Analysis

  • max time kernel
    123s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-05-2024 03:06

General

  • Target

    https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Spyware/HawkEye.exe

Malware Config

Signatures

  • Chimera 64 IoCs

    Ransomware which infects local and network files, often distributed via Dropbox links.

  • Chimera Ransomware Loader DLL 1 IoCs

    Drops/unpacks executable file which resembles Chimera's Loader.dll.

  • Renames multiple (3276) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 27 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 51 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 45 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Spyware/HawkEye.exe
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4528
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb5e446f8,0x7ffbb5e44708,0x7ffbb5e44718
      2⤵
        PID:4932
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,2174779951716345633,10668823900483812845,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:2
        2⤵
          PID:2832
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,2174779951716345633,10668823900483812845,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1476
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,2174779951716345633,10668823900483812845,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:8
          2⤵
            PID:3428
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2174779951716345633,10668823900483812845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:1
            2⤵
              PID:3576
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2174779951716345633,10668823900483812845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:1
              2⤵
                PID:3080
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,2174779951716345633,10668823900483812845,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5512 /prefetch:8
                2⤵
                  PID:4636
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,2174779951716345633,10668823900483812845,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5512 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2020
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2174779951716345633,10668823900483812845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4084 /prefetch:1
                  2⤵
                    PID:4428
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2174779951716345633,10668823900483812845,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:1
                    2⤵
                      PID:1764
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2100,2174779951716345633,10668823900483812845,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3340 /prefetch:8
                      2⤵
                        PID:1144
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2174779951716345633,10668823900483812845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:1
                        2⤵
                          PID:3508
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2100,2174779951716345633,10668823900483812845,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6188 /prefetch:8
                          2⤵
                            PID:316
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2174779951716345633,10668823900483812845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6212 /prefetch:1
                            2⤵
                              PID:5172
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2174779951716345633,10668823900483812845,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6292 /prefetch:1
                              2⤵
                                PID:5180
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,2174779951716345633,10668823900483812845,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:8
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:5420
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,2174779951716345633,10668823900483812845,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 /prefetch:2
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:6096
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:1580
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:1144
                                • C:\Windows\System32\rundll32.exe
                                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                  1⤵
                                    PID:5764
                                  • C:\Users\Admin\Downloads\HawkEye.exe
                                    "C:\Users\Admin\Downloads\HawkEye.exe"
                                    1⤵
                                    • Chimera
                                    • Executes dropped EXE
                                    • Drops desktop.ini file(s)
                                    • Drops file in Program Files directory
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:6080
                                    • C:\Program Files\Internet Explorer\iexplore.exe
                                      "C:\Program Files\Internet Explorer\iexplore.exe" -k "C:\Users\Admin\Music\YOUR_FILES_ARE_ENCRYPTED.HTML"
                                      2⤵
                                      • Modifies Internet Explorer settings
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SetWindowsHookEx
                                      PID:3720
                                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3720 CREDAT:17410 /prefetch:2
                                        3⤵
                                        • Modifies Internet Explorer settings
                                        • Suspicious use of SetWindowsHookEx
                                        PID:700
                                  • C:\Windows\System32\rundll32.exe
                                    C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {c82192ee-6cb5-4bc0-9ef0-fb818773790a} -Embedding
                                    1⤵
                                      PID:2376
                                    • C:\Program Files\Internet Explorer\iexplore.exe
                                      "C:\Program Files\Internet Explorer\iexplore.exe"
                                      1⤵
                                      • Modifies Internet Explorer settings
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SetWindowsHookEx
                                      PID:5932
                                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5932 CREDAT:17410 /prefetch:2
                                        2⤵
                                        • Modifies Internet Explorer settings
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2368

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Program Files\Java\jdk-1.8\jre\lib\YOUR_FILES_ARE_ENCRYPTED.HTML

