Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
06/03/2025, 15:29
250306-sw9ldasmw3 1006/03/2025, 15:23
250306-ssy1gaslw9 406/03/2025, 08:00
250306-jvyytatmz4 1006/03/2025, 07:24
250306-h8mx2astfy 806/03/2025, 07:17
250306-h4t6jssqs7 306/03/2025, 07:11
250306-hz7k3sspt7 1005/03/2025, 18:34
250305-w759wawmw3 3Analysis
-
max time kernel
351s -
max time network
337s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2025, 07:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://poki.freegames
Resource
win10v2004-20250217-en
General
-
Target
http://poki.freegames
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hydra.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Launcher.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2080 msedge.exe 2080 msedge.exe 3932 msedge.exe 3932 msedge.exe 1596 identity_helper.exe 1596 identity_helper.exe 5560 msedge.exe 5560 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 3140 msedge.exe 3140 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1124 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 22 IoCs
pid Process 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1124 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3932 wrote to memory of 2180 3932 msedge.exe 86 PID 3932 wrote to memory of 2180 3932 msedge.exe 86 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 852 3932 msedge.exe 87 PID 3932 wrote to memory of 2080 3932 msedge.exe 88 PID 3932 wrote to memory of 2080 3932 msedge.exe 88 PID 3932 wrote to memory of 2208 3932 msedge.exe 89 PID 3932 wrote to memory of 2208 3932 msedge.exe 89 PID 3932 wrote to memory of 2208 3932 msedge.exe 89 PID 3932 wrote to memory of 2208 3932 msedge.exe 89 PID 3932 wrote to memory of 2208 3932 msedge.exe 89 PID 3932 wrote to memory of 2208 3932 msedge.exe 89 PID 3932 wrote to memory of 2208 3932 msedge.exe 89 PID 3932 wrote to memory of 2208 3932 msedge.exe 89 PID 3932 wrote to memory of 2208 3932 msedge.exe 89 PID 3932 wrote to memory of 2208 3932 msedge.exe 89 PID 3932 wrote to memory of 2208 3932 msedge.exe 89 PID 3932 wrote to memory of 2208 3932 msedge.exe 89 PID 3932 wrote to memory of 2208 3932 msedge.exe 89 PID 3932 wrote to memory of 2208 3932 msedge.exe 89 PID 3932 wrote to memory of 2208 3932 msedge.exe 89 PID 3932 wrote to memory of 2208 3932 msedge.exe 89 PID 3932 wrote to memory of 2208 3932 msedge.exe 89 PID 3932 wrote to memory of 2208 3932 msedge.exe 89 PID 3932 wrote to memory of 2208 3932 msedge.exe 89 PID 3932 wrote to memory of 2208 3932 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://poki.freegames1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdb13346f8,0x7ffdb1334708,0x7ffdb13347182⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,2147482563123288101,8479581630951320338,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,2147482563123288101,8479581630951320338,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,2147482563123288101,8479581630951320338,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2147482563123288101,8479581630951320338,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2147482563123288101,8479581630951320338,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2147482563123288101,8479581630951320338,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4068 /prefetch:12⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2147482563123288101,8479581630951320338,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3648 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,2147482563123288101,8479581630951320338,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 /prefetch:82⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,2147482563123288101,8479581630951320338,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2147482563123288101,8479581630951320338,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4064 /prefetch:12⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2147482563123288101,8479581630951320338,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2147482563123288101,8479581630951320338,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3532 /prefetch:12⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2147482563123288101,8479581630951320338,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2147482563123288101,8479581630951320338,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2147482563123288101,8479581630951320338,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:12⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2147482563123288101,8479581630951320338,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2147482563123288101,8479581630951320338,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:12⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2147482563123288101,8479581630951320338,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2124,2147482563123288101,8479581630951320338,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5176 /prefetch:82⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2147482563123288101,8479581630951320338,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6120 /prefetch:12⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2147482563123288101,8479581630951320338,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:5168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2147482563123288101,8479581630951320338,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:12⤵PID:5176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2147482563123288101,8479581630951320338,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1888 /prefetch:12⤵PID:5676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2147482563123288101,8479581630951320338,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6700 /prefetch:12⤵PID:5600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2147482563123288101,8479581630951320338,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:5940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2147482563123288101,8479581630951320338,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:5976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2147482563123288101,8479581630951320338,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:6120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2124,2147482563123288101,8479581630951320338,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6164 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,2147482563123288101,8479581630951320338,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2147482563123288101,8479581630951320338,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:6124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2124,2147482563123288101,8479581630951320338,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6012 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3140
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2616
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1832
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1000
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1124
