Eu tenho o window-8 instalado na verificação do gerenciador de tarefas. Encontrei os seguintes detalhes:
-
O dwm (Desktop Window Manager) estava em execução sob o nome de usuário "DWM-1".
-
"SandboxieDcomLaunch.exe", "SandboxieRpcSs.exe" e o aplicativo em execução dentro do sandboxie estão sendo executados com o nome de usuário "ANONYMOUS LOGON ".
.
Aoverificaroslogsdesegurançanovisualizadordeeventos,encontreiasseguintesinformações:
Anaccountwassuccessfullyloggedon.Subject:SecurityID:**NULLSID**AccountName:-AccountDomain:-LogonID:0x0LogonType:3ImpersonationLevel:ImpersonationNewLogon:SecurityID:ANONYMOUSLOGONAccountName:ANONYMOUSLOGONAccountDomain:NTAUTHORITYLogonID:0x1F481LogonGUID:{00000000-0000-0000-0000-000000000000}ProcessInformation:ProcessID:0x0ProcessName:-NetworkInformation:WorkstationName:SourceNetworkAddress:-SourcePort:-DetailedAuthenticationInformation:LogonProcess:NtLmSspAuthenticationPackage:NTLMTransitedServices:-PackageName(NTLMonly):NTLMV1KeyLength:0
AoexecutaroseguintecomandonoPowershell,encontrei"ANONYMOUS LOGON" listado na lista win32_system_account.
get-wmiobject -class "win32_account" -namespace "root\cimv2" | sort
caption | format-table caption, __CLASS, FullName
caption __CLASS FullName
------- ------- --------
PCX\Access Control Assistance Opera... Win32_Group
pcx\Administrator Win32_UserAccount
PCX\Administrators Win32_Group
**PCX\ANONYMOUS LOGON** Win32_SystemAccount
PCX\Authenticated Users Win32_SystemAccount
PCX\Backup Operators Win32_Group
PCX\BATCH Win32_SystemAccount
PCX\BUILTIN Win32_SystemAccount
PCX\CREATOR GROUP Win32_SystemAccount
PCX\CREATOR GROUP SERVER Win32_SystemAccount
PCX\CREATOR OWNER Win32_SystemAccount
PCX\CREATOR OWNER SERVER Win32_SystemAccount
PCX\Cryptographic Operators Win32_Group
PCX\DIALUP Win32_SystemAccount
PCX\Distributed COM Users Win32_Group
PCX\ENTERPRISE DOMAIN CONTROLLERS Win32_SystemAccount
PCX\Event Log Readers Win32_Group
PCX\Everyone Win32_SystemAccount
pcx\Guest Win32_UserAccount
PCX\Guests Win32_Group
PCX\Hyper-V Administrators Win32_Group
PCX\IIS_IUSRS Win32_Group
PCX\INTERACTIVE Win32_SystemAccount
PCX\IUSR Win32_SystemAccount
PCX\LOCAL Win32_SystemAccount
PCX\LOCAL SERVICE Win32_SystemAccount
PCX\NETWORK Win32_SystemAccount
PCX\Network Configuration Operators Win32_Group
PCX\NETWORK SERVICE Win32_SystemAccount
PCX\OWNER RIGHTS Win32_SystemAccount
PCX\Performance Log Users Win32_Group
PCX\Performance Monitor Users Win32_Group
PCX\Power Users Win32_Group
PCX\PROXY Win32_SystemAccount
PCX\Remote Desktop Users Win32_Group
PCX\REMOTE INTERACTIVE LOGON Win32_SystemAccount
PCX\Remote Management Users Win32_Group
PCX\Replicator Win32_Group
PCX\RESTRICTED Win32_SystemAccount
PCX\SELF Win32_SystemAccount
PCX\SERVICE Win32_SystemAccount
PCX\SYSTEM Win32_SystemAccount
pcx/CYBORG Win32_UserAccount
PCX\TERMINAL SERVER USER Win32_SystemAccount
PCX\Users Win32_Group
PCX\WinRMRemoteWMIUsers__ Win32_Group
Alguém pode me explicar o que está acontecendo? o que "DWM-1" e "ANONYMOUS LOGON" são, nunca vi processo em execução sob tais nomes de usuários.