                                      Filesize

                                      4KB

                                      MD5

                                      941b261f78b0087166d0d29f38a70bf1

                                      SHA1

                                      1f23d88dddade1e550cd7fcd82b182eb4d591583

                                      SHA256

                                      d43286707323fb5fb8125b3273a0f02fd2f6bae1260c9341177505a762bc5ef3

                                      SHA512

                                      46cd55223015ea70db7f99fac7fa393cb7c1863c18be95fe62bcdf11c167bebb047be3a7b4c697b302d77521f3486e09102d30d85c0b2faee5b5b3cbba456878

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      2a70f1bd4da893a67660d6432970788d

                                      SHA1

                                      ddf4047e0d468f56ea0c0d8ff078a86a0bb62873

                                      SHA256

                                      c550af5ba51f68ac4d18747edc5dea1a655dd212d84bad1e6168ba7a97745561

                                      SHA512

                                      26b9a365e77df032fc5c461d85d1ba313eafead38827190608c6537ec12b2dfdbed4e1705bfd1e61899034791ad6fa88ea7490c3a48cdaec4d04cd0577b11343

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      fbe1ce4d182aaffb80de94263be1dd35

                                      SHA1

                                      bc6c9827aa35a136a7d79be9e606ff359e2ac3ea

                                      SHA256

                                      0021f72dbca789f179762b0e17c28fe0b93a12539b08294800e47469905aeb51

                                      SHA512

                                      3fb0a3b38e7d4a30f5560594b1d14e6e58419e274255fb68dfe0ca897aa181f9ce8cb2048403f851fd36a17b0e34d272d03927769d41a500b2fe64806354902f

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\633c0b74-75aa-47c6-8bd5-9b26804d4564.tmp

                                      Filesize

                                      1KB

                                      MD5

                                      64ba086ef30e70f9abadad77b7bbdbf5

                                      SHA1

                                      ea68cb505e6baa0e1ae3cbd24fe6d1922b283db4

                                      SHA256

                                      8667a747c4ef0ab735556366c610205dde0a0ea28483cdd0deba66774a3e0519

                                      SHA512

                                      932d2b409c0bea1eb88f4b5d0b71f132b41a7996b03f549e6c06eaa7ce43e3730a46fef011d76320275ca39e57c786446675457be8ec4c06de50273661493d3e

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                      Filesize

                                      1KB

                                      MD5

                                      e4c5f60d3f9a5fb1855f5997434d12a9

                                      SHA1

                                      054274de67573dbc8f69368cadd7cff587d9f255

                                      SHA256

                                      c14392aa5235f5d8627c753ab934dca738d5027d6d5259ef1e3048b747988ec9

                                      SHA512

                                      47f7639c82d4bb41397ca9e4e7a2a5a1ec75d1b0f3464532e2b4564f8d2b0beb043a8a7158e421cb52738b3e0ea3fdcab61e243d7760ca020312e2087acccb1a

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                      Filesize

                                      579B

                                      MD5

                                      46fa4f5f7344089589d117bd7599b3a9

                                      SHA1

                                      b6cc1fe19e527d4a372c97e4d195ed94eee40030

                                      SHA256

                                      223280d95a13f1af6af06459bbf230874500c212a2e16f63914eff3f22e8b57a

                                      SHA512

                                      6b680aedde7e806802652aab9ab31cb21438bc8756b063955e6f03bbbdf1273f7d47c40ec1a19fe27537afeb8d6cc219a246d31f7c6822b481649fe296e2a45c

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      1bdd2928dec9b553ea82348131b31d6b

                                      SHA1

                                      a950be01a3b0a6da9ccc9cea0165ad69a07e58bb

                                      SHA256

                                      9c13d27be8715c355514e61934949e1653043da1070f01dea8ee923ad1e3ff22

                                      SHA512

                                      c39fd17d28fe989eead194dcea07a07be7e13a401ea2dd1ca341bcf301f2b1bae09f990c1c7a6e4a26ff0a6c6cabd8257de29d99829845e0feeccfeba99e8560

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      190f30445c2a473adccac33c8ee87f70

