Analysis
-
max time kernel
23s -
max time network
33s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
12-12-2024 00:13
Static task
static1
Behavioral task
behavioral1
Sample
Meta.v3.0.cracked.rar
Resource
win11-20241007-en
General
-
Target
Meta.v3.0.cracked.rar
-
Size
6.1MB
-
MD5
80f0209c71e159a12b284e9070782736
-
SHA1
6ebcec184f833642c8be195f0299e3c36d8ddbd2
-
SHA256
661958d0aa5bf8ac6fbc5c6bae19df1047041fa64819d523b4d10e6c922e26cf
-
SHA512
fed7a1b5f686b4ffa2a8ae191a8c21e345033a7773fad2b2b1cf35887659e4b7797a73e27790023fe59a32a587f66ed2e338f9d168450e7cb0a36bfb2a0c954f
-
SSDEEP
98304:sLr46ag4zz8RUciao7lMPVpIUoOdHZAqSRGMIqMOUwHcJ0DfkzKWLKXKgL/b:Qjag4zoigpIUBHoRUOUwE9GXagv
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot6097463381:AAFE6EI5D2TfE07x6OlKgJrWRj4KUyXcsn0/sendMessage?chat_id=5761333594
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 3 IoCs
resource yara_rule behavioral1/files/0x001c00000002aaf6-20.dat family_stormkitty behavioral1/files/0x001900000002ab04-53.dat family_stormkitty behavioral1/memory/1972-59-0x0000000000AD0000-0x0000000000B0E000-memory.dmp family_stormkitty -
Stormkitty family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x001900000002ab04-53.dat family_asyncrat -
Executes dropped EXE 64 IoCs
pid Process 3024 Panel GUI.exe 3036 BUILDER.EXE 2240 META.EXE 1972 SYSTEM CONFIG.EXE 4560 winlogon.exe 3052 winlogon.exe 3780 rundll32.exe 3760 winlogon.exe 3168 winlogon.exe 1628 winlogon.exe 996 winlogon.exe 1480 winlogon.exe 3636 winlogon.exe 3704 winlogon.exe 3224 winlogon.exe 2792 winlogon.exe 4856 winlogon.exe 4140 winlogon.exe 1264 winlogon.exe 3184 winlogon.exe 4344 winlogon.exe 1832 winlogon.exe 1860 winlogon.exe 1844 winlogon.exe 684 winlogon.exe 4544 winlogon.exe 784 winlogon.exe 4660 winlogon.exe 5052 winlogon.exe 3832 winlogon.exe 240 winlogon.exe 568 winlogon.exe 4628 winlogon.exe 3808 winlogon.exe 1112 winlogon.exe 3496 winlogon.exe 2092 winlogon.exe 2364 winlogon.exe 4792 winlogon.exe 3364 winlogon.exe 2176 winlogon.exe 1120 winlogon.exe 1568 winlogon.exe 2724 winlogon.exe 2356 winlogon.exe 1472 winlogon.exe 2588 winlogon.exe 4580 winlogon.exe 5016 winlogon.exe 1556 winlogon.exe 4012 winlogon.exe 1844 winlogon.exe 684 winlogon.exe 4848 winlogon.exe 3700 winlogon.exe 4476 winlogon.exe 4704 winlogon.exe 688 winlogon.exe 2688 winlogon.exe 1960 winlogon.exe 568 winlogon.exe 3888 winlogon.exe 3808 winlogon.exe 1112 winlogon.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000\Software\Microsoft\Windows\CurrentVersion\Run\Readme = "C:\\Users\\Admin\\AppData\\Local\\rundll32.exe" rundll32.exe -
Drops desktop.ini file(s) 9 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\97d2e38552861fb6101e49f34d697c88\Admin@TYEBXLJN_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini SYSTEM CONFIG.EXE File created C:\Users\Admin\AppData\Local\97d2e38552861fb6101e49f34d697c88\Admin@TYEBXLJN_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini SYSTEM CONFIG.EXE File opened for modification C:\Users\Admin\AppData\Local\97d2e38552861fb6101e49f34d697c88\Admin@TYEBXLJN_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini SYSTEM CONFIG.EXE File opened for modification C:\Users\Admin\AppData\Local\97d2e38552861fb6101e49f34d697c88\Admin@TYEBXLJN_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini SYSTEM CONFIG.EXE File created C:\Users\Admin\AppData\Local\97d2e38552861fb6101e49f34d697c88\Admin@TYEBXLJN_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini SYSTEM CONFIG.EXE File opened for modification C:\Users\Admin\AppData\Local\97d2e38552861fb6101e49f34d697c88\Admin@TYEBXLJN_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini SYSTEM CONFIG.EXE File created C:\Users\Admin\AppData\Local\97d2e38552861fb6101e49f34d697c88\Admin@TYEBXLJN_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini SYSTEM CONFIG.EXE File created C:\Users\Admin\AppData\Local\97d2e38552861fb6101e49f34d697c88\Admin@TYEBXLJN_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini SYSTEM CONFIG.EXE File created C:\Users\Admin\AppData\Local\97d2e38552861fb6101e49f34d697c88\Admin@TYEBXLJN_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini SYSTEM CONFIG.EXE -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\hfTVayMmc.jpg" rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SYSTEM CONFIG.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 3704 cmd.exe 3204 netsh.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 544 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 3780 rundll32.exe 1972 SYSTEM CONFIG.EXE 1972 SYSTEM CONFIG.EXE 1972 SYSTEM CONFIG.EXE 1972 SYSTEM CONFIG.EXE 1972 SYSTEM CONFIG.EXE 1972 SYSTEM CONFIG.EXE 1972 SYSTEM CONFIG.EXE 1972 SYSTEM CONFIG.EXE 1972 SYSTEM CONFIG.EXE 1972 SYSTEM CONFIG.EXE 1972 SYSTEM CONFIG.EXE 1972 SYSTEM CONFIG.EXE 1972 SYSTEM CONFIG.EXE 1972 SYSTEM CONFIG.