Analysis
-
max time kernel
16s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
30-12-2024 18:32
Static task
static1
Behavioral task
behavioral1
Sample
Meta.v3.0.cracked.rar
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
Meta.v3.0.cracked.rar
Resource
win7-20241010-en
General
-
Target
Meta.v3.0.cracked.rar
-
Size
6.1MB
-
MD5
80f0209c71e159a12b284e9070782736
-
SHA1
6ebcec184f833642c8be195f0299e3c36d8ddbd2
-
SHA256
661958d0aa5bf8ac6fbc5c6bae19df1047041fa64819d523b4d10e6c922e26cf
-
SHA512
fed7a1b5f686b4ffa2a8ae191a8c21e345033a7773fad2b2b1cf35887659e4b7797a73e27790023fe59a32a587f66ed2e338f9d168450e7cb0a36bfb2a0c954f
-
SSDEEP
98304:sLr46ag4zz8RUciao7lMPVpIUoOdHZAqSRGMIqMOUwHcJ0DfkzKWLKXKgL/b:Qjag4zoigpIUBHoRUOUwE9GXagv
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot6097463381:AAFE6EI5D2TfE07x6OlKgJrWRj4KUyXcsn0/sendMessage?chat_id=5761333594
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 3 IoCs
resource yara_rule behavioral1/files/0x001900000002ab7d-20.dat family_stormkitty behavioral1/files/0x001900000002ab8c-46.dat family_stormkitty behavioral1/memory/692-75-0x0000000000CA0000-0x0000000000CDE000-memory.dmp family_stormkitty -
Stormkitty family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x001900000002ab8c-46.dat family_asyncrat -
Executes dropped EXE 23 IoCs
pid Process 3552 Panel GUI.exe 3844 BUILDER.EXE 812 META.EXE 692 SYSTEM CONFIG.EXE 2908 winlogon.exe 1280 winlogon.exe 4648 rundll32.exe 1972 winlogon.exe 2368 winlogon.exe 960 winlogon.exe 1704 winlogon.exe 2108 winlogon.exe 4784 winlogon.exe 4628 winlogon.exe 4480 winlogon.exe 128 winlogon.exe 3140 winlogon.exe 1312 winlogon.exe 4856 winlogon.exe 2728 winlogon.exe 2140 winlogon.exe 3792 winlogon.exe 4760 winlogon.exe -
Drops file in System32 directory 20 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe META.EXE File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\config\winlogon.exe META.EXE File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\config\winlogon.exe winlogon.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cVtwImhMO.jpg" rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Panel GUI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SYSTEM CONFIG.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language META.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 4620 netsh.exe 3172 cmd.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe 4648 rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2380 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeRestorePrivilege 2380 7zFM.exe Token: 35 2380 7zFM.exe Token: SeSecurityPrivilege 2380 7zFM.exe Token: SeDebugPrivilege 3844 BUILDER.EXE Token: SeDebugPrivilege 4648 rundll32.exe Token: SeDebugPrivilege 692 SYSTEM CONFIG.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2380 7zFM.exe 2380 7zFM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3552 wrote to memory of 3844 3552 Panel GUI.exe 82 PID 3552 wrote to memory of 3844 3552 Panel GUI.exe 82 PID 3552 wrote to memory of 812 3552 Panel GUI.exe 83 PID 3552 wrote to memory of 812 3552 Panel GUI.exe 83 PID 3552 wrote to memory of 812 3552 Panel GUI.exe 83 PID 3552 wrote to memory of 692 3552 Panel GUI.exe 84 PID 3552 wrote to memory of 692 3552 Panel GUI.exe 84 PID 3552 wrote to memory of 692 3552 Panel GUI.exe 84 PID 812 wrote to memory of 2908 812 META.EXE 85 PID 812 wrote to memory of 2908 812 META.EXE 85 PID 812 wrote to memory of 2908 812 META.EXE 85 PID 2908 wrote to memory of 1280 2908 winlogon.exe 86 PID 2908 wrote to memory of 1280 2908 winlogon.exe 86 PID 2908 wrote to memory of 1280 2908 winlogon.exe 86 PID 3844 wrote to memory of 4648 3844 BUILDER.EXE 87 PID 3844 wrote to memory of 4648 3844 BUILDER.EXE 87 PID 1280 wrote to memory of 1972 1280 winlogon.exe 88 PID 1280 wrote to memory of 1972 1280 winlogon.exe 88 PID 1280 wrote to memory of 1972 1280 winlogon.exe 88 PID 1972 wrote to memory of 2368 1972 winlogon.exe 89 PID 1972 wrote to memory of 2368 1972 winlogon.exe 89 PID 1972 wrote to memory of 2368 1972 winlogon.exe 89 PID 2368 wrote to memory of 960 2368 winlogon.exe 90 PID 2368 wrote to memory of 960 2368 winlogon.exe 90 PID 2368 wrote to memory of 960 2368 winlogon.exe 90 PID 960 wrote to memory of 1704 960 winlogon.exe 91 PID 960 wrote to memory of 1704 960 winlogon.exe 91 PID 960 wrote to memory of 1704 960 winlogon.exe 91 PID 1704 wrote to memory of 2108 1704 winlogon.exe 142 PID 1704 wrote to memory of 2108 1704 winlogon.exe 142 PID 1704 wrote to memory of 2108 1704 winlogon.exe 142 PID 2108 wrote to memory of 4784 2108 winlogon.exe 93 PID 2108 wrote to memory of 4784 2108 winlogon.exe 93 PID 2108 wrote to memory of 4784 2108 winlogon.exe 93 PID 4784 wrote to memory of 4628 4784 winlogon.exe 116 PID 4784 wrote to memory of 4628 4784 winlogon.exe 116 PID 4784 wrote to memory of 4628 