Analysis
-
max time kernel
148s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2025, 17:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://serve.tigogtm.top/puntos
Resource
win10v2004-20250314-en
General
-
Target
https://serve.tigogtm.top/puntos
Malware Config
Signatures
-
Drops file in Program Files directory 21 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping1396_394214613\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1396_1395768665\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1396_1395768665\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1396_394214613\safety_tips.pb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1396_1862186007\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1396_1862186007\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1396_1862186007\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1396_1395768665\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1396_1395768665\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1396_637027132\regex_patterns.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1396_637027132\v1FieldTypes.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1396_394214613\typosquatting_list.pb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1396_1395768665\keys.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1396_637027132\autofill_bypass_cache_forms.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1396_637027132\edge_autofill_global_block_list.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1396_637027132\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1396_637027132\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1396_394214613\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1396_394214613\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1396_1862186007\sets.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1396_1862186007\_metadata\verified_contents.json msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133873982747053136" msedge.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-814918696-1585701690-3140955116-1000\{06AEC39D-90C7-424B-AFCE-26780E7BA58A} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5672 msedge.exe 5672 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1396 wrote to memory of 3056 1396 msedge.exe 85 PID 1396 wrote to memory of 3056 1396 msedge.exe 85 PID 1396 wrote to memory of 1592 1396 msedge.exe 86 PID 1396 wrote to memory of 1592 1396 msedge.exe 86 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 2024 1396 msedge.exe 87 PID 1396 wrote to memory of 5716 1396 msedge.exe 88 PID 1396 wrote to memory of 5716 1396 msedge.exe 88 PID 1396 wrote to memory of 5716 1396 msedge.exe 88 PID 1396 wrote to memory of 5716 1396 msedge.exe 88 PID 1396 wrote to memory of 5716 1396 msedge.exe 88 PID 1396 wrote to memory of 5716 1396 msedge.exe 88 PID 1396 wrote to memory of 5716 1396 msedge.exe 88 PID 1396 wrote to memory of 5716 1396 msedge.exe 88 PID 1396 wrote to memory of 5716 1396 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://serve.tigogtm.top/puntos1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x2b0,0x7ffa6214f208,0x7ffa6214f214,0x7ffa6214f2202⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1940,i,2215071049917007736,16592748934005535871,262144 --variations-seed-version --mojo-platform-channel-handle=2260 /prefetch:32⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2232,i,2215071049917007736,16592748934005535871,262144 --variations-seed-version --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2476,i,2215071049917007736,16592748934005535871,262144 --variations-seed-version --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:5716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3484,i,2215071049917007736,16592748934005535871,262144 --variations-seed-version --mojo-platform-channel-handle=3572 /prefetch:12⤵PID:5920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3468,i,2215071049917007736,16592748934005535871,262144 --variations-seed-version --mojo-platform-channel-handle=3500 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4856,i,2215071049917007736,16592748934005535871,262144 --variations-seed-version --mojo-platform-channel-handle=5080 /prefetch:82⤵PID:6128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4936,i,2215071049917007736,16592748934005535871,262144 --variations-seed-version --mojo-platform-channel-handle=5100 /prefetch:82⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5576,i,2215071049917007736,16592748934005535871,262144 --variations-seed-version --mojo-platform-channel-handle=5584 /prefetch:82⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5672,i,2215071049917007736,16592748934005535871,262144 --variations-seed-version --mojo-platform-channel-handle=5644 /prefetch:82⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5672,i,2215071049917007736,16592748934005535871,262144 --variations-seed-version --mojo-platform-channel-handle=5644 /prefetch:82⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5636,i,2215071049917007736,16592748934005535871,262144 --variations-seed-version --mojo-platform-channel-handle=6128 /prefetch:82⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5624,i,2215071049917007736,16592748934005535871,262144 --variations-seed-version --mojo-platform-channel-handle=5604 /prefetch:82⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5616,i,2215071049917007736,16592748934005535871,262144 --variations-seed-version --mojo-platform-channel-handle=6076 /prefetch:82⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5228,i,2215071049917007736,16592748934005535871,262144 --variations-seed-version --mojo-platform-channel-handle=2648 /prefetch:82⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5324,i,2215071049917007736,16592748934005535871,262144 --variations-seed-version --mojo-platform-channel-handle=5020 /prefetch:82⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5832,i,2215071049917007736,16592748934005535871,262144 --variations-seed-version --mojo-platform-channel-handle=6140 /prefetch:82⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6068,i,2215071049917007736,16592748934005535871,262144 --variations-seed-version --mojo-platform-channel-handle=6140 /prefetch:82⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=5844,i,2215071049917007736,16592748934005535871,262144 --variations-seed-version --mojo-platform-channel-handle=6140 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5500,i,2215071049917007736,16592748934005535871,262144 --variations-seed-version --mojo-platform-channel-handle=5396 /prefetch:82⤵PID:5556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79B
MD57f4b594a35d631af0e37fea02df71e72
SHA1f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57
SHA256530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1
SHA512bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
72B
