Resubmissions
26/03/2025, 13:56
250326-q8qmxsxr18 625/03/2025, 16:34
250325-t3db7asnz6 425/03/2025, 16:12
250325-tnkgyssmv2 7Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows11-21h2_x64 -
resource
win11-20250314-en -
resource tags
arch:x64arch:x86image:win11-20250314-enlocale:en-usos:windows11-21h2-x64system -
submitted
25/03/2025, 16:34
Static task
static1
Behavioral task
behavioral1
Sample
FirstLogonAnim.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
FirstLogonAnim.html
Resource
win11-20250314-en
Behavioral task
behavioral3
Sample
FirstLogonAnim.html
Resource
macos-20241101-en
Behavioral task
behavioral4
Sample
FirstLogonAnim.html
Resource
ubuntu2404-amd64-20250307-en
General
-
Target
FirstLogonAnim.html
-
Size
101KB
-
MD5
d563f7a009fb7ac826c88dfd5cfe55d9
-
SHA1
92e3a38de7c6fae27bfb08f40c9d28780407c26f
-
SHA256
600d6151fe47eb99535638c7fed1183996d94ef603e0f8469383e058a3ed3f9f
-
SHA512
adf9f99b8419d4e1bf42be7a6128066df53d23359c319fe6ab3137811338778abaa2cb09d5411977edb9340491cc7a70a9c291fb2a2f6f8f2fb5270753903909
-
SSDEEP
768:5fDDI+fh378/tZ5vAiwf/ysFIVusFIVFDVgLRDVy18mCgLkm3y1km3gLRm3y1eDK:5bDIvwWxSAVUrhia
Malware Config
Signatures
-
Drops file in Windows directory 17 IoCs
description ioc Process File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5520_2055135524\LICENSE msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5520_2055135524\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5520_646290382\LICENSE msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5520_646290382\_metadata\verified_contents.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5520_2055135524\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5520_2055135524\_metadata\verified_contents.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5520_646290382\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5520_1707225116\data.txt msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5520_1707225116\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5520_1707225116\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5520_1251045366\typosquatting_list.pb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5520_1251045366\manifest.fingerprint msedge.exe File opened for modification C:\Windows\SystemTemp msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5520_2055135524\sets.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5520_646290382\keys.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5520_646290382\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping5520_1251045366\manifest.json msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133873940957320390" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3920535620-1286624088-2946613906-1000\{F5D9F806-C6CC-4A3A-8A26-7871956B3A85} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 656 msedge.exe 656 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5520 wrote to memory of 5372 5520 msedge.exe 78 PID 5520 wrote to memory of 5372 5520 msedge.exe 78 PID 5520 wrote to memory of 420 5520 msedge.exe 79 PID 5520 wrote to memory of 420 5520 msedge.exe 79 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 1580 5520 msedge.exe 80 PID 5520 wrote to memory of 5376 5520 msedge.exe 81 PID 5520 wrote to memory of 5376 5520 msedge.exe 81 PID 5520 wrote to memory of 5376 5520 msedge.exe 81 PID 5520 wrote to memory of 5376 5520 msedge.exe 81 PID 5520 wrote to memory of 5376 5520 msedge.exe 81 PID 5520 wrote to memory of 5376 5520 msedge.exe 81 PID 5520 wrote to memory of 5376 5520 msedge.exe 81 PID 5520 wrote to memory of 5376 5520 msedge.exe 81 PID 5520 wrote to memory of 5376 5520 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\FirstLogonAnim.html1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5520 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x240,0x244,0x248,0x23c,0x268,0x7ffa98d4f208,0x7ffa98d4f214,0x7ffa98d4f2202⤵PID:5372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1860,i,12793568787865485763,17284027160754524165,262144 --variations-seed-version --mojo-platform-channel-handle=2168 /prefetch:112⤵PID:420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2104,i,12793568787865485763,17284027160754524165,262144 --variations-seed-version --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=1888,i,12793568787865485763,17284027160754524165,262144 --variations-seed-version --mojo-platform-channel-handle=2660 /prefetch:132⤵PID:5376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3404,i,12793568787865485763,17284027160754524165,262144 --variations-seed-version --mojo-platform-channel-handle=3452 /prefetch:12⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3432,i,12793568787865485763,17284027160754524165,262144 --variations-seed-version --mojo-platform-channel-handle=3472 /prefetch:12⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4688,i,12793568787865485763,17284027160754524165,262144 --variations-seed-version --mojo-platform-channel-handle=4920 /prefetch:142⤵PID:564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4676,i,12793568787865485763,17284027160754524165,262144 --variations-seed-version --mojo-platform-channel-handle=4888 /prefetch:142⤵PID:6040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5404,i,12793568787865485763,17284027160754524165,262144 --variations-seed-version --mojo-platform-channel-handle=5416 /prefetch:142⤵PID:5916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5448,i,12793568787865485763,17284027160754524165,262144 --variations-seed-version --mojo-platform-channel-handle=5776 /prefetch:142⤵PID:1252
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\cookie_exporter.execookie_exporter.exe --cookie-json=11323⤵PID:5272
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5488,i,12793568787865485763,17284027160754524165,262144 --variations-seed-version --mojo-platform-channel-handle=5452 /prefetch:142⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5488,i,12793568787865485763,17284027160754524165,262144 --variations-seed-version --mojo-platform-channel-handle=5452 /prefetch:142⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6060,i,12793568787865485763,17284027160754524165,262144 --variations-seed-version --mojo-platform-channel-handle=6036 /prefetch:142⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6096,i,12793568787865485763,17284027160754524165,262144 --variations-seed-version --mojo-platform-channel-handle=568 /prefetch:142⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6056,i,12793568787865485763,17284027160754524165,262144 --variations-seed-version --mojo-platform-channel-handle=6104 /prefetch:142⤵PID:992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5072,i,12793568787865485763,17284027160754524165,262144 --variations-seed-version --mojo-platform-channel-handle=4940 /prefetch:142⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5128,i,12793568787865485763,17284027160754524165,262144 --variations-seed-version --mojo-platform-channel-handle=4220 /prefetch:142⤵PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6152,i,12793568787865485763,17284027160754524165,262144 --variations-seed-version --mojo-platform-channel-handle=5796 /prefetch:142⤵PID:6060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6124,i,12793568787865485763,17284027160754524165,262144 --variations-seed-version --mojo-platform-channel-handle=5804 /prefetch:142⤵PID:276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=6120,i,12793568787865485763,17284027160754524165,262144 --variations-seed-version --mojo-platform-channel-handle=6164 /prefetch:102⤵
- Suspicious behavior: EnumeratesProcesses
PID:656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5308,i,12793568787865485763,17284027160754524165,262144 --variations-seed-version --mojo-platform-channel-handle=3736 /prefetch:142⤵PID:5976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD5509e630f2aea0919b6158790ecedff06
SHA1ba9a6adff6f624a938f6ac99ece90fdeadcb47e7
SHA256067308f8a68703d3069336cb4231478addc400f1b5cbb95a5948e87d9dc4f78b
SHA5121cb2680d3b8ddef287547c26f32be407feae3346a8664288de38fe6157fb4aeceb72f780fd21522417298e1639b721b96846d381da34a5eb1f3695e8e6ef7264
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\a1ca8214-e3d9-469b-80e2-8157bd05a413.tmp
Filesize1KB
MD58b66ee8ab700d910531c30472e86c1af
SHA183c4bd4a195da233338634bf282030c296f68eb7
SHA2565fe19f7138066447f2b88710f5790adc48b21c8564f86a01d93862d0cab4b425
SHA512440b9ba314e2fecca98f3ad1b9f57017474361779502664b2a74f10bc3e4c12df75b00c31f84693e2e96363a0449a7792da7976979eab0d48f55a5ff3b0b83e8
-
Filesize
16KB
MD5f373a2550c69c654b0ae57214eb36fff
SHA14f920b65e3a40b5bbc91b2e9f0b653215e37febb
SHA2567e1a57f446a3ab1b59a765ecac906ab5c66688c4200d762ff61667be84b6769e
SHA5120709099da4db7c91419d3e123bb689d3a6f5de938f0cfad34ff405f6ebaec3455b50bbe774109516640518737e2ce536259a614f7d390e163df7f2bb79c3ab88
-
Filesize
16KB
MD53f809939099d7845d258f8026ca04af9
SHA1454f673f4d5b1e9770e8d22081b0beba249ac971
