Overview
overview
9Static
static
7Meta Unban...er.exe
windows7-x64
9Meta Unban...er.exe
windows10-2004-x64
9Meta Unban...EL.exe
windows7-x64
9Meta Unban...EL.exe
windows10-2004-x64
9Meta Unban...er.exe
windows7-x64
9Meta Unban...er.exe
windows10-2004-x64
9Meta Unban...er.exe
windows7-x64
8Meta Unban...er.exe
windows10-2004-x64
8Meta Unban...er.exe
windows7-x64
9Meta Unban...er.exe
windows10-2004-x64
9Meta Unban...er.bat
windows7-x64
8Meta Unban...er.bat
windows10-2004-x64
8Meta Unban...er.bat
windows7-x64
1Meta Unban...er.bat
windows10-2004-x64
1Meta Unban...er.exe
windows7-x64
7Meta Unban...er.exe
windows10-2004-x64
7Meta Unban...ol.bat
windows7-x64
8Meta Unban...ol.bat
windows10-2004-x64
8Meta Unban...an.exe
windows7-x64
1Meta Unban...an.exe
windows10-2004-x64
1Analysis
-
max time kernel
30s -
max time network
39s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-03-2023 04:50
Behavioral task
behavioral1
Sample
Meta Unban/Cleaners/AppleCleaner.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Meta Unban/Cleaners/AppleCleaner.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Meta Unban/Cleaners/AppleS5-DEL.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
Meta Unban/Cleaners/AppleS5-DEL.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
Meta Unban/Cleaners/BadwareCleaner.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
Meta Unban/Cleaners/BadwareCleaner.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
Meta Unban/Cleaners/BadwareDeepCleaner.exe
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
Meta Unban/Cleaners/BadwareDeepCleaner.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
Meta Unban/Cleaners/EventCleaner.exe
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
Meta Unban/Cleaners/EventCleaner.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral11
Sample
Meta Unban/Cleaners/Fivem-Cleaner.bat
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
Meta Unban/Cleaners/Fivem-Cleaner.bat
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
Meta Unban/Cleaners/FortniteCleaner.bat
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
Meta Unban/Cleaners/FortniteCleaner.bat
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
Meta Unban/Cleaners/NXTcleaner.exe
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
Meta Unban/Cleaners/NXTcleaner.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
Meta Unban/Cleaners/full deep cleaner by nigga mhatt lol.bat
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
Meta Unban/Cleaners/full deep cleaner by nigga mhatt lol.bat
Resource
win10v2004-20230221-en
Behavioral task
behavioral19
Sample
Meta Unban/Meta Unban.exe
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
Meta Unban/Meta Unban.exe
Resource
win10v2004-20230220-en
General
-
Target
Meta Unban/Cleaners/AppleCleaner.exe
-
Size
3.6MB
-
MD5
da2176757b2fead6539243b42057cb3c
-
SHA1
e14195bd4066e90c821caabd6ca63a173c1ca802
-
SHA256
1a62ed192ff4a7bd746fa24c8d7cd96578a4c7e9f0d4a6651a2a3d0baff9c433
-
SHA512
b9d13ecd8679064bc4cd9dbd823ba5367aebe13177c9ed5e6c6c40d70823ed32977bd40cde73ccfaa49f6f32b19b4f06f9396beb145bd774891d4290873c735d
-
SSDEEP
98304:gmQu0iNucsADierKQYRc4sNHOZjKg5tkdv+HR5+a:fQabDieOQ944HOZjp5tkx+x3
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
AppleCleaner.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ AppleCleaner.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
AppleCleaner.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion AppleCleaner.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion AppleCleaner.exe -
Processes:
resource yara_rule behavioral2/memory/4448-133-0x00007FF7025D0000-0x00007FF702F73000-memory.dmp themida behavioral2/memory/4448-134-0x00007FF7025D0000-0x00007FF702F73000-memory.dmp themida behavioral2/memory/4448-135-0x00007FF7025D0000-0x00007FF702F73000-memory.dmp themida behavioral2/memory/4448-136-0x00007FF7025D0000-0x00007FF702F73000-memory.dmp themida behavioral2/memory/4448-137-0x00007FF7025D0000-0x00007FF702F73000-memory.dmp themida behavioral2/memory/4448-177-0x00007FF7025D0000-0x00007FF702F73000-memory.dmp themida -
Processes:
AppleCleaner.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AppleCleaner.exe -
Checks system information in the registry 2 TTPs 2 IoCs
System information is often read in order to detect sandboxing environments.
