Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-08-2024 17:56

General

  • Target

    https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Spyware/HawkEye.exe

Malware Config

Signatures

  • Chimera 64 IoCs

    Ransomware which infects local and network files, often distributed via Dropbox links.

  • Chimera Ransomware Loader DLL 1 IoCs

    Drops/unpacks executable file which resembles Chimera's Loader.dll.

  • Renames multiple (3265) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 27 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 16 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 42 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Spyware/HawkEye.exe
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3452
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffba3ef46f8,0x7ffba3ef4708,0x7ffba3ef4718
      2⤵
        PID:4812
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,15388268109339973090,14080432313494154702,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:2
        2⤵
          PID:3820
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,15388268109339973090,14080432313494154702,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2496 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:624
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,15388268109339973090,14080432313494154702,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2968 /prefetch:8
          2⤵
            PID:1772
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,15388268109339973090,14080432313494154702,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:1
            2⤵
              PID:2832
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,15388268109339973090,14080432313494154702,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:1
              2⤵
                PID:1544
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,15388268109339973090,14080432313494154702,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4892 /prefetch:8
                2⤵
                  PID:444
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,15388268109339973090,14080432313494154702,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4892 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1864
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,15388268109339973090,14080432313494154702,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:1
                  2⤵
                    PID:3976
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,15388268109339973090,14080432313494154702,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:1
                    2⤵
                      PID:3252
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,15388268109339973090,14080432313494154702,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:1
                      2⤵
                        PID:3096
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,15388268109339973090,14080432313494154702,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3508 /prefetch:1
                        2⤵
                          PID:2960
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,15388268109339973090,14080432313494154702,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4288 /prefetch:1
                          2⤵
                            PID:1704
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,15388268109339973090,14080432313494154702,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4000 /prefetch:1
                            2⤵
                              PID:5108
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,15388268109339973090,14080432313494154702,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:1
                              2⤵
                                PID:4544
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2040,15388268109339973090,14080432313494154702,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5084 /prefetch:8
                                2⤵
                                  PID:224
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,15388268109339973090,14080432313494154702,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:1
                                  2⤵
                                    PID:2224
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2040,15388268109339973090,14080432313494154702,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6116 /prefetch:8
                                    2⤵
                                      PID:2648
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2040,15388268109339973090,14080432313494154702,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6304 /prefetch:8
                                      2⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:3224
                                    • C:\Users\Admin\Downloads\HawkEye.exe
                                      "C:\Users\Admin\Downloads\HawkEye.exe"
                                      2⤵
                                      • Chimera
                                      • Executes dropped EXE
                                      • Drops desktop.ini file(s)
                                      • Drops file in Program Files directory
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3596
                                      • C:\Program Files\Internet Explorer\iexplore.exe
                                        "C:\Program Files\Internet Explorer\iexplore.exe" -k "C:\Users\Admin\Downloads\YOUR_FILES_ARE_ENCRYPTED.HTML"
                                        3⤵
                                        • Modifies Internet Explorer settings
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of SetWindowsHookEx
                                        PID:4860
                                        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4860 CREDAT:17410 /prefetch:2
                                          4⤵
                                          • System Location Discovery: System Language Discovery
                                          • Modifies Internet Explorer settings
                                          • Suspicious use of SetWindowsHookEx
                                          PID:116
                                    • C:\Users\Admin\Downloads\HawkEye.exe
                                      "C:\Users\Admin\Downloads\HawkEye.exe"
                                      2⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3936
                                    • C:\Users\Admin\Downloads\HawkEye.exe
                                      "C:\Users\Admin\Downloads\HawkEye.exe"
                                      2⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3536
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,15388268109339973090,14080432313494154702,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2736 /prefetch:2
                                      2⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:4736
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:3536
                                    • C:\Windows\System32\CompPkgSrv.exe
                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                      1⤵
                                        PID:560

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Program Files\Java\jdk-1.8\jre\lib\YOUR_FILES_ARE_ENCRYPTED.HTML