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Joke\Hydra.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Joke\Hydra.exe"1⤵
- System Location Discovery: System Language Discovery
PID:5264
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Joke\Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Joke\Launcher.exe"1⤵
- System Location Discovery: System Language Discovery
PID:5344
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Joke\Melting.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Joke\Melting.exe"1⤵PID:5268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56738f4e2490ee5070d850bf03bf3efa5
SHA1fbc49d2dd145369e8861532e6ebf0bd56a0fe67c
SHA256ca80bbae3c392e46d730a53d0ee4cfecbbe45c264ad3b3c7ee287252c21eaeab
SHA5122939edf5e6c34c9ea669a129a4a5a410fbbd29cd504dc8e007e9b3b3c7fbb9bea8c14d6177ac375d0c481995774a02d210328569231cb01db07b59452333b22b
-
Filesize
152B
MD593be3a1bf9c257eaf83babf49b0b5e01
SHA1d55c01e95c2e6a87a5ece8cc1d466cc98a520e2a
SHA2568786fd66f4602e6ed3fa5248bd597b3f362ffa458f85207eaa154beb55522348
SHA512885b09dd3072921f375eedb5f0575561adc89700ecfbe999bc3e5ea1d7cb45e19d85c5e420f2c0a12b428742e1110e66f4ceecbe5a6badddd36cc9e0aff48e52
-
Filesize
62KB
MD5c813a1b87f1651d642cdcad5fca7a7d8
SHA10e6628997674a7dfbeb321b59a6e829d0c2f4478
SHA256df670e09f278fea1d0684afdcd0392a83d7041585ba5996f7b527974d7d98ec3
SHA512af0d024ba1faafbd6f950c67977ed126827180a47cea9758ee51a95d13436f753eb5a7aa12a9090048a70328f6e779634c612aebde89b06740ffd770751e1c5b
-
Filesize
67KB
MD5cc63ec5f8962041727f3a20d6a278329
SHA16cbeee84f8f648f6c2484e8934b189ba76eaeb81
SHA25689a4d1b2e007ac49fc9677d797266268cd031f99aa0766ca2450bff84ac227d1
SHA512107cf3499a6cf9cdcbfa3ef4c6b4f2cda2472be116f8efa51ff403c624e8001d254be52de7834b2a6ab9f4bcc1a3b19adc0bba8c496e505abbca371ef6c8f877
-
Filesize
19KB
MD51bd4ae71ef8e69ad4b5ffd8dc7d2dcb5
SHA16dd8803e59949c985d6a9df2f26c833041a5178c
SHA256af18b3681e8e2a1e8dc34c2aa60530dc8d8a9258c4d562cbe20c898d5de98725
SHA512b3ff083b669aca75549396250e05344ba2f1c021468589f2bd6f1b977b7f11df00f958bbbd22f07708b5d30d0260f39d8de57e75382b3ab8e78a2c41ef428863
-
Filesize
65KB
MD556d57bc655526551f217536f19195495
SHA128b430886d1220855a805d78dc5d6414aeee6995
SHA256f12de7e272171cda36389813df4ba68eb2b8b23c58e515391614284e7b03c4d4
SHA5127814c60dc377e400bbbcc2000e48b617e577a21045a0f5c79af163faa0087c6203d9f667e531bbb049c9bd8fb296678e6a5cdcad149498d7f22ffa11236b51cb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD53fc2289d61d136bff8af3acd6540c135
SHA1acb78e584f97f79a9b0fc458fe6d21059e37a99c
SHA25627f373017e4c40622b115898be0fd02c33f460bdb83e15e4573975938b8698c9
SHA512a331cf30e89ea485bb7ebe346c503c15b3243f09ff712f2c9ce51e9e195f88025bce787a0b21267dec085d1052f954e78756b54cd1fe1ca1659e0a2ac3977228
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5bb0473735b99741d625c12c4880909d6
SHA188742770c4074ad07c554ec6100d1ae1b9a7b760
SHA2564217b98ea8ff36cc1492fe4a1eae741c5c6a8639b75aaf5f17946ecb13f7c7da
SHA51298c3cf884b404ad174f1285a88ba9c56cf9cfcfc819bf14485c75de6eccee7f4102cc1c60ced58eb002e14d31c7f7fccff4533c171273c37ff076488738247b6
-
Filesize
934B
MD5d6879fd4c116f8137ae36e74f09c844b
SHA1c22f7b951239029cf6e42e02d22d7abd609ee1b8
SHA25667b17fdce65da2f7d6539760681ea7d0ad5e99396b18b4318e59965ad21596c8
SHA5125447537dc1528c23eab14ad6b9d44e346196a481c8a558a52c88ca5b4c856d7e46a2b993a03f43b4bef8a8567fdb277aeee7a7b105db56641198a7c441613e15
-
Filesize
6KB
MD5eccd807aaa64dd236d585dd08f36df59
SHA19831b54d76cbabb813aefa861f1f7ea834322577