Processes:
AppleCleaner.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer AppleCleaner.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer = "DADY" AppleCleaner.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
AppleCleaner.exepid process 4448 AppleCleaner.exe -
Drops file in Program Files directory 2 IoCs
Processes:
setup.exedescription ioc process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\921cf833-7a2a-493c-95f3-4de1a8257b55.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20230322055124.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 22 IoCs
Processes:
AppleCleaner.exemsedge.exedescription ioc process Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral AppleCleaner.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS AppleCleaner.exe Set value (str) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer AppleCleaner.exe Set value (str) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU AppleCleaner.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Set value (str) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0\Identifier = "4bdcfe70-ba43272f-5" AppleCleaner.exe Set value (str) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0\Identifier = "e5c4cfab-805cb83d-3" AppleCleaner.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer AppleCleaner.exe Set value (str) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardVersion AppleCleaner.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer AppleCleaner.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU AppleCleaner.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral AppleCleaner.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0 AppleCleaner.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0\Identifier AppleCleaner.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardVersion AppleCleaner.exe Set value (str) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion = "pc-q35-1.N" AppleCleaner.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemBiosVersion AppleCleaner.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral AppleCleaner.exe Set value (str) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer = "DADY" AppleCleaner.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion AppleCleaner.exe -
Kills process with taskkill 3 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exepid process 4796 taskkill.exe 4296 taskkill.exe 4108 taskkill.exe -
Processes:
AppleCleaner.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Migration\IE Installed Date = e346486c752cff52 AppleCleaner.exe -
Modifies registry class 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exepid process 4464 msedge.exe 4464 msedge.exe 2004 msedge.exe 2004 msedge.exe 5180 identity_helper.exe 5180 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
Processes:
msedge.exepid process 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 4796 taskkill.exe Token: SeDebugPrivilege 4296 taskkill.exe Token: SeDebugPrivilege 4108 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
msedge.exepid process 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AppleCleaner.execmd.execmd.execmd.execmd.exemsedge.exedescription pid process target process PID 4448 wrote to memory of 496 4448 AppleCleaner.exe cmd.exe PID 4448 wrote to memory of 496 4448 AppleCleaner.exe cmd.exe PID 496 wrote to memory of 4796 496 cmd.exe taskkill.exe PID 496 wrote to memory of 4796 496 cmd.exe taskkill.exe PID 4448 wrote to memory of 3320 4448 AppleCleaner.exe cmd.exe PID 4448 wrote to memory of 3320 4448 AppleCleaner.exe cmd.exe PID 3320 wrote to memory of 4296 3320 cmd.exe taskkill.exe PID 3320 wrote to memory of 4296 3320 cmd.exe taskkill.exe PID 4448 wrote to memory of 1840 4448 AppleCleaner.exe cmd.exe PID 4448 wrote to memory of 1840 4448 AppleCleaner.exe cmd.exe PID 1840 wrote to memory of 4108 1840 cmd.exe taskkill.exe PID 1840 wrote to memory of 4108 1840 cmd.exe taskkill.exe PID 4448 wrote to memory of 1168 4448 AppleCleaner.exe cmd.exe PID 4448 wrote to memory of 1168 4448 AppleCleaner.exe cmd.exe PID 1168 wrote to memory of 2004 1168 cmd.exe msedge.exe PID 1168 wrote to memory of 2004 1168 cmd.exe msedge.exe PID 2004 wrote to memory of 4100 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4100 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4904 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4464 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 4464 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 3908 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 3908 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 3908 2004 msedge.exe msedge.exe PID 2004 wrote to memory of 3908 2004 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Meta Unban\Cleaners\AppleCleaner.exe"C:\Users\Admin\AppData\Local\Temp\Meta Unban\Cleaners\AppleCleaner.