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3228 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeRestorePrivilege 3228 7zFM.exe Token: 35 3228 7zFM.exe Token: SeSecurityPrivilege 3228 7zFM.exe Token: SeDebugPrivilege 3036 BUILDER.EXE Token: SeDebugPrivilege 3780 rundll32.exe Token: SeDebugPrivilege 1972 SYSTEM CONFIG.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3228 7zFM.exe 3228 7zFM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3024 wrote to memory of 3036 3024 Panel GUI.exe 82 PID 3024 wrote to memory of 3036 3024 Panel GUI.exe 82 PID 3024 wrote to memory of 2240 3024 Panel GUI.exe 83 PID 3024 wrote to memory of 2240 3024 Panel GUI.exe 83 PID 3024 wrote to memory of 2240 3024 Panel GUI.exe 83 PID 3024 wrote to memory of 1972 3024 Panel GUI.exe 84 PID 3024 wrote to memory of 1972 3024 Panel GUI.exe 84 PID 3024 wrote to memory of 1972 3024 Panel GUI.exe 84 PID 2240 wrote to memory of 4560 2240 META.EXE 85 PID 2240 wrote to memory of 4560 2240 META.EXE 85 PID 2240 wrote to memory of 4560 2240 META.EXE 85 PID 4560 wrote to memory of 3052 4560 winlogon.exe 86 PID 4560 wrote to memory of 3052 4560 winlogon.exe 86 PID 4560 wrote to memory of 3052 4560 winlogon.exe 86 PID 3036 wrote to memory of 3780 3036 BUILDER.EXE 87 PID 3036 wrote to memory of 3780 3036 BUILDER.EXE 87 PID 3052 wrote to memory of 3760 3052 winlogon.exe 88 PID 3052 wrote to memory of 3760 3052 winlogon.exe 88 PID 3052 wrote to memory of 3760 3052 winlogon.exe 88 PID 3760 wrote to memory of 3168 3760 winlogon.exe 89 PID 3760 wrote to memory of 3168 3760 winlogon.exe 89 PID 3760 wrote to memory of 3168 3760 winlogon.exe 89 PID 3168 wrote to memory of 1628 3168 winlogon.exe 90 PID 3168 wrote to memory of 1628 3168 winlogon.exe 90 PID 3168 wrote to memory of 1628 3168 winlogon.exe 90 PID 1628 wrote to memory of 996 1628 winlogon.exe 91 PID 1628 wrote to memory of 996 1628 winlogon.exe 91 PID 1628 wrote to memory of 996 1628 winlogon.exe 91 PID 996 wrote to memory of 1480 996 winlogon.exe 92 PID 996 wrote to memory of 1480 996 winlogon.exe 92 PID 996 wrote to memory of 1480 996 winlogon.exe 92 PID 1480 wrote to memory of 3636 1480 winlogon.exe 93 PID 1480 wrote to memory of 3636 1480 winlogon.exe 93 PID 1480 wrote to memory of 3636 1480 winlogon.exe 93 PID 3636 wrote to memory of 3704 3636 winlogon.exe 94 PID 3636 wrote to memory of 3704 3636 winlogon.exe 94 PID 3636 wrote to memory of 3704 3636 winlogon.exe 94 PID 3704 wrote to memory of 3224 3704 winlogon.exe 95 PID 3704 wrote to memory of 3224 3704 winlogon.exe 95 PID 3704 wrote to memory of 3224 3704 winlogon.exe 95 PID 3224 wrote to memory of 2792 3224 winlogon.exe 96 PID 3224 wrote to memory of 2792 3224 winlogon.exe 96 PID 3224 wrote to memory of 2792 3224 winlogon.exe 96 PID 2792 wrote to memory of 4856 2792 winlogon.exe 97 PID 2792 wrote to memory of 4856 2792 winlogon.exe 97 PID 2792 wrote to memory of 4856 2792 winlogon.exe 97 PID 4856 wrote to memory of 4140 4856 winlogon.exe 98 PID 4856 wrote to memory of 4140 4856 winlogon.exe 98 PID 4856 wrote to memory of 4140 4856 winlogon.exe 98 PID 4140 wrote to memory of 1264 4140 winlogon.exe 99 PID 4140 wrote to memory of 1264 4140 winlogon.exe 99 PID 4140 wrote to memory of 1264 4140 winlogon.exe 99 PID 1264 wrote to memory of 3184 1264 winlogon.exe 100 PID 1264 wrote to memory of 3184 1264 winlogon.exe 100 PID 1264 wrote to memory of 3184 1264 winlogon.exe 100 PID 3184 wrote to memory of 4344 3184 winlogon.exe 101 PID 3184 wrote to memory of 4344 3184 winlogon.exe 101 PID 3184 wrote to memory of 4344 3184 winlogon.exe 101 PID 4344 wrote to memory of 1832 4344 winlogon.exe 103 PID 4344 wrote to memory of 1832 4344 winlogon.exe 103 PID 4344 wrote to memory of 1832 4344 winlogon.exe 103 PID 1832 wrote to memory of 1860 1832 winlogon.exe 104 PID 1832 wrote to memory of 1860 1832 winlogon.exe 104 PID 1832 wrote to memory of 1860 1832 winlogon.exe 104
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Meta.v3.0.cracked.rar"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3228
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1960
-
C:\Users\Admin\Desktop\Meta v3.0 cracked\Panel\Panel GUI.exe"C:\Users\Admin\Desktop\Meta v3.0 cracked\Panel\Panel GUI.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\BUILDER.EXE"C:\Users\Admin\AppData\Local\Temp\BUILDER.EXE"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\rundll32.exe"C:\Users\Admin\AppData\Local\rundll32.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3780
-
-
-