4784 winlogon.exe 116 PID 4628 wrote to memory of 4480 4628 winlogon.exe 120 PID 4628 wrote to memory of 4480 4628 winlogon.exe 120 PID 4628 wrote to memory of 4480 4628 winlogon.exe 120 PID 4480 wrote to memory of 128 4480 winlogon.exe 96 PID 4480 wrote to memory of 128 4480 winlogon.exe 96 PID 4480 wrote to memory of 128 4480 winlogon.exe 96 PID 128 wrote to memory of 3140 128 winlogon.exe 97 PID 128 wrote to memory of 3140 128 winlogon.exe 97 PID 128 wrote to memory of 3140 128 winlogon.exe 97 PID 3140 wrote to memory of 1312 3140 winlogon.exe 98 PID 3140 wrote to memory of 1312 3140 winlogon.exe 98 PID 3140 wrote to memory of 1312 3140 winlogon.exe 98 PID 1312 wrote to memory of 4856 1312 winlogon.exe 99 PID 1312 wrote to memory of 4856 1312 winlogon.exe 99 PID 1312 wrote to memory of 4856 1312 winlogon.exe 99 PID 4856 wrote to memory of 2728 4856 winlogon.exe 101 PID 4856 wrote to memory of 2728 4856 winlogon.exe 101 PID 4856 wrote to memory of 2728 4856 winlogon.exe 101 PID 2728 wrote to memory of 2140 2728 winlogon.exe 102 PID 2728 wrote to memory of 2140 2728 winlogon.exe 102 PID 2728 wrote to memory of 2140 2728 winlogon.exe 102 PID 2140 wrote to memory of 3792 2140 winlogon.exe 103 PID 2140 wrote to memory of 3792 2140 winlogon.exe 103 PID 2140 wrote to memory of 3792 2140 winlogon.exe 103 PID 3792 wrote to memory of 4760 3792 winlogon.exe 251 PID 3792 wrote to memory of 4760 3792 winlogon.exe 251 PID 3792 wrote to memory of 4760 3792 winlogon.exe 251
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Meta.v3.0.cracked.rar"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2380
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:848
-
C:\Users\Admin\Desktop\Meta v3.0 cracked\Panel\Panel GUI.exe"C:\Users\Admin\Desktop\Meta v3.0 cracked\Panel\Panel GUI.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\BUILDER.EXE"C:\Users\Admin\AppData\Local\Temp\BUILDER.EXE"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Users\Admin\AppData\Local\rundll32.exe"C:\Users\Admin\AppData\Local\rundll32.exe"3⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4648
-
-
-
C:\Users\Admin\AppData\Local\Temp\META.EXE"C:\Users\Admin\AppData\Local\Temp\META.EXE"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"12⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"13⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:128 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"14⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"15⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"16⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"17⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"18⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"19⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"20⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4760 -
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"21⤵PID:3916
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"22⤵PID:2840
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"23⤵PID:1900
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"24⤵PID:2988
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"25⤵PID:2848
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"26⤵PID:4040
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"27⤵PID:2440
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"28⤵PID:3848
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"29⤵PID:4568
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"30⤵PID:4524
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"31⤵PID:1012
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"32⤵PID:4628
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"33⤵PID:4788
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"34⤵PID:1104
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"35⤵PID:4804
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"36⤵PID:4480
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"37⤵PID:1612
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"38⤵PID:4032
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"39⤵PID:1184
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"40⤵PID:3852
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"41⤵PID:4036
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"42⤵PID:1240
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"43⤵PID:4752
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"44⤵PID:1532
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"45⤵PID:4688
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"46⤵PID:1420
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"47⤵PID:1408
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"48⤵PID:4852
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"49⤵PID:1288
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"50⤵PID:3828