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Checks system information in the registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im EpicGamesLauncher.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /f /im EpicGamesLauncher.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im FortniteClient-Win64-Shipping.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteClient-Win64-Shipping.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Battle.net.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /f /im Battle.net.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start https://applecheats.cc2⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://applecheats.cc/3⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff94ce46f8,0x7fff94ce4708,0x7fff94ce47184⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1508,1915586823356429551,13822578519590175440,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:24⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1508,1915586823356429551,13822578519590175440,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2464 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1508,1915586823356429551,13822578519590175440,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:84⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1508,1915586823356429551,13822578519590175440,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3716 /prefetch:14⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1508,1915586823356429551,13822578519590175440,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3676 /prefetch:14⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1508,1915586823356429551,13822578519590175440,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4216 /prefetch:14⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1508,1915586823356429551,13822578519590175440,131072 --disable-gpu-compositing --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4404 /prefetch:14⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1508,1915586823356429551,13822578519590175440,131072 --disable-gpu-compositing --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:14⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1508,1915586823356429551,13822578519590175440,131072 --disable-gpu-compositing --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:14⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1508,1915586823356429551,13822578519590175440,131072 --disable-gpu-compositing --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:14⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1508,1915586823356429551,13822578519590175440,131072 --disable-gpu-compositing --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:14⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1508,1915586823356429551,13822578519590175440,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:14⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1508,1915586823356429551,13822578519590175440,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6620 /prefetch:14⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1508,1915586823356429551,13822578519590175440,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6596 /prefetch:14⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1508,1915586823356429551,13822578519590175440,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7008 /prefetch:84⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings4⤵
- Drops file in Program Files directory
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff7f0f55460,0x7ff7f0f55470,0x7ff7f0f554805⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1508,1915586823356429551,13822578519590175440,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7008 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1508,1915586823356429551,13822578519590175440,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7116 /prefetch:14⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1508,1915586823356429551,13822578519590175440,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7072 /prefetch:14⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1508,1915586823356429551,13822578519590175440,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7012 /prefetch:14⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5cd4f5fe0fc0ab6b6df866b9bfb9dd762