C:\Users\Admin\AppData\Local\Temp\META.EXE"C:\Users\Admin\AppData\Local\Temp\META.EXE"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"12⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"20⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1860 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1844 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"22⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:684 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"23⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4544 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"24⤵
- Executes dropped EXE
PID:784 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"25⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4660 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"26⤵
- Executes dropped EXE
PID:5052 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"27⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3832 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:240 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:568 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4628 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"31⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3808 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"32⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1112 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3496 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"34⤵
- Executes dropped EXE
PID:2092 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2364 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"36⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4792 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3364 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"38⤵
- Executes dropped EXE
PID:2176 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1120 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1568 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"41⤵
- Executes dropped EXE
PID:2724 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2356 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1472 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"44⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2588 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4580 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5016 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"47⤵
- Executes dropped EXE
PID:1556 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"48⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4012 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"49⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1844 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:684 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"51⤵
- Executes dropped EXE
PID:4848 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3700 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"53⤵
- Executes dropped EXE
PID:4476 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4704 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"55⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:688 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"56⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2688 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"57⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1960 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:568 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"59⤵
- Executes dropped EXE
PID:3888 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"60⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3808 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"61⤵
- Executes dropped EXE
PID:1112 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"62⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2160 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"63⤵
- Drops file in System32 directory
PID:2092 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"64⤵
- Drops file in System32 directory
PID:4872 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"65⤵PID:2240
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"66⤵
- System Location Discovery: System Language Discovery
PID:1076 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"67⤵
- Drops file in System32 directory
PID:1580 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"68⤵
- System Location Discovery: System Language Discovery
PID:1668 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"69⤵PID:3424
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"70⤵
- System Location Discovery: System Language Discovery
PID:4832 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"71⤵PID:3140
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"72⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2800 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"73⤵
- Drops file in System32 directory
PID:4740 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"74⤵
