Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
06/03/2025, 15:29
250306-sw9ldasmw3 1006/03/2025, 15:23
250306-ssy1gaslw9 406/03/2025, 08:00
250306-jvyytatmz4 1006/03/2025, 07:24
250306-h8mx2astfy 806/03/2025, 07:17
250306-h4t6jssqs7 306/03/2025, 07:11
250306-hz7k3sspt7 1005/03/2025, 18:34
250305-w759wawmw3 3Analysis
-
max time kernel
998s -
max time network
1019s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
06/03/2025, 15:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://poki.freegames
Resource
win10v2004-20250217-en
Behavioral task
behavioral2
Sample
http://poki.freegames
Resource
win10ltsc2021-20250217-en
General
-
Target
http://poki.freegames
Malware Config
Signatures
-
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\setupact.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log UserOOBEBroker.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FileCoAuth.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1886653772-2813795769-2221171443-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3904 msedge.exe 3904 msedge.exe 4632 msedge.exe 4632 msedge.exe 3636 identity_helper.exe 3636 identity_helper.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 18 IoCs
pid Process 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4632 wrote to memory of 4356 4632 msedge.exe 84 PID 4632 wrote to memory of 4356 4632 msedge.exe 84 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 936 4632 msedge.exe 85 PID 4632 wrote to memory of 3904 4632 msedge.exe 86 PID 4632 wrote to memory of 3904 4632 msedge.exe 86 PID 4632 wrote to memory of 2440 4632 msedge.exe 87 PID 4632 wrote to memory of 2440 4632 msedge.exe 87 PID 4632 wrote to memory of 2440 4632 msedge.exe 87 PID 4632 wrote to memory of 2440 4632 msedge.exe 87 PID 4632 wrote to memory of 2440 4632 msedge.exe 87 PID 4632 wrote to memory of 2440 4632 msedge.exe 87 PID 4632 wrote to memory of 2440 4632 msedge.exe 87 PID 4632 wrote to memory of 2440 4632 msedge.exe 87 PID 4632 wrote to memory of 2440 4632 msedge.exe 87 PID 4632 wrote to memory of 2440 4632 msedge.exe 87 PID 4632 wrote to memory of 2440 4632 msedge.exe 87 PID 4632 wrote to memory of 2440 4632 msedge.exe 87 PID 4632 wrote to memory of 2440 4632 msedge.exe 87 PID 4632 wrote to memory of 2440 4632 msedge.exe 87 PID 4632 wrote to memory of 2440 4632 msedge.exe 87 PID 4632 wrote to memory of 2440 4632 msedge.exe 87 PID 4632 wrote to memory of 2440 4632 msedge.exe 87 PID 4632 wrote to memory of 2440 4632 msedge.exe 87 PID 4632 wrote to memory of 2440 4632 msedge.exe 87 PID 4632 wrote to memory of 2440 4632 msedge.exe 87 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://poki.freegames1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x104,0x134,0x7ffc875546f8,0x7ffc87554708,0x7ffc875547182⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,17041997244155628048,79860767480560573,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,17041997244155628048,79860767480560573,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,17041997244155628048,79860767480560573,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3044 /prefetch:82⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17041997244155628048,79860767480560573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17041997244155628048,79860767480560573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17041997244155628048,79860767480560573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4040 /prefetch:12⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17041997244155628048,79860767480560573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2892 /prefetch:12⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,17041997244155628048,79860767480560573,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5768 /prefetch:82⤵PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,17041997244155628048,79860767480560573,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5768 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17041997244155628048,79860767480560573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17041997244155628048,79860767480560573,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17041997244155628048,79860767480560573,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6020 /prefetch:12⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17041997244155628048,79860767480560573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17041997244155628048,79860767480560573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17041997244155628048,79860767480560573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:12⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17041997244155628048,79860767480560573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17041997244155628048,79860767480560573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2240 /prefetch:12⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17041997244155628048,79860767480560573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:12⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17041997244155628048,79860767480560573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6472 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2076,17041997244155628048,79860767480560573,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6452 /prefetch:82⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,17041997244155628048,79860767480560573,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1888 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17041997244155628048,79860767480560573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1160 /prefetch:12⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17041997244155628048,79860767480560573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1292 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17041997244155628048,79860767480560573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6728 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17041997244155628048,79860767480560573,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3716 /prefetch:12⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2076,17041997244155628048,79860767480560573,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5624 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2076,17041997244155628048,79860767480560573,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6316 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2168
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1968
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3356
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵
- Drops file in Windows directory
PID:2452
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵
- System Location Discovery: System Language Discovery
PID:1256
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService1⤵PID:464
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5daebce121226e9240bf159744148db2b
SHA11734ce173466809c9190d370dabea1d8c145ecb5
SHA25685941cd73e4f7a05e14059a6d599eecd24fea54cf972ee66fd270bb690858949
SHA51275a3f910413edf6898574f8354a1df3f2d119026431df9a744906678b23bb1ffd2de462bf065488f656f2c234f8b48e1d738513dcf4d6d85a39993bba2256d37
-
Filesize
19KB
MD51bd4ae71ef8e69ad4b5ffd8dc7d2dcb5
SHA16dd8803e59949c985d6a9df2f26c833041a5178c
SHA256af18b3681e8e2a1e8dc34c2aa60530dc8d8a9258c4d562cbe20c898d5de98725
SHA512b3ff083b669aca75549396250e05344ba2f1c021468589f2bd6f1b977b7f11df00f958bbbd22f07708b5d30d0260f39d8de57e75382b3ab8e78a2c41ef428863
-
Filesize
62KB
MD5c813a1b87f1651d642cdcad5fca7a7d8
SHA10e6628997674a7dfbeb321b59a6e829d0c2f4478
SHA256df670e09f278fea1d0684afdcd0392a83d7041585ba5996f7b527974d7d98ec3
SHA512af0d024ba1faafbd6f950c67977ed126827180a47cea9758ee51a95d13436f753eb5a7aa12a9090048a70328f6e779634c612aebde89b06740ffd770751e1c5b
-
Filesize
67KB
MD5cc63ec5f8962041727f3a20d6a278329
SHA16cbeee84f8f648f6c2484e8934b189ba76eaeb81
SHA25689a4d1b2e007ac49fc9677d797266268cd031f99aa0766ca2450bff84ac227d1
SHA512107cf3499a6cf9cdcbfa3ef4c6b4f2cda2472be116f8efa51ff403c624e8001d254be52de7834b2a6ab9f4bcc1a3b19adc0bba8c496e505abbca371ef6c8f877
-
Filesize
63KB
MD5226541550a51911c375216f718493f65
SHA1f6e608468401f9384cabdef45ca19e2afacc84bd
SHA256caecff4179910ce0ff470f9fa9eb4349e8fb717fa1432cf19987450a4e1ef4a5
SHA5122947b309f15e0e321beb9506861883fde8391c6f6140178c7e6ee7750d6418266360c335477cae0b067a6a6d86935ec5f7acdfdacc9edffa8b04ec71be210516
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD550391d4129cefc9b0dcb35becedbdf56
SHA1e34c8efde0d883af7360029b8e2f90a65e882a2c
SHA25624243ecc9c287387e5e739d949e2df00348014f57c8cf95dce06993508bf043a
SHA512e62aca557e3e03d477f3dc820a87e019f6f2b1174f2c2461bd4ec0b84d01fb5bb7320d63a0ad9a6ae2741e2bc3fdbf9a3c68d8ac4e8b8a78aab4ff30ffda1639
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5c3a5691071b3382210491db43a6bf08c
SHA1e8249ece2ad485d7ab5d6679144a792da8b9a446
SHA256efb090150dd78eb15f5f930b4f1dfb0256ffbd43ea1f1fa6c33951c82eee2f32
SHA51246455a9ca1af76607a270469c3ce6d9fe9ab6d149471e461f75c6ced6b2bad4ff371efaa37d372a5f910b1379f98df56d00777ff84e8d00f0fb22c72059c0d4d
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
934B
MD5751b737f04f7b19515e49657c1485196
SHA18fd29218e38161bd49fd26591bb104f45c755285
SHA256e5f1199f6440a6933ec1bc65c6f9c190aaa580c80a287ebaa802f4f7f6f7a8f8
SHA512ee07695d1341fa7ee9c3cb0f271b8d9e441ea307c63c2dc441dfc84a18e8fecab43f8b45eb4fa06f3dd31fc0dc60def33963df0f9cc6393ff5b6cd9ff75026d7
-
Filesize
1KB
MD5a231f173d402aa557da0401de10e499a
SHA16884618a6dd2c76bd03de38925e80e6e41654f01
SHA256736dcca711165fca63cb572a421259fbe8fd6da0876fdaa1482c60e9c8ec0c5f
SHA5125d20a6ed563a5d5fa593fc485f3b1b995f57920139a4c796087a159a1e6246cc8d2ddf902249e26f69661ac7431ace5abe07054b67e8f6ec6040dbb7e9e5d8ca
-
Filesize
1KB
MD59cfad7d32be9c12452539f35943bfbbb
SHA1955d9000eba1445ec520cf0794b11fd95c5b01f8
