Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2025, 14:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://serve.tigogtm.top/puntos
Resource
win10v2004-20250314-en
General
-
Target
https://serve.tigogtm.top/puntos
Malware Config
Signatures
-
Drops file in Program Files directory 16 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_524996473\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_524996473\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_524996473\sets.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_524996473\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_899195054\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_1440942155\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_899195054\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_899195054\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_1440942155\data.txt msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_69535665\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_899195054\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_69535665\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_524996473\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_899195054\keys.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_1440942155\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping220_69535665\typosquatting_list.pb msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133874716573714556" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-446031748-3036493239-2009529691-1000\{7F53FF8B-23FA-4776-A84B-CD1817DB7337} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5076 msedge.exe 5076 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 220 wrote to memory of 5624 220 msedge.exe 86 PID 220 wrote to memory of 5624 220 msedge.exe 86 PID 220 wrote to memory of 6028 220 msedge.exe 87 PID 220 wrote to memory of 6028 220 msedge.exe 87 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 3840 220 msedge.exe 88 PID 220 wrote to memory of 6132 220 msedge.exe 89 PID 220 wrote to memory of 6132 220 msedge.exe 89 PID 220 wrote to memory of 6132 220 msedge.exe 89 PID 220 wrote to memory of 6132 220 msedge.exe 89 PID 220 wrote to memory of 6132 220 msedge.exe 89 PID 220 wrote to memory of 6132 220 msedge.exe 89 PID 220 wrote to memory of 6132 220 msedge.exe 89 PID 220 wrote to memory of 6132 220 msedge.exe 89 PID 220 wrote to memory of 6132 220 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://serve.tigogtm.top/puntos1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x264,0x7fff4afff208,0x7fff4afff214,0x7fff4afff2202⤵PID:5624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1792,i,10833451516730645487,9554331121199659143,262144 --variations-seed-version --mojo-platform-channel-handle=2280 /prefetch:32⤵PID:6028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2252,i,10833451516730645487,9554331121199659143,262144 --variations-seed-version --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2548,i,10833451516730645487,9554331121199659143,262144 --variations-seed-version --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:6132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3520,i,10833451516730645487,9554331121199659143,262144 --variations-seed-version --mojo-platform-channel-handle=3564 /prefetch:12⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3532,i,10833451516730645487,9554331121199659143,262144 --variations-seed-version --mojo-platform-channel-handle=3580 /prefetch:12⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5056,i,10833451516730645487,9554331121199659143,262144 --variations-seed-version --mojo-platform-channel-handle=4852 /prefetch:82⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5064,i,10833451516730645487,9554331121199659143,262144 --variations-seed-version --mojo-platform-channel-handle=5096 /prefetch:82⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5456,i,10833451516730645487,9554331121199659143,262144 --variations-seed-version --mojo-platform-channel-handle=5468 /prefetch:82⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5384,i,10833451516730645487,9554331121199659143,262144 --variations-seed-version --mojo-platform-channel-handle=5836 /prefetch:82⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5384,i,10833451516730645487,9554331121199659143,262144 --variations-seed-version --mojo-platform-channel-handle=5836 /prefetch:82⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=564,i,10833451516730645487,9554331121199659143,262144 --variations-seed-version --mojo-platform-channel-handle=5356 /prefetch:82⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6072,i,10833451516730645487,9554331121199659143,262144 --variations-seed-version --mojo-platform-channel-handle=5864 /prefetch:82⤵PID:5416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6108,i,10833451516730645487,9554331121199659143,262144 --variations-seed-version --mojo-platform-channel-handle=4964 /prefetch:82⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5116,i,10833451516730645487,9554331121199659143,262144 --variations-seed-version --mojo-platform-channel-handle=5112 /prefetch:82⤵PID:5200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5272,i,10833451516730645487,9554331121199659143,262144 --variations-seed-version --mojo-platform-channel-handle=5296 /prefetch:82⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6472,i,10833451516730645487,9554331121199659143,262144 --variations-seed-version --mojo-platform-channel-handle=6484 /prefetch:82⤵PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5568,i,10833451516730645487,9554331121199659143,262144 --variations-seed-version --mojo-platform-channel-handle=6352 /prefetch:82⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=5556,i,10833451516730645487,9554331121199659143,262144 --variations-seed-version --mojo-platform-channel-handle=6608 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3452,i,10833451516730645487,9554331121199659143,262144 --variations-seed-version --mojo-platform-channel-handle=3396 /prefetch:82⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:6052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53B
MD522b68a088a69906d96dc6d47246880d2
SHA106491f3fd9c4903ac64980f8d655b79082545f82
SHA25694be212fe6bcf42d4b13fabd22da97d6a7ef8fdf28739989aba90a7cf181ac88
SHA5128c755fdc617fa3a196e048e222a2562622f43362b8ef60c047e540e997153a446a448e55e062b14ed4d0adce7230df643a1bd0b06a702dc1e6f78e2553aadfff
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
118B
MD586095c966115d8fbabfe3e7496461e73
SHA19f6af2a9e4608c25b5c9257acdf77ba9838abc1d
SHA2569313c1c29918e4a75e85b3146647555080286d61517f0ac9c62c1993e274a6a6
SHA51251970ae96e6af2a2dbf086ea25a7ec6912a76954346dc85c885e6fd81128699abb14b368b09dd18c5d34183734fc6cfc8dcf0db03b916cd1dc21af7180653005
-
Filesize
79B
MD57f4b594a35d631af0e37fea02df71e72
SHA1f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57
SHA256530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1
SHA512bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360
-
Filesize
280B
MD58625e8ce164e1039c0d19156210674ce
SHA19eb5ae97638791b0310807d725ac8815202737d2
SHA2562f65f9c3c54fe018e0b1f46e3c593d100a87758346d3b00a72cb93042daf60a2
SHA5123c52b8876982fe41d816f9dfb05cd888c551cf7efd266a448050c87c3fc52cc2172f53c83869b87d7643ce0188004c978570f35b0fcc1cb50c9fffea3dec76a6
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2KB
MD5061ab5074ce4712c9ec70f5cf878c917
SHA1817cfdbf3804ba92c2605a4da0651c13ef8ed329
SHA256d0dfbc46bc4e8a1acda31422007c85ef95daaad002db0d8b84c96a0c1897c892
SHA512eebfd0979dda15b4766bc11242b5d515736afb8986f77544f243068855537de0215eb8dae4c8846fc9c85a8ba7978058742c13038bfaae1eba4c46d512563ca9
-
Filesize
2KB
MD585bbd8e6fd31cdc0a80d0df0e7ea8925
SHA1535fb5d9561ceed48d7b98887dd1ce63bddac031
SHA256a93a6d46568612262b094b92dce058094a64c762f2223917df61745f6c43a98f
SHA5121bcea564226c593ba6603003ef88053988a3febd9b97341ef33fcb44e711c8640555464bc61ac06cb9cf2af2bfb0dbce7efa912b77b06221e0aaef9798b2f024
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD522c2cbf422f2aded94ee601ec66f1b77
SHA1f43eaa1a4ae844e89b5a838aaa120ac194331da6
SHA256e5e9b5859d1219331c270ac6417421ebf98268be5a680ee5d5111a5178739cf3
