Analysis

  • max time kernel
    113s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-08-2024 19:32

General

  • Target

    The-MALWARE-Repo

  • Size

    296KB

  • MD5

    3b4c9813b9b4d3cdd4323d05ec9f43f7

  • SHA1

    c969b185309f49b508110bb1782f597dff1ecbf9

  • SHA256

    9165ba41f87182c5d0b35d44da7f57bae304dd7e148dbd3b8803bf772b69ed02

  • SHA512

    777c8f18984bb5698ddaf5413b9a7c22a1b67b14178ec3c56a652e849218f7084c4e18858c868dfa1669ab3e1b2a54e11690b50d6fc0a94f00f78850abb97261

  • SSDEEP

    6144:adfo4Q3uokeOvHS1d1+sNs8wbiWQQ9DvZJT3CqbMrhryf65NRPaCieMjAkvCJv1Y:ao4Q3uokeOvHS1d1+sNs8wbiWQQ9DvZT

Malware Config

Signatures

  • Chimera 64 IoCs

    Ransomware which infects local and network files, often distributed via Dropbox links.

  • Chimera Ransomware Loader DLL 1 IoCs

    Drops/unpacks executable file which resembles Chimera's Loader.dll.

  • Renames multiple (3273) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 27 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 16 IoCs
  • Modifies data under HKEY_USERS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 60 IoCs
  • Suspicious use of SendNotifyMessage 48 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo
    1⤵
      PID:3600
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4992
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff8e042cc40,0x7ff8e042cc4c,0x7ff8e042cc58
        2⤵
          PID:2904
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1888,i,18438520423198718694,8952912525716881676,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1884 /prefetch:2
          2⤵
            PID:3284
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1820,i,18438520423198718694,8952912525716881676,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1916 /prefetch:3
            2⤵
              PID:3560
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,18438520423198718694,8952912525716881676,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2260 /prefetch:8
              2⤵
                PID:3552
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3148,i,18438520423198718694,8952912525716881676,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3156 /prefetch:1
                2⤵
                  PID:3540
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3176,i,18438520423198718694,8952912525716881676,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3196 /prefetch:1
                  2⤵
                    PID:544
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3712,i,18438520423198718694,8952912525716881676,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4512 /prefetch:1
                    2⤵
                      PID:2068
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4888,i,18438520423198718694,8952912525716881676,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4884 /prefetch:8
                      2⤵
                        PID:2592
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4992,i,18438520423198718694,8952912525716881676,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5044 /prefetch:8
                        2⤵
                          PID:4772
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4684,i,18438520423198718694,8952912525716881676,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4924 /prefetch:1
                          2⤵
                            PID:1304
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=3264,i,18438520423198718694,8952912525716881676,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3228 /prefetch:8
                            2⤵
                              PID:2312
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=3404,i,18438520423198718694,8952912525716881676,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5248 /prefetch:8
                              2⤵
                                PID:536
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=3288,i,18438520423198718694,8952912525716881676,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5512 /prefetch:8
                                2⤵
                                  PID:1144
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1128,i,18438520423198718694,8952912525716881676,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5588 /prefetch:8
                                  2⤵
                                    PID:1296
                                  • C:\Users\Admin\Downloads\HawkEye.exe
                                    "C:\Users\Admin\Downloads\HawkEye.exe"
                                    2⤵
                                    • Chimera
                                    • Executes dropped EXE
                                    • Drops desktop.ini file(s)
                                    • Drops file in Program Files directory
                                    • System Location Discovery: System Language Discovery
                                    PID:3828
                                    • C:\Program Files\Internet Explorer\iexplore.exe
                                      "C:\Program Files\Internet Explorer\iexplore.exe" -k "C:\Users\Admin\Music\YOUR_FILES_ARE_ENCRYPTED.HTML"
                                      3⤵
                                      • Modifies Internet Explorer settings
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SetWindowsHookEx
                                      PID:5636
                                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5636 CREDAT:17410 /prefetch:2
                                        4⤵
                                        • System Location Discovery: System Language Discovery
                                        • Modifies Internet Explorer settings
                                        • Suspicious use of SetWindowsHookEx
                                        PID:5760
                                • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                  "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                  1⤵
                                    PID:3892
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                    1⤵
                                      PID:3468
                                    • C:\Windows\System32\rundll32.exe
                                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                      1⤵
                                        PID:1228
                                      • C:\Users\Admin\Downloads\HawkEye.exe
                                        "C:\Users\Admin\Downloads\HawkEye.exe"
                                        1⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        PID:384
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Downloads\YOUR_FILES_ARE_ENCRYPTED.HTML
                                        1⤵
                                        • Enumerates system info in registry
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of SendNotifyMessage
                                        PID:4892
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff8d16046f8,0x7ff8d1604708,0x7ff8d1604718
                                          2⤵
                                            PID:1280
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,6468673889146453160,15121579301056109363,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:2
                                            2⤵
                                              PID:3016
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,6468673889146453160,15121579301056109363,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:3
                                              2⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:2992
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,6468673889146453160,15121579301056109363,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:8
                                              2⤵
                                                PID:2844
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,6468673889146453160,15121579301056109363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:1
                                                2⤵
                                                  PID:552
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,6468673889146453160,15121579301056109363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:1
                                                  2⤵
                                                    PID:428
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,6468673889146453160,15121579301056109363,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 /prefetch:8
                                                    2⤵
                                                      PID:4388
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,6468673889146453160,15121579301056109363,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 /prefetch:8
                                                      2⤵
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:1452
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,6468673889146453160,15121579301056109363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:1
                                                      2⤵
                                                        PID:5832
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,6468673889146453160,15121579301056109363,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:1
                                                        2⤵
                                                          PID:5800
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,6468673889146453160,15121579301056109363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3592 /prefetch:1
                                                          2⤵
                                                            PID:2336
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,6468673889146453160,15121579301056109363,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3544 /prefetch:1
                                                            2⤵
                                                              PID:5248
                                                          • C:\Windows\System32\CompPkgSrv.exe
                                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                            1⤵
                                                              PID:1312
                                                            • C:\Windows\System32\CompPkgSrv.exe
                                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                              1⤵
                                                                PID:2112

