Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240708-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240708-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-07-2024 08:12

General

  • Target

    https://github.com/enginestein/Virus-Collection/blob/main/Windows/Binaries/Spyware/HawkEye.exe

Malware Config

Signatures

  • Chimera 64 IoCs

    Ransomware which infects local and network files, often distributed via Dropbox links.

  • Chimera Ransomware Loader DLL 1 IoCs

    Drops/unpacks executable file which resembles Chimera's Loader.dll.

  • Renames multiple (3263) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 27 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 64 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/enginestein/Virus-Collection/blob/main/Windows/Binaries/Spyware/HawkEye.exe
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4968
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xd8,0x114,0x7ffdf61c46f8,0x7ffdf61c4708,0x7ffdf61c4718
      2⤵
        PID:4208
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1860,16357912424887016480,2345296721958962745,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:2
        2⤵
          PID:3732
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1860,16357912424887016480,2345296721958962745,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1324
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1860,16357912424887016480,2345296721958962745,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2528 /prefetch:8
          2⤵
            PID:1424
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,16357912424887016480,2345296721958962745,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:1
            2⤵
              PID:1984
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,16357912424887016480,2345296721958962745,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:1
              2⤵
                PID:1660
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1860,16357912424887016480,2345296721958962745,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5520 /prefetch:8
                2⤵
                  PID:3464
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1860,16357912424887016480,2345296721958962745,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5520 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4324
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,16357912424887016480,2345296721958962745,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:1
                  2⤵
                    PID:2120
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,16357912424887016480,2345296721958962745,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:1
                    2⤵
                      PID:2312
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,16357912424887016480,2345296721958962745,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3544 /prefetch:1
                      2⤵
                        PID:1684
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,16357912424887016480,2345296721958962745,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:1
                        2⤵
                          PID:3472
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1860,16357912424887016480,2345296721958962745,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5544 /prefetch:8
                          2⤵
                            PID:1824
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,16357912424887016480,2345296721958962745,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:1
                            2⤵
                              PID:2392
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1860,16357912424887016480,2345296721958962745,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6208 /prefetch:8
                              2⤵
                                PID:4508
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1860,16357912424887016480,2345296721958962745,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6044 /prefetch:8
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:332
                              • C:\Users\Admin\Downloads\HawkEye.exe
                                "C:\Users\Admin\Downloads\HawkEye.exe"
                                2⤵
                                • Chimera
                                • Executes dropped EXE
                                • Drops desktop.ini file(s)
                                • Drops file in Program Files directory
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2308
                                • C:\Program Files\Internet Explorer\iexplore.exe
                                  "C:\Program Files\Internet Explorer\iexplore.exe" -k "C:\Users\Admin\Music\YOUR_FILES_ARE_ENCRYPTED.HTML"
                                  3⤵
                                  • Modifies Internet Explorer settings
                                  • Suspicious use of SetWindowsHookEx
                                  PID:3588
                                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3588 CREDAT:17410 /prefetch:2
                                    4⤵
                                    • Modifies Internet Explorer settings
                                    • Suspicious use of SetWindowsHookEx
                                    PID:5192
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:848
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:2008
                                • C:\Windows\system32\taskmgr.exe
                                  "C:\Windows\system32\taskmgr.exe" /0
                                  1⤵
                                  • Checks SCSI registry key(s)
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious behavior: GetForegroundWindowSpam
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of SendNotifyMessage
                                  PID:2872

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Program Files\Java\jdk-1.8\jre\lib\YOUR_FILES_ARE_ENCRYPTED.HTML

                                  Filesize

                                  4KB

                                  MD5

                                  cf67643da23a6af295373f17655047fc

                                  SHA1

                                  a0ebd8f29145b44b41d4554c910265c96828988e

                                  SHA256

                                  fba9a3f3ffbb723ec643714beaf2d72a8259a37c3bafb98f4f7c6119fd252e88

                                  SHA512

                                  f0f6a132afeab6b9927b32e2d8df58d8682e4d48112348e39f44cda723b4eb06deeb9184653fddb33162eeee023310e78c88fdaa4708bc81528cf5fb3258c189

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  97f8be9c465b0ed67c2415868506c354

                                  SHA1

                                  cdb221d6debcf55615d3b5f30796e32065046dd9

                                  SHA256

                                  b606a1ee10b65eb9077e7d2f3b34a0d7a1ed6a4802a169fe55449c975332ee02

                                  SHA512

                                  a0fe0ed30624658127316873137f4fc488a5916005e5e3f1f55b7d6442b54010c08d7037b94d0cf3c3316b1bb4acf91bad9e64ee6d15302e3cdd62bb18730542