SHA51267b20b35548ceaf2f596af044c45a2d2b276a143fc6b4751f775f5da7b7c8129b5230b2671c44e70d6af0b9bedd39b2a0681687cab240c466ef4d3c1cfacf7dd
-
Filesize
16KB
MD5f39d68df39eb15a7b00fe169d89464c9
SHA1919f060fab68b260ccbef4f08d234ec38b1fbdcf
SHA256d54d331a805c05240fc3cf6f63b1319f95d6f43725b44507f70995d9007d33e2
SHA512763aa9221328ca573b57a272e093ad276d78e0b727b89c4312b26be3e0a11b10774dd3dbc1a0e921c87b696ade4c7571a96e480986af491b9fe9db40e176b948
-
Filesize
36KB
MD5d99bd94fe0c37d2bee0cda73437c514f
SHA1446e44d4fe55b54a474b0e13cf68ed25c1f4b508
SHA256e8c9d5427f442f5a069e658920895d4795842dacb4d2c1e0583c1119fe03f143
SHA512f63e6a9e6366a25f4c9286a742c1b5f7ea3e1c6d3759f3f9c2af4521839fa73f11f3b307c9203fd60dd9ce3b989ecfd1c0b2478b5a6b29fcc190e16b028779ae
-
Filesize
22KB
MD5b37561c37e413552d0a0199a1cb576cb
SHA1d484988f92042f1b5b2f55d5ce2174086b3a51eb
SHA256c026d7f5835f86106fff6d69182061d3f50f1f0a6542739d2881ebc801561b2e
SHA5129541ca9b357edf4294e6d6394faaaef8b2bb002fe4ec5251b7c07b41eeb15dc942c15dfd8cbb76c6ddf192f1499fd7965ef4554944189cb97f129f0c666064a5
-
Filesize
113KB
MD560beb7140ed66301648ef420cbaad02d
SHA17fac669b6758bb7b8e96e92a53569cf4360ab1aa
SHA25695276c09f44b28100c0a21c161766eda784a983f019fc471290b1381e7ed9985
SHA5126dfa4eca42aea86fba18bc4a3ab0eed87948ea1831e33d43426b3aca1816070ecb7fd024856ad571ca2734214a98cc55e413502b3deef2c4a101228a7377e9d5
-
Filesize
467B
MD53df1764d5c7a73d4bd1e4dccb4936bba
SHA1e72719dfb26df29018dd0e5933d747f79d66fcef
SHA2561ac7d2231ce165b336b7fcaa8954638f8f69ca74cbe190f86ab67b5c6686504f
SHA51210ffab3ba0947fdb306066efd2211730a9c2068f19bab7c47da367a29dde6c460283aab2526d57c9c7ef51881e1d80c0ee8ed90d88ccf8d0147bdf43f878c66c
-
Filesize
23KB
MD5b02e80ff4c3160eefbc753bfac927e75
SHA161dc136adc7e2f64d638b103392c7b0e17b6f718
SHA256bd2a4175ef3955d0b21989760db97d7e29e9b5941f458765d6eab98c0dc6c553
SHA51232a97bf7a91027104d5213a4166d0ba4c56cc4fd0003f85f404405381206271565926fc747fb092c90806a0c3e49aea5b6296f0c8bf1f576897daca285e1ad6d
-
Filesize
900B
MD570a32ce7fa060444148c63f7f98a895d
SHA1f1430d8bbce673e8b0b8172a9429c32b623aef60
SHA25676e8ea6574f46258feabbd19b71d7979b51d5b20692f36b0e2535844dd7382cb
SHA512e2d7f2d4bf35564a937c956b5871c6d6cd4c2bbb695630e14da6d38689494a066b62415d7a184bdb2fa13c7a26d71449e8543fffb5a678fc2f9de5b80eea78b6
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
41KB
MD584eb1d8ef2c536d1aa54ca8b4c7bec9d
SHA1c1ad4ad6d7ae97658596e1cecd7c23072452188f
SHA25691a98fe24ddf9c522dcd9825bd1d00556f5eee149a8bec9eb8ea186cdd6a4cd3
SHA512d16ca735b2f971e5d598223b6a6e5f6b4870e3dc3c13bcf243da34e09c8bfca60e75301ee7438be646e9b0250857e1a5d7f354521b098e89422639fe9590ccf7
-
Filesize
55KB
MD518b4daef1ad1ead93aaefdd56161b150
SHA17256e1ab0a2365f1cf9f206f8644054d28bb8e93
SHA2568ffbb6a957f9566a6d9e929c85aef946cdfbdf9b0fdeb5d3e81657d32ef15b23
SHA512f7baa8f78cc1f50ce7cb3423c5791d8ac6773554f1300c0d548607b5a8b7c7ac765fd70d56c5d5db18b53da4ceadc6d82913b0e81f136c389579f97f81672d7b
-
Filesize
50KB
MD5b3faba997e70fb18b09b1521e7de2704
SHA1304f133de6e22d1cc18d47ac8d85dd6dfea9ce59
SHA256543ae85d5faae6254207c5de031d7227a24a2a4e338df336144db151ba1b98c7
SHA512935cf058d731009595cad79fbc09404ff2983f3ac7e2022c566a6b10847f5a592d2eb8c17395852d35ac72d78cb3dde273d4e74ae74423dc6e63c78b4b0aedf1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2025.1.17.1\keys.json
Filesize6KB
MD5bef4f9f856321c6dccb47a61f605e823
SHA18e60af5b17ed70db0505d7e1647a8bc9f7612939
SHA256fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5
SHA512bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Typosquatting\2025.3.26.1\typosquatting_list.pb
Filesize628KB
MD57c411ccffc2c011ba155c4bae74c9217
SHA16e0f96399bea0c45b188caf7c11b2549a2bbb551
SHA25671529860ca9874c1b29017b1b4846986d14f51f9f60dcbd8c7af7559cc0e0ac8
SHA512cbeba7735948e9565f4d7ee462366693a6915758486c5d7a84a4d6eaf0bcac948f579e91d883e1d6ffa27268acd10db86f02d7f9111837c757349e8cfa8fc0da
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5d340287be994b530680bb84fac5e5452
SHA1e5b75e14aaec84d3dd8b5b310e65d911150e6e48
SHA256a7157ed30bfcccd4b1a6eee48d207f972b0fa5e3e350c86e56c105ad669117be
SHA5125b09882ea0aa1686612b9bd8ececeff6dd32d348eeb7ce45a2c8f34d733965030dc3b70a489230ca967037158b946ace5c91904cd0478003fe146b8ec7302361