MD5a30b19bb414d78fff00fc7855d6ed5fd
SHA12a6408f2829e964c578751bf29ec4f702412c11e
SHA2569811cd3e1fbf80feb6a52ad2141fc1096165a100c2d5846dd48f9ed612c6fc9f
SHA51266b6db60e9e6f3059d1a47db14f05d35587aa2019bc06e6cf352dfbb237d9dfe6dce7cb21c9127320a7fdca5b9d3eb21e799abe6a926ae51b5f62cf646c30490
-
Filesize
119B
MD5f3eb631411fea6b5f0f0d369e1236cb3
SHA18366d7cddf1c1ab8ba541e884475697e7028b4e0
SHA256ebbc79d0fccf58eeaeee58e3acbd3b327c06b5b62fc83ef0128804b00a7025d0
SHA5124830e03d643b0474726ef93ad379814f4b54471e882c1aec5be17a0147f04cfbe031f8d74960a80be6b6491d3427eca3f06bc88cc06740c2ad4eb08e4d3e4338
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Autofill\4.0.1.14\autofill_bypass_cache_forms.json
Filesize175B
MD58060c129d08468ed3f3f3d09f13540ce
SHA1f979419a76d5abfc89007d91f35412420aeae611
SHA256b32bfdb89e35959aaf3e61ae58d0be1da94a12b6667e281c9567295efdd92f92
SHA51299d0d9c816a680d7c0a28845aab7e8f33084688b1f3be4845f9cca596384b7a0811b9586c86ba9152de54cafcdea5871a6febbee1d5b3df6c778cdcb66f42cfa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Autofill\4.0.1.14\edge_autofill_global_block_list.json
Filesize4KB
MD5afb6f8315b244d03b262d28e1c5f6fae
SHA1a92aaff896f4c07bdea5c5d0ab6fdb035e9ec71e
SHA256a3bcb682dd63c048cd9ca88c49100333651b4f50de43b60ec681de5f8208d742
SHA512d80e232da16f94a93cfe95339f0db4ff4f385e0aa2ba9cbd454e43666a915f8e730b615085b45cc7c029aa45803e5aca61b86e63dac0cf5f1128beed431f9df0
-
Filesize
509KB
MD5630f694f05bdfb788a9731d59b7a5bfe
SHA1689c0e95aaefcbaca002f4e60c51c3610d100b67
SHA256ad6fdee06aa37e3af6034af935f74b58c1933752478026ceeccf47dc506c8779
SHA5126ee64baab1af4551851dcef549b49ec1442aa0b67d2149ac9338dc1fe0082ee24f4611fcc76d6b8abeb828ad957a9fa847cbc9c98cdf42dd410d046686b3769b
-
Filesize
280B
MD560d40d2b37759323c10800b75df359b8
SHA1f5890e7d8fc1976fe036fea293832d2e9968c05c
SHA256c3a2f26d5aef8b5ed1d23b59ed6fce952b48194bed69e108a48f78aec72126e0
SHA5120c339563594cc9f930a64903281589886308d4412ee267e976520a58d86b2c339d7b2320e1b3fd6fbf81f092ff1735f0710c669af2986ea5b63d2c1e0a6df902
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2KB
MD5e8e33dbca47ce2532999132e3e9f5789
SHA11acd573c5f36611988871582051378746cc74e8a
SHA2563e32d54453654be4df115e17a750445e2a9996314e0051f78357d68c7b2524fd
SHA5120475343b71dc329c81479a153528166f6d55f71452b55279ea449215de2c2dd0c35afd4cf88ddeb82e6dad21c1d75359cc8043578acd5635e87798b82b135012
-
Filesize
2KB
MD5def2b24e152d1d36181ed35fb29bd319
SHA1c9cd036dddf3ad7dd0c836c271409eec3f9a904c
SHA256fada831f6e0a8e50bafb08ef5b0cd5b088bd4a5b08fef5573847991ff75df771
SHA5120d97d92f2a3ec66bdcb4f8df0e2156f574ac227afa86c648f5e86cacb3c34a8d2cb936a4acaab350564b730697709d2245f82d813e3eaf75da8097990d6b034f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD5198bd153cd32cb44e17da2fade758c84
SHA17a0ec105fc3d77688574ad7a963dad44b5df5efb
SHA25689895d8fa1b5e29a18548b628504ad9ea85577fe4d2ced09106132726df3013b
SHA5121556d20b415c447784b44f8e088058c0dec1da972f8f846a0e7e39b4e17f0084e4ae90bc688ef864e43526d603451f0e30a93b92e7a77cf1d8b9420f4aacea5b
-
Filesize
16KB
MD57dbc5b10b4d9b8f9f8a99443f4c70ecb
SHA186ecf20ef4254a65039c733b0bc08b2702804184
SHA256e65bb2504db33014245ae010f4416022f330471942f9968a59c8e3dda3373b8f
SHA5127e16d54c90cfc21ab6830fa4e3a8ebe21f16f5bec0ead2d63feaae6285ba9191f0d156f2c2b049ddc85ce768b53a52c87cd8d434d628307d79285e07cf6fd23f
-
Filesize
36KB
MD58823f94bf866bb2984efae4600620e00
SHA151fc9eb2eb0c592278abc789a9c59c479dd52f1d
SHA256e7631be68b8f3bedb6d4dd98df03a603e9176b4de52bb300e2ca5d4650395d79