                                        Filesize

                                        4KB

                                        MD5

                                        12cf63c7eba6e7655ef6f508e53732da

                                        SHA1

                                        e5ad08f6aaecc72731e9cdab4b8db0740fe46fce

                                        SHA256

                                        42cf86876132d64830c914f0bd62d84231f88a5279b5b1a0a114cdffcfb390bf

                                        SHA512

                                        2f008daf135ad64484392369225961b60b976143ad0630e79186dea7022201bc19c287ad398709d46c8d36df945a4ad77f229b32d73c223f02d4b389ac196b16

                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\HawkEye.exe.log

                                        Filesize

                                        20B

                                        MD5

                                        b3ac9d09e3a47d5fd00c37e075a70ecb

                                        SHA1

                                        ad14e6d0e07b00bd10d77a06d68841b20675680b

                                        SHA256

                                        7a23c6e7ccd8811ecdf038d3a89d5c7d68ed37324bae2d4954125d9128fa9432

                                        SHA512

                                        09b609ee1061205aa45b3c954efc6c1a03c8fd6b3011ff88cf2c060e19b1d7fd51ee0cb9d02a39310125f3a66aa0146261bdee3d804f472034df711bc942e316

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                        Filesize

                                        152B

                                        MD5

                                        53bc70ecb115bdbabe67620c416fe9b3

                                        SHA1

                                        af66ec51a13a59639eaf54d62ff3b4f092bb2fc1

                                        SHA256

                                        b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771

                                        SHA512

                                        cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                        Filesize

                                        152B

                                        MD5

                                        e765f3d75e6b0e4a7119c8b14d47d8da

                                        SHA1

                                        cc9f7c7826c2e1a129e7d98884926076c3714fc0

                                        SHA256

                                        986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89

                                        SHA512

                                        a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                        Filesize

                                        1KB

                                        MD5

                                        425e8b8bf6f0707048fed085ac707b58

                                        SHA1

                                        0657c98b9e5419ccd1f0d0100f7052e0933796a7

                                        SHA256

                                        7b2ff00cbfdb2d10fae1d178f3e076705b81047c236e7c6924c5bcc904fcf4cb

                                        SHA512

                                        fecc27112a8fa551f2a0f1a604a57b02786bbb2520de71ec5f2e05893c734af369d62916a9f7e4ffb2328f054a706b62aaaa7ad2d405816d8db4873a980b63c8

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                        Filesize

                                        2KB

                                        MD5

                                        d7e55d713e799d3feb6e9f29f118163b

                                        SHA1

                                        802984647302be5903875255f4a56a7b9b234946

                                        SHA256

                                        336fb62ff27b2da1bd891934823f103f5a3f77f64d7154d7c7595797110ef92f

                                        SHA512

                                        8d26c435d25fc394806b06415212b476f0f237c1fd5adc310c39c6622c300e897d6cfe45e7af166d6d6039fa8517ef4b4886d23981de5f27dffbcdbbfb8f6bc8

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                        Filesize

                                        579B

                                        MD5

                                        552c94911b4d9413d92d5095a0c64b11

                                        SHA1

                                        e9fe0f0eebf35d168d2d889b5367fa7a12f299c2

                                        SHA256

                                        b687ba320a6689a39d8a01f8c10dc8e5d9f25465dbea04c2851d4d38e040fa5f

                                        SHA512

                                        1cd929ccb9992a26cc3b5c9210138d3f30a46f5388aa6a123dbde986956a74ddfb2d529b860fc3c924b6435197c175bd004bbe309834340c3ddf90484c7d8a5b

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                        Filesize

                                        111B

                                        MD5

                                        285252a2f6327d41eab203dc2f402c67

                                        SHA1

                                        acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                        SHA256

                                        5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                        SHA512