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"51⤵PID:3808
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"52⤵PID:416
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"53⤵PID:4848
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"54⤵PID:2560
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"55⤵PID:1676
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"56⤵PID:340
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"57⤵PID:2108
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"58⤵PID:712
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"59⤵PID:4048
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"60⤵PID:5008
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"61⤵PID:1488
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"62⤵PID:4608
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"63⤵PID:3012
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"64⤵PID:2056
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"65⤵PID:1128
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"66⤵PID:1936
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"67⤵PID:672
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"68⤵PID:1552
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"69⤵PID:2420
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"70⤵PID:4032
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"71⤵PID:4660
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"72⤵PID:252
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"73⤵PID:4892
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"74⤵PID:5016
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"75⤵PID:956
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"76⤵PID:4760
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"77⤵PID:1536
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"78⤵PID:2464
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"79⤵PID:2032
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"80⤵PID:2144
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"81⤵PID:3112
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"82⤵PID:3676
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"83⤵PID:5004
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"84⤵PID:4568
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"85⤵PID:1332
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"86⤵PID:1692
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"87⤵PID:4412
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"88⤵PID:4788
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"89⤵PID:3832
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"90⤵PID:1124
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"91⤵PID:3544
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"92⤵PID:2564
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"93⤵PID:2372
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"94⤵PID:2744
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"95⤵PID:1416
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"96⤵PID:5100
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"97⤵PID:4752
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"98⤵PID:1728
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"99⤵PID:1492
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"100⤵PID:1668
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"101⤵PID:1768
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"102⤵PID:4852
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"103⤵PID:5000
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"104⤵PID:4580
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"105⤵PID:4240
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"106⤵PID:2376
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"107⤵PID:1020
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"108⤵PID:1948
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"109⤵PID:5052
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"110⤵PID:4428
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"111⤵PID:4560
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"112⤵PID:2040
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"113⤵PID:2524
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"114⤵PID:4596
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"115⤵PID:3012
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"116⤵PID:1148
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"117⤵PID:4052
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"118⤵PID:2388
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"119⤵PID:1960
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"120⤵PID:3716
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"121⤵PID:4940
-
C:\Windows\SysWOW64\config\winlogon.exe"C:\Windows\system32\config\winlogon.exe"122⤵PID:244
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-