SHA2562ca7ae26abab352063d565d01df70edfe9fdc4a70fea408ef38c3ca6f2530520
SHA5127898aaf1c8dd48eef1056020a2d05163ceb8b8b349db1eb92c5d1da8434f5a151b5e3ffb4daadf2b0f6135964c83ca062425f23b243b4bb4df321315fdd89129
-
Filesize
5KB
MD5d0a74f75b7997c19360cea249472acba
SHA186fddec438650773d2cb0b53e41b1c063eab8eb4
SHA25626506b5841db5b12af89b69c4534abf7fe821fa971bdb8dd8b2dbd7d7876639e
SHA5126c61d9368b4b658ec1501cde1b3f8e85812bff4c6cea75c91cb46e7b730d67cb50c578e3f6eb6273c1e1e58628cb98ecbf3d0403730ba72f3782d5bef7642cf7
-
Filesize
6KB
MD550ab1563021bc2f7cc9edfb4b239ef36
SHA14c2eaac3698edcc7343dada8c1e652310b8e0412
SHA25692a1f158f38744b658e06a29660718082311ac1ef3a08b26a0e3dff7c03f4ddd
SHA51232258994a9efb99e98eece08f0c3679e485cbfb00d2174a5ff081ff5341974fa626156b2dd7a61ed8ab6b8f4dc4928a26a036cea77ab456432137a8e33de1b3a
-
Filesize
7KB
MD5e0849296998525457e38b93cf32aec39
SHA18374bac06bdceeb23062a62be29cfc397229c771
SHA256ae205ee7d09eb0de3f32eaa2b18698a461e3c15ed0a18a0dbc381a9f364176fe
SHA5129d62b3ef03d27ccf9ea0aad0e1c7fe3311697025a6c141df9b82e415d8c661e76200fc63e65856d8c099996162fad28b5bdd2439ee7a639ed28bdeda6c6b4470
-
Filesize
6KB
MD59fe937104718a89194026f186b39b14d
SHA1cbee727fcc27e052c2372367c2c97fe93462e580
SHA2567efc5d230bfd84fcfcaa83f7ec9c0379a9e6c00dbec78b9348403c6f0921c5e0
SHA512880acbd827a47ae182d40153c3b33aa683b5e97ad0b4a00a0382d8c88d93f471c6b093bcd05395880239239f8262a813cd6e81ae15ed59c059dfd7623f16771c
-
Filesize
1KB
MD521bdfc268d60d15038d68cf4c5d71e64
SHA1359a72f4a78d9750c999d3cc617f556edad2d4bd
SHA256d8fa92f718a0e77e2f1eef5175c7a092ce6258535c145b7725749f9cc827127c
SHA512622a94b7a02b75d11c7c9167e1ff3eb839eb1a0e90d2d4264a1a737fda41115b0401f61a41876a77c0876da25dd584535cd8ac028e9d87a8bea23a457049d973
-
Filesize
1KB
MD5cbac8b8910f0e0df0949fd773890417a
SHA1d9288b620a3fad98010337b15203036e52fdfac3
SHA25665babfe2210d2bcf877677c9cf87966fd25f839695bc3edb74938518b04cf983
SHA5128aae6b48a20f3a85e32b8620f6ee19fb57bd19fe138d424ace6f705bf39aa42ff1a54247b2da858710d1ae33956d6dc30d90bf2f5d450035a7fdef9bcfc6fd45
-
Filesize
1KB
MD540415abd62d397426bf5aa6dca1ed52a
SHA1c57b88c315b53497d3550da51baf0046efd969dd
SHA256856dd9829f162a2c9bda19be708debaf749da03b65b73ba6520fbad550897f9c
SHA512c2c8e20f76d3912000862357cd4db8733e157c4f8abad880a3a1252bce83477c1082a4081c3105ebb868e2bd24be85657fa8e207aa7c29f2e196cf2138c271ef
-
Filesize
1KB
MD53425101f63528ddf1961a7a6757cb8be
SHA1492fca7b110abd3b60b1d467f3c2480dcbe715d7
SHA2560183f43d69fe5a8cb2d039bc5448c08a3f933676ae4a962ce759ead684322aab
SHA512106b56e169678fb4b54c46bab3607938e723ca0fbf54125e12873ef49371a4162a9eae1cc5774279b7ac40ed50ad81a305a1c6f760c63e376966b36bd8154a3f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD596b87085cc673738f1cc48c7bbb7cba9
SHA1c927e37af1c65eedd28d9a6caaf0ef552fe8ddf6
SHA256f2e7ef234b3b59b61a6951403a1b232068943cfc09c9e4f8201ba25aad746049
SHA5125d5b2053e122500d7997435242aefd8982a0f4097aba07dabef9ae07fac6d37dacf69870b61cd8caa518075436731a05650df7bbbf2dd05e625a10fe36071f90
-
Filesize
11KB
MD5d60436ff959aad028ea83f07d063cd6f
SHA114694bc33a4670dcf71a1cdbb6aab237882094ad
SHA256a281ee014ab3145fea699004d78fa614f193b0ffe144cd5b6c895f1518ca3928
SHA5128ed1990b57ea69176d2759efe0ce3cb273f8924e465d7a3e5f548088430e9ceb9f909ddb7e4536586fbb67bbe5c9dbdc4bc25bbbbe47b90384cd964a69e43ec6
-
Filesize
12.1MB
MD5c8bf514a334eaa148cb3c6135c2fb394
SHA10e47a89c3729db5a6f195c6abb04e5129d788df8
SHA2569127560918eaefe69f1959bcb7f7e13b7e3a7ac156b564922829faaec9b96f67
SHA5129879a258f429ef492cf495dbddd4f2b9c9fbc061e325aa8ad870ed05049b7ad595b26d223d20c55fc99f403fc9b5d0235353d71bf5d9a39ee4462838feb247ff