SHA5125f2bbd31c986f61fe05bd7520ebe62e23102f85baea9cbb0e8e5bb389786c3645dd7297700084605fd9e935c7d978ed7f34d645872b323beab3eadcd04096ac7
-
Filesize
22KB
MD59c03e596920381539277bbb7b19fdcca
SHA17a6a4de52c5e52aea1250178e44d06c0584139d2
SHA25612bdb2a92a244f0dead42c13a0abd7a163f9025cc5b99c6489a7b968b755a8f5
SHA51237b6850263eba660fa6624551dbe8dbe5c7b34cf4d842d087327ce023d69f3eb53bce0d17bb9868595e029f03e9cf348c4c313c43c8264a3ad5153968db0b351
-
Filesize
469B
MD593a7ccb2ccc10e76fc9ff5395b45739f
SHA1fd8d44302def518fd3e393da589c2e319dc50c33
SHA25616d7853c2ede97e6a6b3580ed16fc8bf5b5c8e1c779a7a8f69908714c3e5ad56
SHA512aa94aeecdc38d2cfc7cb0e1209c116450042d3c36cda131b7b1ef1859d3c296f911c6b0f9181e288f251192a0be9ad8c4cfb410fa023435797996a2f9738798c
-
Filesize
904B
MD58b84dfe9faa17d8751abb1eb35c8602f
SHA1d12a7ef50df0110a8098ac587f15dd762270353f
SHA2563c3e0636100a334e76ef8ba948e895fd22324a13102fa58773634c0a9a2c4196
SHA512bb7114a9d9d4c4ef5482053b410031e25fcf0fc5fe936ddd19f8c7567008e8c54780986e269c25fa0e6d135de1ffe13f908d25ab99039750c15c37aca645b5de
-
Filesize
23KB
MD525a7c18e3ef05a7a95ef8730b4a6d693
SHA1ed5faac6b4f416aa314c4f08fb9307e79cc037fa
SHA2569a90546c65819f3cb355f41fd8baf56294141d877e71d199c7965477c3ed92bc
SHA512366dab9f090b214d85fec8c161594873582481209a4e113a0d8311d5e2a58b87a44be2a9c4eec9b9187cb624e91a01b8da6d35d1099b25cd83b7aa14736bee9e
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
40KB
MD513694a4e414618eecf05177105ae1d4f
SHA1558d2f9c45391138def29a9a29f57a05557c50d6
SHA256ba3e658844d44b21cf3247e3d9315542469ffbfa8aee91aba9d60139c5d68148
SHA5120542cdbf7319213ddb643739e547c74f88dd6e5b5634e401d99db4b0932f7cf24c8d6443933ab1c931e8c217be1f221a8d5ab7c912cf2b418e08878836e49b1e
-
Filesize
49KB
MD5b820e8af601848bf078207a34a5ca6f8
SHA16d9acee5a6dd34413b609fac56e7593f96379ea6
SHA256dd04d47d9f27f0ca1775f6df5282a82158ae0ca1486d0c5b3b5478e62cc8110b
SHA512002733519ba5d19f68a028a02becbb69b1c7566c14039e28434af00f81153d549975ec94eaaeeec06183971601f57980f9eec5dee79b7a577539fbeb978bcee9
-
Filesize
54KB
MD5697c22b3569450604c867fe8b01c5982
SHA153d3c9ff1e88bc2d1309565ce3616566efce8b44
SHA2565c745f21e26686a864c565a29962afbdd61d311ffd194e82962cbbe876e43682
SHA51200ae6e0c30880ce62d89d1d41c85fcf84d65c26d492304f4647ca288fa9b3295723affb6a2f63803ffef16bd76193333ee9eade04b5483b4d222e30096b92226
-
Filesize
163KB
MD5bd6846ffa7f4cf897b5323e4a5dcd551
SHA1a6596cdc8de199492791faa39ce6096cf39295cd
SHA256854b7eb22303ec3c920966732bc29f58140a82e1101dffe2702252af0f185666
SHA512aa19b278f7211ffaf16b14b59d509ce6b80708e2bb5af87d98848747de4cba13b6626135dd3ec7aabd51b4c2cfb46ed96800a520d2dae8af8105054b6cd40e0b
-
Filesize
3KB
MD517c10dbe88d84b9309e6d151923ce116
SHA19ad2553c061ddcc07e6f66ce4f9e30290c056bdf
SHA2563ad368c74c9bb5da4d4750866f16d361b0675a6b6dc4e06e2edd72488663450e
SHA512ad8ed3797941c9cad21ae2af03b77ce06a23931d9c059fe880935e2b07c08f85fc628e39873fb352c07714b4e44328799b264f4adb3513975add4e6b67e4a63c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2025.1.17.1\keys.json
Filesize6KB
MD5bef4f9f856321c6dccb47a61f605e823
SHA18e60af5b17ed70db0505d7e1647a8bc9f7612939
SHA256fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5
SHA512bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5504dfb2a25835d8a5fbfc48ce6315e34
SHA1db0e94a4793b0c2d723124bbb7fad0436687c948
SHA256a4fb684dd3376d70611e2299c07fdd67389913f489852efcd50a995d2627d5d7
SHA512bbe4d33c5528a18117fc7d329eef21f9bb3a7022dcdf5c8de645e6407228633297debb9f38aa87525d06fed61ce30bf6746902d343b88a0c708e2fa27947e82c