                                                              Network

                                                              MITRE ATT&CK Enterprise v15

                                                              Replay Monitor

                                                              Loading Replay Monitor...

                                                              Downloads

                                                              • C:\Program Files\Java\jdk-1.8\jre\lib\YOUR_FILES_ARE_ENCRYPTED.HTML

                                                                Filesize

                                                                4KB

                                                                MD5

                                                                587321cbb690748a793595aba86a75e9

                                                                SHA1

                                                                e14359d4ee1cfeaa19f7c8b47b840e394bb1b970

                                                                SHA256

                                                                d9a618a975435da48d953778dd0a321c6f9f025436ba381e91acb876e077a9c2

                                                                SHA512

                                                                4bd9c2e78a67b5d64a46f9c10f9f964ff856c0651cab0fce789285b0bd42495b4508bc29e424fbb083b8b8528a41ce83faa330c568707e3017abb486ad1b071b

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                Filesize

                                                                2KB

                                                                MD5

                                                                a573b52cf013126f421699955150d7b5

                                                                SHA1

                                                                1706b5ef16d5ee7232f3a0d6e9db8dc50ab07375

                                                                SHA256

                                                                d63dbbfb80da24923e34e348c971e57f3bcdb560d823abdc609d4b6c30faed8f

                                                                SHA512

                                                                40e5196a4eb8f0e51a94442096e206d2b0c62c5748525a1fabdfe87377529396ae726eaaf725fc817cadeafd463cf09d95c714c1a8640ea6b94ee7f200c82460

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                e6c53cfda5a764a5d67bbfd2ed2ad735

                                                                SHA1

                                                                3526f7fe91ea736e4030ce1ffd8e16f18495bea1

                                                                SHA256

                                                                bb2c32c1a405e5492d9eeebdf0cbc7a6f4561d6d3ab694c3c308edfbe9c79e10

                                                                SHA512

                                                                76e631b134548d1ac329033c1ff850b387148202b7fc4817617a46377d7254500dca70a98d31a1e0f5d6c5f9b7530f8af909b3404d1897ce2f22fc6e73e942c4

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                                Filesize