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  6ae84fc1e66cbbb7e9d28b0e12d64550

                                  SHA1

                                  100430bb653c896c11b94ac0bf2297a389ea5ad8

                                  SHA256

                                  856a9c0ac8c29f738a3501b6bd007fd8cbbac211e461b91f4caff52dd41da75c

                                  SHA512

                                  7fe7a8639d96118b843e67a6a6d397271b181dc6b049e6f7de77bee9c9214690b1b7f73164f7e463e117406dc978334ea02397fd639140598f60f89c6aaddbe8

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                  Filesize

                                  2KB

                                  MD5

                                  d78659f59cc46aebd9ba7641c3767937

                                  SHA1

                                  602d54c1011f7ed3c36669ddd1222c7689ff2b26

                                  SHA256

                                  ca421a9317da83eefaaaeb8f0e70e9457b0620619b94833da3607b7849c20572

                                  SHA512

                                  19c9955ecd4b2e08590ba5b25cef06cf54319b98477c6c4f3ccfb810a6d49017947253a4c2b22597553d7e5f31d7c0622d3fd4ae911097a3ae314e25eba4a2b5

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                  Filesize

                                  579B

                                  MD5

                                  0a8a7c3dafeb4ad3d8cb846fc95b8f1c

                                  SHA1

                                  69e2b994e6882e1e783410dae53181984050fa13

                                  SHA256

                                  a88495f2c1c26c6c1d5690a29289467c8bb8a94bf6f4801d2c14da1456773f90

                                  SHA512

                                  2e59b4cd4cf6f86537aae4ae88e56e21abcff5070c5c1d1d2105a8e863523c80740438cc36b2b57672bc7bb7fb9387896135afcce534edfd4697fecf61031a5c

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  416d2848336bddb555eb28c7ed060405

                                  SHA1

                                  c5881d053910b7cb82f08e078f6e6d97b5dd884f

                                  SHA256

                                  a6b121fa047c17c089c60344127643f4a692b304f6f588a461ee0f8f96f617d7

                                  SHA512

                                  c26e344bfd25ccc4b53100d9a09e5852fb423a33dc38194eb687fb8712ae9cff7732edef1609477db4d2762c373e45a9b0b33a1ec7dff6a703b8d7ad182cfa94

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  0e1d6842160bcafea6c8f8d1de0c16de

                                  SHA1

                                  8b523258edfde17e6dabd2462ab05edffaf52f2d

                                  SHA256

                                  1b71f5aa265ccacda77b372b27536602d3940c97b1dd776280e9e30900c28c9f

                                  SHA512

                                  093e605edbd7c1c2e47261bfb3c0c2bbacd710ba313a0a31ff5c7584355578af0d75b7b3042bafe5552246fb32dd21dc0fc41919be8010e97ddc7f8a2fb00902

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  e4a47c238a11ece7cf637577da1dc01d

                                  SHA1

                                  64f358f3b6d7b308dfd057f2721c398ca760107b

                                  SHA256

                                  ba56a8a208b85a6f3fd81f8f58f06f3efd51fcce03d64b0a6fa752ac04bbcaa0

                                  SHA512

                                  a4550fd4662b656fbba8a11b55c70816128a61f7f39cb6ee2d172058bcaa974449e69d39f588ac0ddeaef9c55649d6ca67b52327dc7694680cd05e17511b0cfd

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  ce2b6d498a1ba069752946d70b9f1482

                                  SHA1

                                  b0e0da7fbbd0d3629faae24406318f6c5be45f8f

                                  SHA256

                                  cf9ee9b8c5d16b56cf29a3d9ac4a2ea1abcec22a08c63e4af6b6c8947bce412e

                                  SHA512

                                  27c9cbe2ca988ba00a3f5c8b2d498b761c98fd69616276f1138f3d85f74364ac204621fdbdc309e7be7b5d9d06c2d837ae35cb6b838fa108a5a2e34044234328

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                  Filesize

                                  1KB

                                  MD5

                                  bfb68820945effc40a0653151fa7457d

                                  SHA1

                                  1ab5778c41f41608d3063c45b15c5aa8413a455c

                                  SHA256

                                  379f709445b3382e504ac37789d02d65dc529fae7d7e46a01c61a4a85430b692

                                  SHA512

                                  7b4f8e5a53bd747cad0d8acf3dd14d87451533a1140181ae2ea0bc8d59dc17a0ad08448c79c1ef8a22b14505edbd1fcf0386eb0f2a4b114730ef6462431b6fb9

