Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2025, 14:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://serve.tigogtm.top/puntos
Resource
win10v2004-20250314-en
General
-
Target
https://serve.tigogtm.top/puntos
Malware Config
Signatures
-
Drops file in Program Files directory 16 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping5520_1486608606\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5520_1486608606\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5520_1031343350\data.txt msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5520_1486608606\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5520_1486608606\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5520_1792423815\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5520_1031343350\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5520_498491516\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5520_498491516\typosquatting_list.pb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5520_498491516\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5520_1486608606\sets.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5520_1792423815\keys.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5520_1792423815\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5520_1792423815\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5520_1792423815\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5520_1031343350\manifest.json msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133873859325679331" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3975168204-1612096350-4002976354-1000\{84804C5E-3A02-4F67-BF84-321919FF7638} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 680 msedge.exe 680 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe 5520 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5520 wrote to memory of 3288 5520 msedge.exe 87 PID 5520 wrote to memory of 3288 5520 msedge.exe 87 PID 5520 wrote to memory of 2264 5520 msedge.exe 88 PID 5520 wrote to memory of 2264 5520 msedge.exe 88 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 1260 5520 msedge.exe 89 PID 5520 wrote to memory of 4040 5520 msedge.exe 90 PID 5520 wrote to memory of 4040 5520 msedge.exe 90 PID 5520 wrote to memory of 4040 5520 msedge.exe 90 PID 5520 wrote to memory of 4040 5520 msedge.exe 90 PID 5520 wrote to memory of 4040 5520 msedge.exe 90 PID 5520 wrote to memory of 4040 5520 msedge.exe 90 PID 5520 wrote to memory of 4040 5520 msedge.exe 90 PID 5520 wrote to memory of 4040 5520 msedge.exe 90 PID 5520 wrote to memory of 4040 5520 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://serve.tigogtm.top/puntos1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5520 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x2a8,0x7ffb3fb2f208,0x7ffb3fb2f214,0x7ffb3fb2f2202⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1856,i,10473847306751442326,6742126433820032086,262144 --variations-seed-version --mojo-platform-channel-handle=2284 /prefetch:32⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2256,i,10473847306751442326,6742126433820032086,262144 --variations-seed-version --mojo-platform-channel-handle=2252 /prefetch:22⤵PID:1260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2540,i,10473847306751442326,6742126433820032086,262144 --variations-seed-version --mojo-platform-channel-handle=2512 /prefetch:82⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3456,i,10473847306751442326,6742126433820032086,262144 --variations-seed-version --mojo-platform-channel-handle=3504 /prefetch:12⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3484,i,10473847306751442326,6742126433820032086,262144 --variations-seed-version --mojo-platform-channel-handle=3516 /prefetch:12⤵PID:5148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4844,i,10473847306751442326,6742126433820032086,262144 --variations-seed-version --mojo-platform-channel-handle=5072 /prefetch:82⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3444,i,10473847306751442326,6742126433820032086,262144 --variations-seed-version --mojo-platform-channel-handle=4808 /prefetch:82⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5496,i,10473847306751442326,6742126433820032086,262144 --variations-seed-version --mojo-platform-channel-handle=5424 /prefetch:82⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5852,i,10473847306751442326,6742126433820032086,262144 --variations-seed-version --mojo-platform-channel-handle=5608 /prefetch:82⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5852,i,10473847306751442326,6742126433820032086,262144 --variations-seed-version --mojo-platform-channel-handle=5608 /prefetch:82⤵PID:5276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6088,i,10473847306751442326,6742126433820032086,262144 --variations-seed-version --mojo-platform-channel-handle=5544 /prefetch:82⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3448,i,10473847306751442326,6742126433820032086,262144 --variations-seed-version --mojo-platform-channel-handle=5612 /prefetch:82⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6056,i,10473847306751442326,6742126433820032086,262144 --variations-seed-version --mojo-platform-channel-handle=6120 /prefetch:82⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5748,i,10473847306751442326,6742126433820032086,262144 --variations-seed-version --mojo-platform-channel-handle=5248 /prefetch:82⤵PID:5512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5300,i,10473847306751442326,6742126433820032086,262144 --variations-seed-version --mojo-platform-channel-handle=6340 /prefetch:82⤵PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=760,i,10473847306751442326,6742126433820032086,262144 --variations-seed-version --mojo-platform-channel-handle=5292 /prefetch:82⤵PID:5124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5936,i,10473847306751442326,6742126433820032086,262144 --variations-seed-version --mojo-platform-channel-handle=6356 /prefetch:82⤵PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=6352,i,10473847306751442326,6742126433820032086,262144 --variations-seed-version --mojo-platform-channel-handle=6428 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3980,i,10473847306751442326,6742126433820032086,262144 --variations-seed-version --mojo-platform-channel-handle=5624 /prefetch:82⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:5456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53B
MD522b68a088a69906d96dc6d47246880d2
SHA106491f3fd9c4903ac64980f8d655b79082545f82
SHA25694be212fe6bcf42d4b13fabd22da97d6a7ef8fdf28739989aba90a7cf181ac88
SHA5128c755fdc617fa3a196e048e222a2562622f43362b8ef60c047e540e997153a446a448e55e062b14ed4d0adce7230df643a1bd0b06a702dc1e6f78e2553aadfff
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
6KB
MD5bef4f9f856321c6dccb47a61f605e823
SHA18e60af5b17ed70db0505d7e1647a8bc9f7612939
SHA256fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5
SHA512bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c
-
Filesize
79B
MD57f4b594a35d631af0e37fea02df71e72
SHA1f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57
SHA256530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1
SHA512bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360
-
Filesize
118B
MD53004ab7c9e3747e5109246e7f6b3859b
SHA1ac4c574c03611b8bc675e878a1be8124bc32fb48
SHA2561cb88f273e7906a853670161b6c75fabdd67f67c91b96a78171e2877b88eee96
SHA512f81e8de5d3010bce31b311de7545353b72a9befd01249cca99e870f141090ba66913991c458f4b5cdfb80902fd116fecd54981cc0a0f4049102247c273f905e0
-
Filesize
280B
MD565044109d1beb8ed8d59560642cbc519
SHA10084485b0aa26069232fab51ee603682e8edfd17
SHA256a1e0b448218678b30356cbbe4092ea091435e7450822a9748361b6e8b198962d
SHA51296dcc68fe92f98c4329a8335cfffdb0849a52562431045ccc42076bda0abf3842491303fb669246bfd04e64113688d3f90000a09571dd76ff84b52e34e45f9b6
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\2958790b-d76d-45ce-b9c4-b9afe91efa1d.tmp
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD5c3d12391b0c21606d2b682e62fbc5aba
SHA1920cbd468aa3c36e1c23d99a2734a7329d64d6fb
SHA25631685336e03b497948719d1147d8d1e6283ff3d634e9e5ef1fcec7c700d8bf75
SHA512d0fec6b7bb6dffe26b29e95cae94391a0f27b4c3ba98e504b938ff980dbffcf0519b1e3e9c05d574ed32009b295102ecceb0677a4eafe802b9a560a2a335832a
-
Filesize
2KB
MD5c3e4688f62dc0ff2faa048a71f64623f
SHA1cb6f4af34f57006975fad69f9154d2f5cac94515
SHA256b03e7779c55a78c9778d377a84b594742decb68d92bd982e36f0adf811e352b8
SHA512eb0a0d7490dc4eab1d0c6fd3dceac6de3700dc875191a99b9639d483aa755aa0d71591621a1f1b659a25856728acd2831fc5c0ea5cbadc523fe4eca2a5f3ed5e