                                      SHA1

                                      4037a1e2d8c74c77729f7e57a99e01a3f4239342

                                      SHA256

                                      20bdae6afd6683826784762c75d7e6ffa84710d94cea36d5b2c7d6338c30ba63

                                      SHA512

                                      07388c57acdbcd6b2c1a6e01d6208c5bce622075a9faf5ad2be231b511cb51f0eb541a907f7329c72676d317e8f378eb9b9a50dbfec3eb680cfb4f4ce541b957

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      0c770e53c6b18e46d2f747669d43b8a7

                                      SHA1

                                      56018caab2afebd3ad8944f21def73ad33586ebf

                                      SHA256

                                      22b0a9783fff815be3c08a9ae8c0bd8adce85eead3303a2ccf2ba8baadf798ee

                                      SHA512

                                      a92bd398bb7fd85786d73276758a56aa31f6d84780aafae92a0e1336aa60840d8f3fc8ac60c1bc5ecd1000866a7bb24b2f68e830badf79d2498aa6d218f3ebb7

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      5KB

                                      MD5

                                      a1e71ed198dc65c5f2f3db18154217e8

                                      SHA1

                                      e8c764f3d1d18eb6a55144fa4c9c9b220492d258

                                      SHA256

                                      a93a5e05f268e2bab9870843d4815f21495220089691157a06c1476efc19bd08

                                      SHA512

                                      7dd7849c246cdc2cd0190d08083c92d6353e243518d8e881ed5d669cf6af7209b05e16ecac908d9a4d43e387f82b3c4afd04be320e1902d03a1a8796405fa74a

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      0a313c65e39d4fa39917a52374ed04b7

                                      SHA1

                                      57ba0d3565505054c04feab79bfffd74797df881

                                      SHA256

                                      b0b32fe6635d2650cae45a1be4c1c877df64adb534d40c10264b57c2b8a43196

                                      SHA512

                                      94ce67d7e37a60f974bdcd8b8671ff1a2976c9939df5c5ee0e4e86392e31c54826d95cae31be5d34c8b2230e0676426d097e2ddb5f1d4ef1119307f4afe7f8ec

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      7fcf7a64ff80febdb6fa607fddd13976

                                      SHA1

                                      3a39ee56d2ed2cba8dba13a6833e071139bca8ec

                                      SHA256

                                      c507f2b8b8cc041d92fb7b5546a9c36c4c6b64d61fa8a69b9499ccd733f87b7f

                                      SHA512

                                      3062427501cd26bb66a1dcc9bdf728357b95abd98456cc25ce4f880e23f587876562b14b6803c7e113f501e3c81dbe2a51ae39abf11a1d0483538384cb6021dc

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                      Filesize

                                      1KB

                                      MD5

                                      b26204076e98e32a77817fda44e2fcaa

                                      SHA1

                                      6b77de4569d7e8093f819cd350c80caed045f8a3

                                      SHA256

                                      544822ba315167caf36f2c5ec8457ae60c7747b0f085505798582599c828662c

                                      SHA512

                                      3952f1fdc020818a0d8fdfa6935f6157a60fde12404deb3f6d1e0b4cd034e0287133af1af8ea5a4c5bbe3b4408d8c51b9d0480820fb96cdd5b1db03ba0340fbe

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57becc.TMP

                                      Filesize

                                      1KB

                                      MD5

                                      adda197fc2f8d843f175b4d39eea76b1

                                      SHA1

                                      3c21ea6fcd06e2dc821accfa6e4faa7a23eecb69

                                      SHA256

                                      0b4ff6a9a8c5fd0589edee4b680fd20684133cf03868a55fdda5a92e8db7d4af

                                      SHA512

                                      c2021674d2a73ddea40bddc4636c2a32fc62d4912ab7f228ef7442aa14bb0ac2bb897ef7daf22a64b9b034c683bdf923938b7d8901d9449106d356cfcb34f742

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                      Filesize

                                      16B

                                      MD5

                                      6752a1d65b201c13b62ea44016eb221f

                                      SHA1

                                      58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                      SHA256