SHA256216ccdfa4f2df5d7c08a5a08afbc28cc0a8bfe6f67d6b4508da1323a10936693
SHA512e9ba2be00a1f7e3abd792f616f5324f6f923737c69ea397edb82f5703ada24b4fb9caa0d600e2df869f631a6d0fb50cc581f383519f8dc0fa273f5fe94087fec
-
Filesize
1KB
MD56ca5a9da066f7bb116678ce80a10c134
SHA1d15c3c5ab6a47549e31b6530f5cf742bfdb84eec
SHA256fab99047a7a9b904a2b9e0650e06255baf0ac6da01fc4f0d21482f319376f608
SHA512f8e9534010a862e07224a332851874d2ae62a06631dcc04504346d62ca3c982d3f8adb327fb2d0ea41955b6067c9e8ec6608cc1b96c5a2710915ccafd827583b
-
Filesize
1KB
MD5fbc3ded0feb8b4e6f1efc4661b1c1e0f
SHA119a317f6d61b347d057ab2403ac7017b501ba321
SHA2567a802340f2e42cbb71947a7dc7cc01bca3221c9f3ef723d0d41e37432abae67d
SHA5125baa5baf1670295c8ca5d5861cd6d4c05e9ffb0dbfabe00b643d02e0c3c0dcd9db380a90c753c99a73d57a18c1bd065a12d2b1b3175eb1a5eda8ec330f591dbc
-
Filesize
5KB
MD50fb1073174efd009c45c010e22332752
SHA12c656e256538994a43d360f73c87a700fabfe52b
SHA25689fbecb277c127d78c22f27f2303079304b17d524da178fec5affca75d1a356a
SHA5129a7f67e56e02a5e79d377a4a5f2e05527060196bf7f5346ce03674c45d9ffeffef637297eee1bef4545addc3136dfb6c70250f962fce7c5fb45c3c50ab25a879
-
Filesize
6KB
MD5e346a8ae1c31afac9aa87acba10bfa5c
SHA1d88be164fe356bb10dbdd415bab38b7ee9186ea5
SHA256ece517f8bfe5ca8197c664fbaed691fa0ca1c743985db494fafc6d12f6757a6d
SHA512fd0083e62d1ca1bc5715389c2a8107fa58aecf23d11d3665fbea2a315804f94e5d96bd626e68e471b46df7317dbbae657ec8db3d757d81cd32af9069b50100cc
-
Filesize
5KB
MD5bbf0624f56af39eb91ec608e0fa21709
SHA18744df746f356a834c54c41f8dc0c57e06f2f9d8
SHA2567fd91057b673edf4c6cf2a34eb67ff38c14a9f9013a713897168b052083e1a79
SHA5125f27d492f6e53253fe128a0dcd604ae8fda750e4ed87300e0a1df773a508b4e8601a14133fd2e1d0bc9413d50e0c6ea02a160075821a7ce263ce8dba4c6601c1
-
Filesize
5KB
MD51d2e85703c8bcf1dc18a9c153cc47684
SHA1613ca55196c48d33230da46c3641092fc91b9d55
SHA256f0dbf8afe8b08b747dc0aeac9497a19b13449e7182240500a9a3a6277df291b8
SHA512e7dcfb20cb4410b0e1906046393649e45bac693fa23a48983663494d8ba04a2018511d785570f24d107df2e9d600023ad4b89cd111827b31a4c64b97135d659c
-
Filesize
6KB
MD5104d3ee3d641c4944dc8a9e402352835
SHA15eb6232326a111ac589a8899db43fbe871df503f
SHA25650b1734331770284ab66adf086823c60f7204276074a90cf8a2ec273064bb404
SHA51259300050113f8a17c2e3bd4caa77500e29e7e8b7a0768b0ad1cc880630c1fc9f2daaefc8e7459710845604c30284f779a0bb5b4a669de8887fbd80ba845bd2a0
-
Filesize
6KB
MD5545ea0022c3ad3a0e2b3c269705a951a
SHA174d9606399b69a11463087fd6bc84886b2d8afb2
SHA256e39debd6a5f7dd80b516775d79cfa650d0adde646877d8f4e32c62725585927e
SHA5127aaca93b36c888f4e345d496ea3c25fc1aba57c770d7ce3f6f71fe6d2905bf1ef47253eb765c4215ededf6aee39203d273ab865b1b7776822cc65caeef2f274b
-
Filesize
6KB
MD5a39646bafe56513b5b420e81ebd602d8
SHA13f05c02e529d0f728c77105a76bdb9dbdca90257
SHA256f12c7c5b274c2ec7e4211941ae776d3c6f31767fd985227e8c5c486a9cfc8e01
SHA512b5475e544158d4f7cbdeb127782c249617b52112349dd1073fbb9188c253c2e9f307705e6700e7ddc229d16031c6f87ee9baf570f367f1dfc601beff64276c2a
-
Filesize
6KB
MD598216b5de228fc70f59e4eccd35fc752
SHA1ab9c8b14e67d1e33f4df73a1bfd7a6017d2e984e
SHA2565c47ff2f0ff92bed8bc825f2f9aabaf95e3ffc275a4daeef30f4e97a98706aa0
SHA5125c102e10f9992c1cc007eedd18d85d37f66ef1cf01ee7d16b8f487257a6a53aca7b1a4c30cc2bfcd88ccffe5b3e54ea5709957349c82b30900dadcda76594eee
-
Filesize
24KB
MD5d36f9abdbed2b3feceb2a60bf77bed0e
