi.exe 2412 wmi.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3316 wrote to memory of 1704 3316 64028b0dc46078f1e2e49f41372d3273.exe 32 PID 3316 wrote to memory of 1704 3316 64028b0dc46078f1e2e49f41372d3273.exe 32 PID 3316 wrote to memory of 1704 3316 64028b0dc46078f1e2e49f41372d3273.exe 32 PID 1704 wrote to memory of 4604 1704 wmi.exe 34 PID 1704 wrote to memory of 4604 1704 wmi.exe 34 PID 1704 wrote to memory of 4604 1704 wmi.exe 34 PID 4604 wrote to memory of 2876 4604 wmi.exe 38 PID 4604 wrote to memory of 2876 4604 wmi.exe 38 PID 4604 wrote to memory of 2876 4604 wmi.exe 38 PID 2876 wrote to memory of 4556 2876 wmi.exe 82 PID 2876 wrote to memory of 4556 2876 wmi.exe 82 PID 2876 wrote to memory of 4556 2876 wmi.exe 82 PID 4556 wrote to memory of 2672 4556 wmi.exe 39 PID 4556 wrote to memory of 2672 4556 wmi.exe 39 PID 4556 wrote to memory of 2672 4556 wmi.exe 39 PID 2672 wrote to memory of 1436 2672 wmi.exe 40 PID 2672 wrote to memory of 1436 2672 wmi.exe 40 PID 2672 wrote to memory of 1436 2672 wmi.exe 40 PID 1436 wrote to memory of 2692 1436 wmi.exe 41 PID 1436 wrote to memory of 2692 1436 wmi.exe 41 PID 1436 wrote to memory of 2692 1436 wmi.exe 41 PID 2692 wrote to memory of 4104 2692 wmi.exe 73 PID 2692 wrote to memory of 4104 2692 wmi.exe 73 PID 2692 wrote to memory of 4104 2692 wmi.exe 73 PID 4104 wrote to memory of 5028 4104 wmi.exe 69 PID 4104 wrote to memory of 5028 4104 wmi.exe 69 PID 4104 wrote to memory of 5028 4104 wmi.exe 69 PID 5028 wrote to memory of 2412 5028 wmi.exe 67 PID 5028 wrote to memory of 2412 5028 wmi.exe 67 PID 5028 wrote to memory of 2412 5028 wmi.exe 67 PID 2412 wrote to memory of 2488 2412 wmi.exe 66 PID 2412 wrote to memory of 2488 2412 wmi.exe 66 PID 2412 wrote to memory of 2488 2412 wmi.exe 66 PID 2488 wrote to memory of 3664 2488 wmi.exe 65 PID 2488 wrote to memory of 3664 2488 wmi.exe 65 PID 2488 wrote to memory of 3664 2488 wmi.exe 65 PID 3664 wrote to memory of 912 3664 wmi.exe 62 PID 3664 wrote to memory of 912 3664 wmi.exe 62 PID 3664 wrote to memory of 912 3664 wmi.exe 62 PID 912 wrote to memory of 4372 912 wmi.exe 58 PID 912 wrote to memory of 4372 912 wmi.exe 58 PID 912 wrote to memory of 4372 912 wmi.exe 58 PID 4372 wrote to memory of 4896 4372 wmi.exe 56 PID 4372 wrote to memory of 4896 4372 wmi.exe 56 PID 4372 wrote to memory of 4896 4372 wmi.exe 56 PID 4896 wrote to memory of 5080 4896 wmi.exe 53 PID 4896 wrote to memory of 5080 4896 wmi.exe 53 PID 4896 wrote to memory of 5080 4896 wmi.exe 53 PID 5080 wrote to memory of 4544 5080 wmi.exe 46 PID 5080 wrote to memory of 4544 5080 wmi.exe 46 PID 5080 wrote to memory of 4544 5080 wmi.exe 46 PID 4544 wrote to memory of 2120 4544 wmi.exe 48 PID 4544 wrote to memory of 2120 4544 wmi.exe 48 PID 4544 wrote to memory of 2120 4544 wmi.exe 48 PID 2120 wrote to memory of 1624 2120 wmi.exe 49 PID 2120 wrote to memory of 1624 2120 wmi.exe 49 PID 2120 wrote to memory of 1624 2120 wmi.exe 49 PID 1624 wrote to memory of 4580 1624 wmi.exe 50 PID 1624 wrote to memory of 4580 1624 wmi.exe 50 PID 1624 wrote to memory of 4580 1624 wmi.exe 50 PID 4580 wrote to memory of 4340 4580 wmi.exe 51 PID 4580 wrote to memory of 4340 4580 wmi.exe 51 PID 4580 wrote to memory of 4340 4580 wmi.exe 51 PID 4340 wrote to memory of 2592 4340 wmi.exe 52
Processes
-
C:\Users\Admin\AppData\Local\Temp\64028b0dc46078f1e2e49f41372d3273.exe"C:\Users\Admin\AppData\Local\Temp\64028b0dc46078f1e2e49f41372d3273.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4556
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f /q "C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe" > nul3⤵PID:7868
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f /q "C:\Users\Admin\AppData\Local\Temp\64028B~1.EXE" > nul2⤵PID:7836
-
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4104
-
-
-
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2592 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5040 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:536 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe9⤵
- Executes dropped EXE
PID:2276 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe10⤵PID:664
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe11⤵PID:3392
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe12⤵PID:3804
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe13⤵PID:2136
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe14⤵PID:1572
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe15⤵PID:2132
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe16⤵PID:2744
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe17⤵PID:4148
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe18⤵PID:1204
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe19⤵PID:3556
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe20⤵PID:4432
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe21⤵PID:4820
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe22⤵PID:4880
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe23⤵PID:2176
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe24⤵PID:4592
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe25⤵PID:4824
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe26⤵PID:4112
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe27⤵PID:2664
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe28⤵PID:2444
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe29⤵PID:2860
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe30⤵PID:3896
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe31⤵PID:3080
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe32⤵PID:3532
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe33⤵PID:2508
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe34⤵PID:2228
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe35⤵PID:4856