                                      0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                      SHA512

                                      9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      11KB

                                      MD5

                                      d63290fa0e77242a2f313c271e9c8580

                                      SHA1

                                      b48f465e9a683033e124412e85742a93214b559e

                                      SHA256

                                      0c8a659aea6db41afcce2796b2232f6c22a3c21aac2faff024b5548dc0bb5b4e

                                      SHA512

                                      bc0982e9f83d7a650e2494e37a6dd062f6c8dc535775d0554cda29f1d31284413f8cd7c09b0f6dff0fe2faefb74aced17267071306db54c0c1d0737dc16bbcdc

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      11KB

                                      MD5

                                      54dacbf418c5453c872b7b29e995a509

                                      SHA1

                                      8bf840eaf1e3fe30bc667cf42553ee567313baec

                                      SHA256

                                      f0f70afb542526e9fce092c7c9c705004f4d49c23b61f2cc08edcbeff1d3d0c2

                                      SHA512

                                      0f8a1ca2a703c6e3f2e56df21b55cbc5062da35e770cd5f217a1807b7fc24b65cb0372358d2fb9ac461fed5473584d8820d7a9231c1020d5cdeb3b1375d3632b

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      12KB

                                      MD5

                                      14aabf959036fdbb45760f6755321b1a

                                      SHA1

                                      2bdc882d3ffed77e446c81a447664db636b61e96

                                      SHA256

                                      dca928fe6873812bc3d8de17ba5ae035bd73b264011a6f2e32dd2547ff8795f7

                                      SHA512

                                      4e852501bf1cc10edac0737309405946aa4d5bc1fd9e09eb9ac0b6742027f8da1448957f662574ac07c3451d1895061a5f12fa9ba94aefd5c7a921af336c8471

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      11KB

                                      MD5

                                      3e1768c2d95ad9bca279b6332b373825

                                      SHA1

                                      7f0d80c7e2be04817a3b3bb6877a4a50e04cbe78

                                      SHA256

                                      eb0c65d7810cde941b5eef565dcdc3ee198469cb060a4f5c9b6358827a0e13a4

                                      SHA512

                                      6ce6690d20707d9bde93e2ffa6d8deefe09c23e2a39ba5827f3314c34afbfe4625a03d3bf327e7bf980a4eb66468fbe1b0ecd7b785439e04ce1d2a9fd6088e85

                                    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{ACEF0268-0A8C-11EF-8ED9-4674C9374F07}.dat

                                      Filesize

                                      5KB

                                      MD5

                                      961f2814b1260a0bdc18b97bc28f8c4d

                                      SHA1

                                      7543e7484eea8a70eb98df826701808a4c529ba0

                                      SHA256

                                      8bf6ad0ed7212d1955b1bbbbe8f025900ad296bbb9ec10c25106065352f94647

                                      SHA512

                                      93f4dc0ae68d7daca78b5a6ad8be454b35cbe6f7431507c11fe97d93b939a2a425ec8ab987062909fc884905929d37799c79bd002caacc7d79a6af6ffa43a511

                                    • C:\Users\Admin\Downloads\Unconfirmed 344280.crdownload

                                      Filesize

                                      232KB

                                      MD5

                                      60fabd1a2509b59831876d5e2aa71a6b

                                      SHA1

                                      8b91f3c4f721cb04cc4974fc91056f397ae78faa

                                      SHA256

                                      1dacdc296fd6ef6ba817b184cce9901901c47c01d849adfa4222bfabfed61838

                                      SHA512

                                      3e842a7d47b32942adb936cae13293eddf1a6b860abcfe7422d0fb73098264cc95656b5c6d9980fad1bf8b5c277cd846c26acaba1bef441582caf34eb1e5295a

                                    • memory/6080-243-0x0000000005660000-0x000000000567A000-memory.dmp

                                      Filesize

                                      104KB

                                    • memory/6080-238-0x0000000010000000-0x0000000010010000-memory.dmp

                                      Filesize

                                      64KB