Analysis
-
max time kernel
35s -
max time network
33s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
28/03/2025, 11:03
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://url.uk.m.mimecastprotect.com/s/mVK8CnzzmumyJGYINirUJaBXH?domain=culturalintelligence.acemlnc.com
Resource
win10ltsc2021-20250314-en
General
-
Target
https://url.uk.m.mimecastprotect.com/s/mVK8CnzzmumyJGYINirUJaBXH?domain=culturalintelligence.acemlnc.com
Malware Config
Signatures
-
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\SystemTemp\msedge_url_fetcher_3328_1601558085\GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_90_1_0.crx msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\ja\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\fr_CA\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\en_US\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\sv\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\hi\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\dasherSettingSchema.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\my\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\nl\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\ta\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\pa\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\hy\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\sk\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\sr\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\lo\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\kn\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\ca\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\ur\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\ko\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\offscreendocument_main.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\page_embed_script.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\hr\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\no\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\ka\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\en\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\es\messages.json msedge.exe File opened for modification C:\Windows\SystemTemp msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\es_419\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\te\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\cs\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\da\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\zh_HK\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\mn\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\sw\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\mr\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\km\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\ro\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\fr\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\af\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\si\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\ms\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\fa\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\en_CA\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\el\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\ne\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\sl\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\ml\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\fi\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\ru\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\bn\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\pt_BR\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\eu\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\vi\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\iw\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\gl\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\be\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\en_GB\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\gu\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\am\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\th\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\service_worker_bin_prod.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\et\messages.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3328_448528826\_locales\cy\messages.json msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133876334272877850" msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1709934376-1871646940-4254144759-1000\{DCD085CC-2BE9-4B24-8108-B178C8A1B18D} msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4816 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4816 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3328 wrote to memory of 3864 3328 msedge.exe 82 PID 3328 wrote to memory of 3864 3328 msedge.exe 82 PID 3328 wrote to memory of 5564 3328 msedge.exe 83 PID 3328 wrote to memory of 5564 3328 msedge.exe 83 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 5864 3328 msedge.exe 84 PID 3328 wrote to memory of 4208 3328 msedge.exe 85 PID 3328 wrote to memory of 4208 3328 msedge.exe 85 PID 3328 wrote to memory of 4208 3328 msedge.exe 85 PID 3328 wrote to memory of 4208 3328 msedge.exe 85 PID 3328 wrote to memory of 4208 3328 msedge.exe 85 PID 3328 wrote to memory of 4208 3328 msedge.exe 85 PID 3328 wrote to memory of 4208 3328 msedge.exe 85 PID 3328 wrote to memory of 4208 3328 msedge.exe 85 PID 3328 wrote to memory of 4208 3328 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://url.uk.m.mimecastprotect.com/s/mVK8CnzzmumyJGYINirUJaBXH?domain=culturalintelligence.acemlnc.com1⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x264,0x268,0x26c,0x260,0x288,0x7ffe0565f208,0x7ffe0565f214,0x7ffe0565f2202⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1808,i,12048332724274713266,3171450076853752605,262144 --variations-seed-version --mojo-platform-channel-handle=2276 /prefetch:32⤵PID:5564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2236,i,12048332724274713266,3171450076853752605,262144 --variations-seed-version --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:5864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2600,i,12048332724274713266,3171450076853752605,262144 --variations-seed-version --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3500,i,12048332724274713266,3171450076853752605,262144 --variations-seed-version --mojo-platform-channel-handle=3536 /prefetch:12⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3516,i,12048332724274713266,3171450076853752605,262144 --variations-seed-version --mojo-platform-channel-handle=3540 /prefetch:12⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5036,i,12048332724274713266,3171450076853752605,262144 --variations-seed-version --mojo-platform-channel-handle=5092 /prefetch:82⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5068,i,12048332724274713266,3171450076853752605,262144 --variations-seed-version --mojo-platform-channel-handle=5100 /prefetch:82⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5668,i,12048332724274713266,3171450076853752605,262144 --variations-seed-version --mojo-platform-channel-handle=5692 /prefetch:82⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5668,i,12048332724274713266,3171450076853752605,262144 --variations-seed-version --mojo-platform-channel-handle=5692 /prefetch:82⤵PID:5784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5776,i,12048332724274713266,3171450076853752605,262144 --variations-seed-version --mojo-platform-channel-handle=5784 /prefetch:82⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6244,i,12048332724274713266,3171450076853752605,262144 --variations-seed-version --mojo-platform-channel-handle=5996 /prefetch:82⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5572,i,12048332724274713266,3171450076853752605,262144 --variations-seed-version --mojo-platform-channel-handle=6240 /prefetch:82⤵PID:5688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --always-read-main-dll --field-trial-handle=5708,i,12048332724274713266,3171450076853752605,262144 --variations-seed-version --mojo-platform-channel-handle=6308 /prefetch:12⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --always-read-main-dll --field-trial-handle=6292,i,12048332724274713266,3171450076853752605,262144 --variations-seed-version --mojo-platform-channel-handle=6276 /prefetch:12⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --always-read-main-dll --field-trial-handle=3544,i,12048332724274713266,3171450076853752605,262144 --variations-seed-version --mojo-platform-channel-handle=3748 /prefetch:12⤵PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6488,i,12048332724274713266,3171450076853752605,262144 --variations-seed-version --mojo-platform-channel-handle=6456 /prefetch:82⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6664,i,12048332724274713266,3171450076853752605,262144 --variations-seed-version --mojo-platform-channel-handle=6644 /prefetch:82⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6652,i,12048332724274713266,3171450076853752605,262144 --variations-seed-version --mojo-platform-channel-handle=6712 /prefetch:82⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6656,i,12048332724274713266,3171450076853752605,262144 --variations-seed-version --mojo-platform-channel-handle=6744 /prefetch:82⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4288
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:1544
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:2828
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x308 0x3241⤵
- Suspicious use of AdjustPrivilegeToken
PID:4816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD5a7537931e1af5340f125d6c9a59b043e
SHA14f331e4af4a74ac232905bce9464665a0976545a
SHA2562b657fd65c9331a37e3b44f1a6ed1259d7a6137586ed1807ec8f748268764e41
SHA5121b06341297d01c8cef10e4a6ec5bf3a859363416625fe4dfcb24bd4e454a2300bbca758489a47ec10f1182154f4f927d67e9347a7b077882508224a7f0d8090e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\636bdc78-4cd6-4016-aeea-ae671af8b203.tmp
Filesize15KB
MD572cebe01d133b26252c995c725cf7803
SHA1763e191031496e71473ff49ec8aae084c7c9b348
SHA256b3c900734e016dc0237a6eed85b2a7272b62eb3a5e5d31c2b91584424415dcc7
SHA51228a49ea80b82e1d0de40f5a876424b90e60b40494062793fa0b814ee587dd67ae89f4ea46ce7a405b0553ed0dd0c64bfae6157ac3e3c76d7cf20fb9f6b486e62
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
17KB
MD5af78c13727bf221b87f7a8fb84923a2b
SHA1865639c71b41fb2e573fc5d9290f48b6543e6492
SHA2565fdf2bec0ed8222c7f63f438bc012b12db97f6c9ea3f7be31b9294c4347b696b
SHA512e55c5ef33cc7c4e0fc345f4cc6af6717608b0bf40e466f05b4be1041068f7afb2b315c266f3416b836a891fea8be033fabfdf8404a4ddc328353183600e1181e
-
Filesize
36KB
MD5bf1771a62a71bb4cffbf6582a6298aa9
SHA1a0d89fbd7cc3c929a1cb6a65ac66522307af393a
SHA2567854f7bf3b41618e539d79279dca523cf2755c774c988683dbd00716dcc155eb
SHA5124ecc34bfd3f94174b26c535c20d01a967e346979a636bcf3e0983a424839c18c13c078335c06da5ffb1973c36d12de8447c4cae8dcacdd9bc95f50283081798a
-
Filesize
22KB
MD53ed7da5807341f224340a3539741de73
SHA1122f8cb6b31cb3f0e8972a779c94d2017ae3655c
SHA256141ff04055f63602531a784fa4b28c847cbd4fc37a59c9abbef2d439224b02d1
SHA5122f2a2b0431e957abf380cb38bfb7566564696f04e70ea1fedf1788109fe2333d73efdb2d274600cf78f0e7be0d68bd003d75b7a3172e15baca6dd0a949709383
-
Filesize
40KB
MD5720da258f1aa23f0a146cc4b264dedfe
SHA133a112e05f5dca652a2bd27e272cb5fbfae62017
SHA256a21e19c5dcb48abec1421833c3b82729f708ae37a093418daa05b3b38c5e7880
SHA5120e9c201340319eb71ab60d2e72559b602c2c2b031e868b55e2d887dc6289b8dc68c4924ab8e76310ff38d6248ad6ff132ac42961621e36088bbccf2c5f74d17a
-
Filesize
40KB
MD53137bf0432d30d123058157c0705b48b
SHA1979eec6b8b28f7ee3b581bf2cd468386319974b8
SHA256644871534d9902199f9b43a5e2172eec6cfda46ba7b2680daa00725cded76938
SHA512d71556596c54689e198d4bc41c78657c7fa65ab018c5bb81bcf7cd6d1ca8d7708952b964bb3f99c4b37c9e95427579ae584d5c3b2a4fec6f73338b34d02c02f3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5241c009cafffb01d76c554d149bfbb5f
SHA178d83a76c930c4313ae314c95ab1b2c433c18d29
SHA2565b91650cfd5b34a2b79a8521bb993a1c5c7b66d5e6ea7c9f21d683fcb6ca99d7
SHA512d7b27b229cf41328393b7ead82f6cdb0e14d83ad98fcd0b19a532ef5af4370b71ae10c1e92e7c258375bfae3c421aa33981e414c68130dd972a5cf19229e4ea5