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe583c68.TMP

                                  Filesize

                                  874B

                                  MD5

                                  98a7e297eb71139d8a4931d8838ec29e

                                  SHA1

                                  2c3327d3063fca7d22cd9916f7c2e23ccc22b96a

                                  SHA256

                                  31766cd674c05bb23ac2637e554e5947946dc4c6402e3be7151014b958106581

                                  SHA512

                                  0c0ca638d0b9dcbf351d9925f794fa95477b57a4b02206f9a765443c7c6f60c9ff57661012395c2d934b44c21a6774c04b42661c8725a0d074e359f73f2f38f4

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                  Filesize

                                  16B

                                  MD5

                                  206702161f94c5cd39fadd03f4014d98

                                  SHA1

                                  bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                  SHA256

                                  1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                  SHA512

                                  0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                  Filesize

                                  16B

                                  MD5

                                  46295cac801e5d4857d09837238a6394

                                  SHA1

                                  44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                  SHA256

                                  0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                  SHA512

                                  8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  11KB

                                  MD5

                                  cb4311137144791ff9b480aca1ee662d

                                  SHA1

                                  5821130126376e817fd11cd9c2d63f1e9e4ce334

                                  SHA256

                                  144e5c4e3c0ad6a722ae936f5b7d0aad5f9f1deefa58477754889a19fe610673

                                  SHA512

                                  735dc938e97ba6235f4ce91de4252cb63169fe066eef6f3ddcbb0d3fff0e7faafc4501225e568ae9126ff7d382b6e84ffb9c6c8b5271d4bbc33cdb1ca6005a45

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  11KB

                                  MD5

                                  dcb01cf4f61c2f6f614d9cc42023542d

                                  SHA1

                                  a97078bd538d18f10422968afcc8849a1ff4b36b

                                  SHA256

                                  f0faf01750281bf0ec68285c520132acc0bd3a529b3a22a5cbfdc8fc0914aa69

                                  SHA512

                                  e4a2853420f3091dc84b399e520e65bb5119edc6a8231a505a7933755bbbe299e6910e6597cd518e9d7097c4442963221b28c58a5724cf27dd910b0b8faa0546

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  11KB

                                  MD5

                                  3b9026c8c7b556135d62529cbaaa5710

                                  SHA1

                                  b356adcdaf78172aaf6e264894a2ec4d06a441f6

                                  SHA256

                                  0450a107619584715c9560f0d7f2364b8cf6becb7a7993e992a3598295d73e9a

                                  SHA512

                                  cd9e0a85891f927ac39870df3c50a408cf55db3817755ddc8583332e6cf1ab7b6a1c7f7566427c6c1e2af01e124ac25a819ec273fcce6e08aa5a1801620fdf5d

                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\SBQGDSDR\suggestions[1].en-US

                                  Filesize

                                  17KB

                                  MD5

                                  5a34cb996293fde2cb7a4ac89587393a

                                  SHA1

                                  3c96c993500690d1a77873cd62bc639b3a10653f

                                  SHA256

                                  c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

                                  SHA512

                                  e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

                                • C:\Users\Admin\Downloads\Unconfirmed 740126.crdownload

                                  Filesize

                                  232KB

                                  MD5

                                  60fabd1a2509b59831876d5e2aa71a6b

                                  SHA1

                                  8b91f3c4f721cb04cc4974fc91056f397ae78faa

                                  SHA256

                                  1dacdc296fd6ef6ba817b184cce9901901c47c01d849adfa4222bfabfed61838

                                  SHA512

                                  3e842a7d47b32942adb936cae13293eddf1a6b860abcfe7422d0fb73098264cc95656b5c6d9980fad1bf8b5c277cd846c26acaba1bef441582caf34eb1e5295a

                                • memory/2308-226-0x0000000004AE0000-0x0000000004AFA000-memory.dmp

                                  Filesize

                                  104KB

                                • memory/2308-221-0x0000000010000000-0x0000000010010000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/2872-873-0x00000267AF370000-0x00000267AF371000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2872-882-0x00000267AF370000-0x00000267AF371000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2872-881-0x00000267AF370000-0x00000267AF371000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2872-880-0x00000267AF370000-0x00000267AF371000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2872-879-0x00000267AF370000-0x00000267AF371000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2872-883-0x00000267AF370000-0x00000267AF371000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2872-884-0x00000267AF370000-0x00000267AF371000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2872-885-0x00000267AF370000-0x00000267AF371000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2872-874-0x00000267AF370000-0x00000267AF371000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2872-875-0x00000267AF370000-0x00000267AF371000-memory.dmp

                                  Filesize

                                  4KB