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe36⤵PID:3700
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe37⤵PID:2512
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe38⤵PID:1772
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe39⤵PID:4348
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe40⤵PID:5136
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe41⤵PID:5172
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe42⤵PID:5284
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe43⤵PID:5368
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe44⤵PID:5412
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe45⤵PID:5448
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe46⤵PID:5492
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe47⤵PID:5536
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe48⤵PID:5580
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe49⤵PID:5644
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe50⤵PID:5684
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe51⤵PID:5736
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe52⤵PID:5780
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe53⤵PID:5816
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe54⤵PID:5860
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe55⤵PID:5908
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe56⤵PID:5940
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe57⤵PID:5992
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe58⤵PID:6028
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe59⤵PID:6072
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe60⤵PID:6112
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe61⤵PID:5124
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe62⤵PID:5200
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe63⤵PID:5352
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe64⤵PID:5468
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe65⤵PID:5520
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe66⤵PID:5604
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe67⤵PID:5664
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe68⤵PID:5720
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe69⤵PID:5848
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe70⤵PID:6016
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe71⤵PID:6104
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe72⤵PID:5188
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe73⤵PID:2832
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe74⤵PID:3880
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe75⤵PID:5444
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe76⤵PID:5524
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe77⤵PID:5628
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe78⤵PID:5764
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe79⤵PID:5924
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe80⤵PID:6088
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe81⤵PID:5156
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe82⤵PID:8
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe83⤵PID:552
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe84⤵PID:5560
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe85⤵PID:5164
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe86⤵PID:6064
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe87⤵PID:5344
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe88⤵PID:5512
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe89⤵PID:5928
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe90⤵PID:5348
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe91⤵PID:5632
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe92⤵PID:3616
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe93⤵PID:5332
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe94⤵PID:5160
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe95⤵PID:6180
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe96⤵PID:6212
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe97⤵PID:6260
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe98⤵PID:6332
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe99⤵PID:6376
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe100⤵PID:6428
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe101⤵PID:6512
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe102⤵PID:6588
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe103⤵PID:6668
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe104⤵PID:6704
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe105⤵PID:6772
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe106⤵PID:6820
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe107⤵PID:6880
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe108⤵PID:6944
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe109⤵PID:7012
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe110⤵PID:7056
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe111⤵PID:7104
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe112⤵PID:7144
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe113⤵PID:6176
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe114⤵PID:6276
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe115⤵PID:6328
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe116⤵PID:6452
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe117⤵PID:6508
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe118⤵PID:6532
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe119⤵PID:6564
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe120⤵PID:6256
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe121⤵PID:6700
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe122⤵PID:6812
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-