                                                                2KB

                                                                MD5

                                                                f649e702694177499b7fa97c7d88138e

                                                                SHA1

                                                                dbd2a332cfa03a538c65297815ac6bbc4f1c4359

                                                                SHA256

                                                                4013cf95af3d24f4130cc67f57d4960b07f5e4ec3c0fba906c6aa55080417039

                                                                SHA512

                                                                4b0df7312c56247cbf3b71683b80b2814dcfd3da3881c280997104f6c58e5e5914face1d904d85b4e68dbf489926756844482a0d56425ef6e7870eef9b9b91bd

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                Filesize

                                                                2B

                                                                MD5

                                                                d751713988987e9331980363e24189ce

                                                                SHA1

                                                                97d170e1550eee4afc0af065b78cda302a97674c

                                                                SHA256

                                                                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                SHA512

                                                                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                Filesize

                                                                356B

                                                                MD5

                                                                90164f149c3bed2f25fc5952f6cf319f

                                                                SHA1

                                                                b6fb5ff91bece961aa130ef16336cd7c4d93ab73

                                                                SHA256

                                                                40c54458d9d886ed185c0af550e306aa6e3a5213cc3cdb40692fd6c01975c568

                                                                SHA512

                                                                cb8514388a1d9ff8b391815f3fd461b5edc20620ecbebd8d05d2b590b18bf7ecf0d78e6ac9249e7f18adecfa9e71aaa9737fb41a645ac2d4072194cc342126c2

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                d4d0ff6edc5ae1f389a75fd6188fcd21

                                                                SHA1

                                                                1d4ac6f3fdf6f350262845fe4ca01915b06f75f7

                                                                SHA256

                                                                ce8f006aa610e9b8999e41ac1973cd07a7215a6fac195f094777bbbb68de800e

                                                                SHA512

                                                                bade7464c6d55b98f0a22cdf6ce4018217d7ad7990241e67873a65f894c7897892f65c10971611bc9b964643798409601b010624d9c8ddf814079d6c7eeaac93

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                6ef3ef695ff70263f9f060d27a76a373

                                                                SHA1

                                                                746c2bdca0936b7e1ab3466d3e30a7ee71aa8db0

                                                                SHA256

                                                                ba9a71f86d5d1599bda81eebe42738a4c3ed7081f069189a38965b689a98bd01

                                                                SHA512

                                                                fd4f7a39ae2664cd4eaaf52b8aaa94b89311e80e422dc9c0a3cc6632376423540938cac9fd35827f10e841fef41b578808247aedb84cf03e14184c5241ec7992

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                afe1cc186fa08e737d1b251be6f1a922

                                                                SHA1

                                                                8bde3afdac56e8b99de8fd826936e2fa76c6fc69

                                                                SHA256

                                                                a6163cbd2de417493f68ceda0f9853fdba01718059b946718fad6f4a461dac46

                                                                SHA512

                                                                e217dbc85f80a6884b508231907449f5670bb0ba3b36531dd923c0561f65d29ed12b3789829dc0f544efed95bec049da4cd52c200ab3f03c70c2a570986a3a9d

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                Filesize

                                                                8KB

                                                                MD5

                                                                f747aaafbdfe02aa08de11cc1d16ae54

                                                                SHA1

                                                                9b1716065872af46d0a3a54ea403bb7c7e60d47d

                                                                SHA256

                                                                a579f3b15643524a1cf719d74589c2926f3c67dd8433dad4e041cfab65881549

                                                                SHA512

                                                                ac330932b2311df57da9a1062ca28cb04a6491944e05733795a8808eccafed4a1158ad8e603c8a217af3eafa03c99f9045635d4837020dbffcbbf66973a59db9

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                Filesize

                                                                7KB

                                                                MD5

                                                                a3aa7a58a7cfa585b097cb5eb84beb04

                                                                SHA1

                                                                d9c293f12b2f103c9376fe352820516df5a50097

                                                                SHA256

                                                                ffe516e4db0e2c0b729332567287bd19cfbcd34bb48bb7694a7a97640c8a976c

                                                                SHA512

                                                                7f17fef4a836f42d55c4257ebb1ee94a898160a623fba6821baaba14b0e17f0190a35e42796664a784e0fe4ee9c2db5bf7398fdc7e218bccc798d49e4018559b