SHA1334d7848650c2f4c489f0336c2d01d76f8ee6dec
SHA2561450d5f563e0e10e5aac3a09a23d73eb1ebdf1051882df82654d7a36a1b9866d
SHA512a8e7a977cb12117cbdb93061eaa26920d9b6fb193c89a93290caa2aa84953520237e6914ce85033537621bc9992de112dd825cb26e4013a3b650b5d6eff1e9cf
-
Filesize
1KB
MD55ccbe7f68a7add9468bc32e7ccc81d28
SHA11c999feb137d0a2cda706b5279602cb7689ed4b0
SHA256c64bd84c9ac21ed32a3054e6e462049b2db173d93bd750a3577eb79de56b9ef4
SHA51212789d654ebe7f2299f0471a4dbcd9b8f6d182d832db310ba850ece77fa9be3e76cedc20208b89a59bba4d55b1a3343c6f4ed4b27b1342cc318880b06c022afb
-
Filesize
1KB
MD5c2dfeefc6fa14be703002ec1a2e2a5db
SHA1e326ac314e378617e81b9227eb3395f5bc6e63b6
SHA2566f71a00836fa63a16d9a72b5f8d8a9a31bb7670e3716c7a346d2b6c68576ed4a
SHA51242fbc9a2bf1c8b0866a73c4770568ac505609db5ca0597b71098da95461650952e9ad02079251687e10ccf33d65fb8aef4b447558966817f3a8ef198ac5ffb17
-
Filesize
1KB
MD5d5d900a598daa8d934cc7b667b00ad1c
SHA14620f7861e0611b835f7d65c66983c48ac4f1651
SHA256c8af5d937e21d5151985862aa94759781cdfdb52e5ec8cd9d726920476c6b942
SHA5122e561e36368adf51563d776a6396ab2066b5f74047a5b256278bee8afed9e11aeee5d60132b6584aa45a8202abd8a8f45307bc067ccf9f7b378b5d30dd897f7c
-
Filesize
1KB
MD5381dd0a21e3bc9a20e6b705d559d9b6f
SHA13a6fa6871f47a081fb6bee170fce3ba04dd88725
SHA256150111b4050f064d53ce3ec74a6334e9de436bc2a09dd8ae9ea6f370206c1a68
SHA512e4f6525b1a26346240eb059dbba12f4619ce48bcddfe17c1382ee474394a27e356c8fd7e26c082f4269169adcb4b136a328799a61be3860542e683de9a8edcb5
-
Filesize
538B
MD55a82b187ead7a6ddaff24e3c03967337
SHA15e64727819d704676bfd3b189c9fbe3810e456cf
SHA256d2cb16e5df8fe2623115aec77ee8c1f3cbabf0738c63e1f972e409dc5cd51018
SHA5120503eabe9f356f88ffc784880df532a32955b4599577ed395b375bccc6a55b6d0c71a96ddcdc47a3e1343e637c515adf9d2cade4962e21db4391ba1c490f5fbd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD532e4eefe5bac360166d196afd6388c07
SHA1c86ef453a78f90501169a08179a3da0c33f49145
SHA2564440e0f21819005a50e331e9f403da10a1a26e4cde5cf9280fbd0c7ba5153814
SHA512718f0b1a953b3ea9bd022c97a87c8e2387826cd468f1b8226ee5c61bc602e7fcd2a2a9fd4bb8740031ec8cd51674c05f705cda9d09df92f22834924b557613f5
-
Filesize
10KB
MD50a3166cf031f3bae93301c62272ea106
SHA15190b5265dd297d29820feb2191b64c2e82b08e0
SHA256ef09c4d8ee2ca8dece656687b7a577eb683b9b29702cb41fd76ef7be21a1cf67
SHA51281d428187cb66d31acd0b863e3d4996543d2add7a1cd2d58c8b1d1fee27c065933d318c469602668484f354f09ce8fa14878f464789d5518738dbd02f4676929
-
Filesize
11KB
MD56c6e69bdd896f4e81dbdd221ad5ad882
SHA1791ebb0541f73970703361c84cff4cfff61f7651
SHA2569325db691659bc9472a677fd43ae13882fde17330f9dfc2ffee1339b074fa34a
SHA512df72c589155fef027ab3bb440f17da4d4a71007ac63d3d9ffb5d5c2f46a1f0eb61f30dcd436d1680a9770c3fb2dce0055200025618145451b4813516217f3423
-
Filesize
11KB
MD51e49701c8b59c8ddb914e0243f157029
SHA11f63c6c2852f5393704deb66cc86752f56a5596a
SHA2566ec45884d28e86459a7f299d8fbd61883541c37a698182067c7f24b27d749be9
SHA5126ab607a88bab0e8493e7a2506d00ef76e9f07bb64c5b1ece617cdbade82a70586703a4741c47b6a656446a3ffd496da3c8fbd1db9aa517e38e0c65df1c87e1d9
-
Filesize
12.1MB
MD5c8bf514a334eaa148cb3c6135c2fb394
SHA10e47a89c3729db5a6f195c6abb04e5129d788df8
SHA2569127560918eaefe69f1959bcb7f7e13b7e3a7ac156b564922829faaec9b96f67
SHA5129879a258f429ef492cf495dbddd4f2b9c9fbc061e325aa8ad870ed05049b7ad595b26d223d20c55fc99f403fc9b5d0235353d71bf5d9a39ee4462838feb247ff