SHA256b4fb0d4208ef24c28ade2432a402b670c8b34a50dc923122d626880fe8f45ecb
SHA512659a73ead5ccd4c11bf4d5ae3cfaef3739848549e1092589448738d6ec918ab86a0e315234ab01a22990b98946baa80c99c5eaa7850d75e322e20f951cf2bafb
-
Filesize
37KB
MD51d71249154f6738126e8ae9bcbc52b1e
SHA1c74a5fa0a2ad7e7040cd7826644cf754143c3c0c
SHA25620d95fbd67172aff9820a9e4e361d79b6e70896ba4aaa13a776f0becd9ed6120
SHA51236d2149d8341779acf726e85d2b9eafa024cdbf083ae8113d4961344629db69cf6113c25cd53344eaf61d63f4bd4c9969e5d7f3accd21af0de5fdd88d330627e
-
Filesize
22KB
MD52b7bca7e4ae82377a15c4af63c4bfba5
SHA114ffbd705f66d52fe8afdc656134c9d28e9ff6bf
SHA256922da594387e2b2d0104fedf3c0d4b62b6cbe1af93cd8bf07ba17a7e73ad55be
SHA512e64c19fe0a797d8263aaa84941e4bbcd7ef8a5fc5d34ab211ce4cc0ef05c74e1815f0d2a367a3b2614faa3292c5547ba15dddd21a6db4e49625ea1a8bc5f56d8
-
Filesize
113KB
MD560beb7140ed66301648ef420cbaad02d
SHA17fac669b6758bb7b8e96e92a53569cf4360ab1aa
SHA25695276c09f44b28100c0a21c161766eda784a983f019fc471290b1381e7ed9985
SHA5126dfa4eca42aea86fba18bc4a3ab0eed87948ea1831e33d43426b3aca1816070ecb7fd024856ad571ca2734214a98cc55e413502b3deef2c4a101228a7377e9d5
-
Filesize
469B
MD5393ee6adeda430edd72fedd15283e19d
SHA150d842ef9b12872e51ecfa7db12d4b5902fbf6ea
SHA2562ab5b5204ac3f360b335e3371a1739dab8e69915af1f07234741ca8fc6e083cb
SHA512168a8c6be6a600cda63803ccf23b100ee8457102e110234e21109de023aba20c09168e376b01ecdd230e57fee742423d5c2e647f5f0740132daf20f5a15813c8
-
Filesize
902B
MD5290afd9b8b24e085aa9acc7e82188b6e
SHA1cc6254352133b0082c7a35f26cb3948d2af853c4
SHA256e9ca6ed2c33204861b7e3bff867772870ce6e895868c2f824471b82367eef81d
SHA512e2192812f7bfce486ddcaa31112049ff1b1c4645d1907de7f7d1b1a47c507c8bfd6684b66df2906fcabfed9d14ffe0119f0ec5bf225b729960d72dcc3ad6264a
-
Filesize
23KB
MD5e57010cf5bbe296c7d83874e1251c84d
SHA16e5c316ad844d444585f03fe65080c9ad44dd017
SHA25692693856d0a35538fc02c49bda50ec24a2143fcf652ec377e02c6d2c8ca09a1d
SHA5120db7722fe72733dc3868d8fd8eddecd94479f8b73bb7b4dbfa4f85080ea7cadf8fff6101c52ed68b3abf78fa356cefb0a3b4ed93226edb3b72cca89cf99ebd50
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
50KB
MD525bfd0773a59006d689ef9b15507f2d9
SHA15bed9e7a371e5a58eeb8be79ebee0f5a36bebec0
SHA256c2b447a5ceab0a1c10eef2ab20cb0333901ef730a9cc3e9c7823cfae3ad250e3
SHA5126fae2263fad0ffa330fa9940cf97f881785132fffe1a8f74984b882acbcdeaa5d18c1c994ecf2e77893becfef3062ed239a41ce3776fc7b6463178e664dac0a8
-
Filesize
55KB
MD5fe686868deff6fdc11386ffcb9bf0175
SHA1aa973f8c9a0223c9f1d4ea95a69c1032eeec8eba
SHA2561f5309e5d87d481d72d0a732c7a62beed03771e7a09695e6b128715bec29cf01
SHA512644e7aa594d9047c96c8921597e05fd084120a621c293f4802e2434e63a9e65e2c12f75d27a7fde33738052dfece643dba109327c7f3407bb8ac1912947c8053
-
Filesize
41KB
MD5428ba6140c739ecc9ba76e0bbd3a45c6
SHA1290e40c45ac061f2f9dfe321cca62408287f325e
SHA256c892f4c01b2e1461952e23c77c78601eea841ada585c8e158598df742d0b94bc
SHA512063788caaac039ec4c82c1fda1e811c64693388da3ca0ec742bb0bb0400ecd4d991064c7ae63fb84e14d5deb057a23c92576d70f1e74028db3c7e397784e6488
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2025.1.17.1\keys.json
Filesize6KB
MD5bef4f9f856321c6dccb47a61f605e823
SHA18e60af5b17ed70db0505d7e1647a8bc9f7612939
SHA256fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5
SHA512bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Typosquatting\2025.3.25.1\typosquatting_list.pb
Filesize628KB
MD5c26015b2460d1acf6859aad730dc8f4a
SHA19c772753b62eaf995e39ea5ce1ef86454b58f169
SHA2565d816db5713aa5d2fa0c1de5461729250439d7609d95bd65623c0ea62da192c7
SHA512ef72f6e7a4ac1eab4c59ef0d90f884e29880a305ca262869b87a90462897d182a45b38fb074d704205a422cb886214c05aea6d0701715917b3092cb15559a6d2
-
Filesize
118B
MD53004ab7c9e3747e5109246e7f6b3859b
SHA1ac4c574c03611b8bc675e878a1be8124bc32fb48
SHA2561cb88f273e7906a853670161b6c75fabdd67f67c91b96a78171e2877b88eee96
SHA512f81e8de5d3010bce31b311de7545353b72a9befd01249cca99e870f141090ba66913991c458f4b5cdfb80902fd116fecd54981cc0a0f4049102247c273f905e0
-
Filesize
53B
MD522b68a088a69906d96dc6d47246880d2
SHA106491f3fd9c4903ac64980f8d655b79082545f82
SHA25694be212fe6bcf42d4b13fabd22da97d6a7ef8fdf28739989aba90a7cf181ac88
SHA5128c755fdc617fa3a196e048e222a2562622f43362b8ef60c047e540e997153a446a448e55e062b14ed4d0adce7230df643a1bd0b06a702dc1e6f78e2553aadfff
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
79B
MD57f4b594a35d631af0e37fea02df71e72
SHA1f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57
SHA256530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1
SHA512bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360