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD5e38be12084141c9379a5b76fe1eeddf1
SHA19e944174dcddcc2b7773f1e530f58ba0a6504f20
SHA256662e26a2a6ee15c06a7ba39e783ef87a3f82ac6641d745b968ed1d6f1e8b2909
SHA512f191906d07bb0b6ba46b484b875583e3bbc64e8e4739d333235908cedeeec5ab0dcc2693a09917c6ebbc7794f533918ba047df504fa833a9a173654370ec937f
-
Filesize
16KB
MD5c9eff815bde5135f445175f544fd1588
SHA17195f6b1a9383d7d941109b691f866b9c8a9663a
SHA256888f805d949c978ccf3d317039e4eb0ce34af9988b813e6ef2f3224d595103d9
SHA512d4999791baa928f20315ff7b00f35ab92073bb5b72957c0ddaff1352575ce2c632506665bb1f2cc182a1594009872adf25864a9c6f4107ef668233c886a3832e
-
Filesize
36KB
MD5e7004837f9c3da2a8b45f648ae669fee
SHA1a9210ea4b763004e12f3f16598e9d34bc63f37b8
SHA25661bfdf0a3b8044651c722697687d4574c030ac63d9d204bc85c5c7b90dd8ae09
SHA512c40c8f44483926b281258bbf5f9597d98c9cd217f745b285f877f99feb5520a067ee6ac0d6d13e55ecd5c0846c48b42588ed573e58b3530872fd71952bae025a
-
Filesize
23KB
MD567fd51f20f2a644a2f178cec5ac5c094
SHA1fbc76bf97bd27d081f3748f14c2abc50088670ee
SHA256ad439bcb06f4ba54dab4a8bf3eec8ea28c0acf7d96f8028bbfbd38545d21df43
SHA51243516da801ed402ad450eda1e352f6ea8c3ee504764b6db3fc70e5ed24bb9c616f2f403779f0deb50dec5acdaad89cfa373faa44751558f5b4b52fad4dd5def9
-
Filesize
113KB
MD560beb7140ed66301648ef420cbaad02d
SHA17fac669b6758bb7b8e96e92a53569cf4360ab1aa
SHA25695276c09f44b28100c0a21c161766eda784a983f019fc471290b1381e7ed9985
SHA5126dfa4eca42aea86fba18bc4a3ab0eed87948ea1831e33d43426b3aca1816070ecb7fd024856ad571ca2734214a98cc55e413502b3deef2c4a101228a7377e9d5
-
Filesize
469B
MD59b7dcd636b56ba64ed2480f9c7f79a2a
SHA1b09557583b1665c1885e90f8ff64eb6fe3e713d4
SHA2560ac0b4e6edbe5498db7b04abc9e3b3d1ddfeb9dad2b9cfbb5ed9d05106b4e4ed
SHA512e4e44476f333caa74d936416b44c3589d655a2c5f8de50943c229d21253ad2c663f24d978e029fea1164bc7e66bab232614dfa35cd5e07593154805ed33fcf6f
-
Filesize
904B
MD56a0875df7e2985355c70b245c7a12d5c
SHA12134d057800c5569b38d9ad121bbd65dc66da91a
SHA25648cbf609e3b7b1cfe11fc366434f7841488e52de1904c904b0e216907e9d8915
SHA512e5b8602bd66cd6bdd9e6ae147bf10d31343a5334440333bf7151d53f1fd3c5dced47ed58b44143ae688884bfa64b8f3b08b12f8c93b1554774e86b5d4a727d35
-
Filesize
23KB
MD5ac117a50f894f6f8c794a3cff4283b0a
SHA10028620f503d63a15b6ae07185313fe1c930037c
SHA256ce296895414ac92ba005dc969ac4ef1c026969389c810c7851ffcdf2977be79f
SHA512da779db2346433d174d207c67a11aa9823820ca33448fd74f9c759fefa5a2fade9607728e605175d0716a42ebb77a971af194aad667be88704208563476553db
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\ee2d9da3-6f13-4ea7-bead-572537d4d608.tmp
Filesize19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
49KB
MD556d74da89adc710644ba08f70079bbe2
SHA1688d0b89f73fc8751420108bcc218e4c44305b19
SHA2561f4cef0edf45b92d51f390496ba39cfd307aac13385a2a35f166f40e75e6e4fc
SHA5128b2a6804e178f333b2be820f974024f1346078badacab1a7c086a9423f07126ef91060c1a558be8b4261a582bdb6393e224d577630476ec8c3e79c9cbd6bfb63
-
Filesize
54KB
MD54ab61c5c472ca98a52e320db541e666c
SHA156b2ddf833465fbaa670216ec54af9cc7ef49e81
SHA25699fb091682bb19c3fb1cb2b21a4fb211f838a70bcac7162f6c6a04f07eee0d83
SHA512c4d7c860bfdb01e37ddd88cf79bfcd13d17d8321a42bbaf6f227b708763d96876f5511faa6d92acbd290d38f3a966673a6ef99e75cc1dc248282435d5ab822c8
-
Filesize
40KB
MD58513515afbc02d9e3a77d3d0fa44dea7
SHA103dffa3fad1f1810bb9748cfb9bab62234d66e58
SHA256530db52f85dfee42f9b3c66fbd35f2cf86ebaba978577dba8af703b57f951f47
SHA512850fefcc528e73e06d0ffcffe2f7f1ce81715e62609fdb0f559eb166536ba49241c1923157f076f80718be971231eaa80457d6dd0119ca70dfeeeba48c6f5141
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Typosquatting\2025.3.25.1\typosquatting_list.pb
Filesize628KB
MD5c26015b2460d1acf6859aad730dc8f4a
SHA19c772753b62eaf995e39ea5ce1ef86454b58f169
SHA2565d816db5713aa5d2fa0c1de5461729250439d7609d95bd65623c0ea62da192c7
SHA512ef72f6e7a4ac1eab4c59ef0d90f884e29880a305ca262869b87a90462897d182a45b38fb074d704205a422cb886214c05aea6d0701715917b3092cb15559a6d2
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5e5568eb19b47e2a86ebd207fe5a49f43
SHA14be5e02f6f425e94334591666c7e87a7221d73f2
SHA25659c2b5c1ec7d1f4c45b66b785b34b82753e302a60f5fc94d7f9c347e1b62b03c
SHA512b6899ccb8e3d8cbcb40516022b615c9dd90a497f836444674f418537519e960dbd949f62447b462e4f40a72779175cd189ce9a44ecd6663bb9aac3880417874d