SHA1a6aaed363cd5a7b6910e9b3296c0093b0ac94759
SHA2563b803b53dbd3d592848fc66e5715f39f6bc02cbc95fb2452cd5822d98c6b8f81
SHA5127072630ec28cf6a8d5b072555234b5150c1e952138e5cdc29435a6242fda4b4217b81fb57acae927d2b908fa06f36414cb3fab35110d63107141263e3bba9676
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD51d40312629d09d2420e992fdb8a78c1c
SHA1903950d5ba9d64ec21c9f51264272ca8dfae9540
SHA2561e7c6aa575c3ec46cd1fdf6df51063113d277012ed28f5f6b37aea95cd3a64ac
SHA512a7073247ae95e451ed32ceeae91c6638192c15eaad718875c1272eff51c0564016d9f84690543f27df509a7d579de329d101fbf82fed7cbeb27af57393de24ac
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.icoFilesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Microsoft Edge.lnkFilesize
2KB
MD51154679f9836bd825c5bf016fb61a0be
SHA1f7ddc911a2d46dddb022d008751bf19cdbe7254b
SHA25676cd6ca631ba4775214f98b927cc61689fe66225e4dc629f5451d321a1c68355
SHA512985db460b39a10dca5711f3b85d74473eacc2c16d954c1364b3c4c70a716c561a2b9f7649050234a3a3f4bce807e0c934ba5c3f193183d8b555a2ece9c5b4c50
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD5865337161210954cecf8efe0ef66030f
SHA101a17302069462ab0c5dce0bf456d9543d5f76e0
SHA25602c117b7cd4082e084044f493a5d91ec533c908cc8f1f9c02181fdcbe95c5d15
SHA512a9f59bd09b9e88479e26dc2bac4c074226e421eb9b8ae389cac2a68aaf7f675b773606c769862df79e65cc0bcaa970fea44e6219e579c51d85adb76cd843eac5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
4KB
MD565a63b60c3251fcf885751f1d3da9b1d
SHA17b2c06db06def44ecebdcf437e8f85a4dc550959
SHA256e30628f7fa2dfb35119c6446d8c3da074ba70381285cb85b51ef1dc55bfdcfd0
SHA51208e34a8d6330914d73c491f828c08b85723a96da7981334802df70dfee79962e23342342cb808c23f1d9d6d409881a84f49422c851a1d8cf2ecc97abacff823d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure PreferencesFilesize
24KB
MD505615df933dd6b87269cfe322e0d7c8d
SHA172546f2487946c3e35463e29a2968b651512e599
SHA2561ed82a8965d9fdf7a9bd290afc4cb3cc0c68d75715ad6c2239fe382952745015
SHA512567d84707dd70c617318dc3aa0bea3108b1373fd60e7187c3e82d0ffb604e8d0e61b649af82a3a62f80bde6d8bd8f1bce47837f1fe47cf9531ca41a7dc8be032
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_2Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_3Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\MANIFEST-000001Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
10KB
MD5ad59f6de310cfc732c85f18667e8becf
SHA108256977d8543d6205696c1142ff479fdb60e712
SHA2568a9c3e6435d11a3d2518333633de78acbc6f10d4428c35c4a04a0ac6cde34a4e
SHA512e32ef2e8ee561ae64f4893f13eeb1897016eab1d0e657cd4f9e0dd88dd33876e360d4b6fdce793445915d54c9906b803d46ddb81ff36ccd216f538fd3fef6911
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
12KB
MD5aeb0695926d6868d8629e9b81f6d76d7
SHA15ad541f068973863c2b2129d52f95e17ab0666ae
SHA256ca451107e7032da76b15a8d7b42b0b015b3ac8edce826cbeeaeabf2cd017506e
SHA51299257b3898dfdadbd35baa3070b6e3b1d811f0b9e73b09b790dc421aae513361eb2d3277ca6e22b0b28b62cfa0350f7da8ba8b142cb18e1d363867187026adaf
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-msFilesize
3KB
MD52da3dc9d4670ecce19685f9ae771ab89
SHA17fb3b0922761dfc31dbc5d2a518f394c9bc73b52
SHA25673857608b2a525e7c62a4317fd854e179e25dd897ff5fe1440395d789fc7c094
SHA51250ab139bf4b80cab4d351d1541616e1e113b4a524a19d2e4a7cdba21d3cf9ec8c8c38cee79777fb141507edad3b04d9d5ae02430f342b889ce0ea480a3c55b08
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-msFilesize
3KB
MD554dcebea1f3c25fed2fdf6d3e85b1555
SHA1e5d3393e90ceae94b9b3d77c0745e789f1ade1ea
SHA25626c6e7c3f826e176c834c5aaa6cbe0b68df857c73e12eeb8b0dd858b25d9ddec
SHA5123289952d3adb3e777c5091a5807421aaff780a5ecb7769a532e03204c739d277b48403dfb2a48997d0c2ca5bfcf2deb7e3203372245e3d98e973ffa0ded939e3
-
\??\pipe\LOCAL\crashpad_2004_QQYAWDOWKFXUXHFQMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/4448-177-0x00007FF7025D0000-0x00007FF702F73000-memory.dmpFilesize
9.6MB
-
memory/4448-133-0x00007FF7025D0000-0x00007FF702F73000-memory.dmpFilesize
9.6MB
-
memory/4448-137-0x00007FF7025D0000-0x00007FF702F73000-memory.dmpFilesize
9.6MB
-
memory/4448-136-0x00007FF7025D0000-0x00007FF702F73000-memory.dmpFilesize
9.6MB
-
memory/4448-135-0x00007FF7025D0000-0x00007FF702F73000-memory.dmpFilesize
9.6MB
-
memory/4448-134-0x00007FF7025D0000-0x00007FF702F73000-memory.dmpFilesize
9.6MB