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                Filesize

                                                                8KB

                                                                MD5

                                                                d28e852c17f9088cba2067e7f0fb75b0

                                                                SHA1

                                                                57b785c22cb281071a1b8f12dc015c2653f9156e

                                                                SHA256

                                                                4ef8a6b4273e50a5ae3d2b2a0db31b602a8cecd8e812df532c46832a668d053a

                                                                SHA512

                                                                36de3bf0b770737c439e0f78d0a6d846db4114dfca92fe7dd13e47e2404f0ddfd3843ef1af8270650387386dbafd3957aaabda5e175738be69ced03ebaf4fd9a

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                Filesize

                                                                9KB

                                                                MD5

                                                                74622a802f749ce6476cf7cd7df9bf45

                                                                SHA1

                                                                c17ceac58a1389f8cb0da0671974df646a789d7c

                                                                SHA256

                                                                d81b77ec0339d8bcd0fc42af35eaedc427ce60f1b6294184e186b34a2851afe5

                                                                SHA512

                                                                c207d9c303e50dbc1702ceed106168745f19e77c638bcbc98d47d7781c5657e6a735a4f87ae54e7f5ae29112fc4e187695f0a987a2ec602dceddd05bca0b4076

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                Filesize

                                                                9KB

                                                                MD5

                                                                26e2d5c99c712be31b7f44adf5fa8aae

                                                                SHA1

                                                                0c6a07a4dcef92f9adec343ab2658fe89ccfe04d

                                                                SHA256

                                                                e3000b232087f407c420b48422dd8a021d27f31d9acf4d59b8b00d8b0069eee5

                                                                SHA512

                                                                31594089df9cfa04799e5c2759b01d22e64cf61f5eec539b96409260def1918f7dbe67c661f7bc61be4fd5aef29f453b8d83c0327f423f9f1a52878cab2fca59

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                Filesize

                                                                9KB

                                                                MD5

                                                                f910b76e284dd281378aa93d61c028e6

                                                                SHA1

                                                                d97c385efb79c443b9b21920dad29ebab78d15ea

                                                                SHA256

                                                                4802c8d2983d3d2e1ac0a44bc177fc8fdb6fb124aebf9ca7b3f175a15fcc8f29

                                                                SHA512

                                                                987a0c198d68b95bac76270872ca607644b7af15da3207b590a3e76e8a221cee6b7362e9dfd7e22be6f296a39c8896392b5dd0d37045dc8cb27d81e802b5eebd

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                Filesize

                                                                7KB

                                                                MD5

                                                                f513613eb6b423e4b5ecb42c7babc29d

                                                                SHA1

                                                                65937e15a9380ed89e877859c7708dd7ba34549d

                                                                SHA256

                                                                20551f4fed55aa516d12adcde34e623f3ccebb774eba4a9ae30242d8705e7f47

                                                                SHA512

                                                                6adf73d8e24875ddd20139efcce3de8c39804df63b012f445e82177a156130e59ed5aaffc084f33d0b28704665b17c7ca5186d204da0f2fc6aaa6660cacb9013

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                Filesize

                                                                195KB

                                                                MD5

                                                                a0781f7fdff82fda1162df23c63782e0

                                                                SHA1

                                                                8e8e4688c216fd9704347c9b889f7c6b218c8b52

                                                                SHA256

                                                                ed8d13d6b5c69c7fdb62668a6d9b5a43822b689d411cddf1515a2a0cc45d100d

                                                                SHA512

                                                                d409e2ad3faa1b4b7c0a2d31ddd05cddfd0c5a0fcbbd18e985d919c9ee2cf56fcddc1670ee56cef102ca7a2d4940fc3bc27d2b575135554db0a66fc0c39f7d95

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                Filesize

                                                                195KB

                                                                MD5

                                                                04f5265820209cdbc0e86d3e7086df78

                                                                SHA1

                                                                70824c2fa8ff02043fea4b2c838d76cba6317d4e

                                                                SHA256

                                                                32aab3baa6e3b95c10de1dcee2267a2f54b4f39e92034d6537e86cbcb6a27281

                                                                SHA512

                                                                8d877ff2f0e9c87df4bb6f356951bbc1278dc4d0af6c289333e13735d355760b2814cead61df90ee3d14210b872b26e2ad34e8b27c1b48d722aa4733bc94a3c1