- Drops file in System32 directory
PID:4936 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"75⤵
- Drops file in System32 directory
PID:2432 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"76⤵
- System Location Discovery: System Language Discovery
PID:3700 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"77⤵
- System Location Discovery: System Language Discovery
PID:2704 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"78⤵
- System Location Discovery: System Language Discovery
PID:3656 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"79⤵
- Drops file in System32 directory
PID:4552 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"80⤵
- System Location Discovery: System Language Discovery
PID:2096 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"81⤵PID:568
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"82⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4468 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"83⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3808 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"84⤵PID:1220
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"85⤵
- Drops file in System32 directory
PID:5024 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"86⤵PID:1596
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"87⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2032 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"88⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1896 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"89⤵
- Drops file in System32 directory
PID:2968 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"90⤵
- System Location Discovery: System Language Discovery
PID:2700 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"91⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3804 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"92⤵
- Drops file in System32 directory
PID:3040 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"93⤵
- System Location Discovery: System Language Discovery
PID:4840 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"94⤵
- Drops file in System32 directory
PID:1980 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"95⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1916 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"96⤵
- Drops file in System32 directory
PID:1628 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"97⤵
- System Location Discovery: System Language Discovery
PID:2416 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"98⤵PID:740
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"99⤵PID:1844
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"100⤵
- Drops file in System32 directory
PID:3480 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"101⤵
- Drops file in System32 directory
PID:396 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"102⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4200 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"103⤵
- Drops file in System32 directory
PID:956 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"104⤵PID:688
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"105⤵
- Drops file in System32 directory
PID:1964 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"106⤵
- Drops file in System32 directory
PID:2716 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"107⤵
- Drops file in System32 directory
PID:2040 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"108⤵
- System Location Discovery: System Language Discovery
PID:4256 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"109⤵PID:3500
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"110⤵PID:3496
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"111⤵
- Drops file in System32 directory
PID:2092 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"112⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4692 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"113⤵PID:3364
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"114⤵PID:3036
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"115⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2968 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"116⤵
- System Location Discovery: System Language Discovery
PID:2700 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"117⤵PID:3424
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"118⤵PID:2356
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"119⤵PID:1584
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"120⤵PID:3892
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"121⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4344 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"122⤵PID:1848
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-