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                Filesize

                                                                152B

                                                                MD5

                                                                b9569e123772ae290f9bac07e0d31748

                                                                SHA1

                                                                5806ed9b301d4178a959b26d7b7ccf2c0abc6741

                                                                SHA256

                                                                20ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b

                                                                SHA512

                                                                cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                Filesize

                                                                152B

                                                                MD5

                                                                eeaa8087eba2f63f31e599f6a7b46ef4

                                                                SHA1

                                                                f639519deee0766a39cfe258d2ac48e3a9d5ac03

                                                                SHA256

                                                                50fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9

                                                                SHA512

                                                                eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                Filesize

                                                                6KB

                                                                MD5

                                                                617894887059a6a31ba908b9390af05f

                                                                SHA1

                                                                39bcbe6f8a134595f2208bf67fc8aa56b28017b1

                                                                SHA256

                                                                4adc9315ebe1ccb63c6f4c897a680d09cedbe2fb6bf89e8c052dc9166fdf3498

                                                                SHA512

                                                                495ea2ac337fa8985f42df70f47e8c8fb86a3fd6911793fa614c91c7869aa2cd8e3ae993b2ac590fe907e8db6bfcd2b216e9e22ef534945d168a510d3c2b9709

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                Filesize

                                                                6KB

                                                                MD5

                                                                8468fdccf3a45ab8308c14c8fb67838f

                                                                SHA1

                                                                49785cb164d0b82a0e2a3aba39f0e5b00efa9405

                                                                SHA256

                                                                94d8c9527c628c4eb5d928ff46ad6bd8b378158f65837c66af1a9fbf4da636f6

                                                                SHA512

                                                                422b38ad7e4341e0ac364317b6a623086b60cfbcb9b59cc32d638173f45d77a10bdf05a5541ef6412bf894d337005e1b0ef676b6cd8d473076615f9fe58b31ef

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                Filesize

                                                                16B

                                                                MD5

                                                                6752a1d65b201c13b62ea44016eb221f

                                                                SHA1

                                                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                SHA256

                                                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                SHA512

                                                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                Filesize

                                                                10KB

                                                                MD5

                                                                c74afc38dafe2308632917b87aca788d

                                                                SHA1

                                                                8f64262d22fca1f42c27d189a7c23747e4497b36

                                                                SHA256

                                                                5a5779d741c175e729659b53df83d2899b39c6d51bab839e6e9caf1ac55d7fb8

                                                                SHA512

                                                                2a4950edf5f67b38035e98bfb2763fe804935853701101f46af292e41de28b60b704a1bbbed51346f52dc86491849c0e642c6947a560ccb1c585c12ded5ad5ba

                                                              • C:\Users\Admin\Downloads\HawkEye.exe

                                                                Filesize

                                                                232KB

                                                                MD5

                                                                60fabd1a2509b59831876d5e2aa71a6b

                                                                SHA1

                                                                8b91f3c4f721cb04cc4974fc91056f397ae78faa

                                                                SHA256

                                                                1dacdc296fd6ef6ba817b184cce9901901c47c01d849adfa4222bfabfed61838

                                                                SHA512

                                                                3e842a7d47b32942adb936cae13293eddf1a6b860abcfe7422d0fb73098264cc95656b5c6d9980fad1bf8b5c277cd846c26acaba1bef441582caf34eb1e5295a

                                                              • memory/3828-310-0x0000000010000000-0x0000000010010000-memory.dmp

                                                                Filesize

                                                                64KB

                                                              • memory/3828-3244-0x00000000752C2000-0x00000000752C3000-memory.dmp

                                                                Filesize

                                                                4KB

                                                              • memory/3828-3269-0x00000000752C0000-0x0000000075871000-memory.dmp

                                                                Filesize

                                                                5.7MB

                                                              • memory/3828-316-0x0000000004F80000-0x0000000004F9A000-memory.dmp

                                                                Filesize

                                                                104KB

                                                              • memory/3828-315-0x00000000752C0000-0x0000000075871000-memory.dmp

                                                                Filesize

                                                                5.7MB

                                                              • memory/3828-289-0x00000000752C2000-0x00000000752C3000-memory.dmp

                                                                Filesize

                                                                4KB

                                                              • memory/3828-300-0x00000000752C0000-0x0000000075871000-memory.dmp

                                                                Filesize

                                                                5.7MB

                                                              • memory/3828-299-0x00000000752C0000-0x0000000075871000-memory.dmp

                                                                Filesize

                                                                5.7MB