                                        11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        5KB

                                        MD5

                                        d5acc83fbbf64b7d2f9538ae845ed313

                                        SHA1

                                        3a77aed09b79632e69be000af3edc6f15f0bd0cb

                                        SHA256

                                        e70dc74fda4904665eb2934a7ddc0502240236f78e728ab8eae28e19f75fb859

                                        SHA512

                                        c5225d95aa6380073c2720191e43c0cba0eb9c6c83526b0d54b272e25d7cc64620818a44ae56c0955a12121881642e91b57ba77550c7922273f8d27a2739d84b

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        6KB

                                        MD5

                                        f18299574844d7270e2b433c271f7553

                                        SHA1

                                        b43c20fbe34be174ad0ca1e82469f837b37158dc

                                        SHA256

                                        12f7226518a4d7161ebf4a1a0b304ac7dec7177c73e4d4090f3547d82987f8e7

                                        SHA512

                                        3c3c8dc264ee08d37ec24c618aa42278049b7ba001266a28cad4348cbba73316aaadc92552b91b6db89879e101bad81f2679727aeca7dc97905e4a9e9813a68a

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        6KB

                                        MD5

                                        4756f90a61dc4ddecedcac18b66e880f

                                        SHA1

                                        d7608651f4f160f8249689fa9b1b91748ebcc113

                                        SHA256

                                        f3a27b007e3d2d51f96e55d36846ac6413c363a7e3970a6ffeba5048954d2794

                                        SHA512

                                        55e0ab2d97d495602a8c24b3e666ebff89fe48597e1898a1d81af376e7e43e62fb24e66a3787b7f54a6d8c57467bcdb8359df0c7851f7a2e707806c1bf8043cd

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        6KB

                                        MD5

                                        7314675f54e245d122599ef75f304f06

                                        SHA1

                                        9e01fdf05632a8561284573a5f79039e246e9a28

                                        SHA256

                                        46f1bf5d2a018d919456afc24dfc190c0920fac7797dde3009f4a073b85f82ae

                                        SHA512

                                        1cb0da2fced9aa250b775033d38607958f16fd31fec9da3e0bd09d7aa258516ad878896bb7db820f4b9e17028dfba7d10337aa4954d918c6262429eb9e362f4f

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        6KB

                                        MD5

                                        d18ca70b694e8e043eeb7dd62d03f473

                                        SHA1

                                        7202695184d76451c48181448bdc3671da1497bd

                                        SHA256

                                        9f345dfb409514db4a1ad8fae126d304e8d7780972315f55a6512a9a9cdf0a35

                                        SHA512

                                        116bde16b7ed4992a0a0edc467d53f8fbf5b632639ad264d5ff9ed7356a584abdac4027532399961cc037719bccf816a4759e8f4c9638a80fb021fc96beaffed

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                        Filesize

                                        1KB

                                        MD5

                                        e24018dbc5e13c8bd8d8f9f581a9e60e

                                        SHA1

                                        afd8cbc7ff3e35bc52279927a8489a3f54c8c61f

                                        SHA256

                                        7e4858e97211638fbe31549bbe38e0a3d664cba33ed38a0200812d185801b3f3

                                        SHA512

                                        790a9532da84a0e6b6cf709b92dc88c3138aad79d4f4343f013ef061d35a396d3830084bdd6e2ee1275cd38cd09ed237d5fb84c47d6aa84ac3e7a88ed8cc58be

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                        Filesize

                                        707B

                                        MD5

                                        417e5879d2f0ae6502bab58e2dfec460

                                        SHA1

                                        38e7bab89a8c30fcf83dba6e57d68da9a05a6187

                                        SHA256

                                        7224311cf95de4a4cfdd545704a60092ffc0dfa3041d80abd591fdeb19a1eff2

                                        SHA512

                                        c6c98653b93824c77b7cf56a6ab7e58a389690024490a569408f92112a34f2f75d7ced978990780d6110a501fa4954782c9bafaa20d06587b5aa2e046dc24aba

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                        Filesize

                                        874B

                                        MD5

                                        4efb40f55582411f1b4f732c152d9ce4

                                        SHA1

                                        f1275ef4c6c54405ec63d4594df622ec1433d317

                                        SHA256

                                        2383f0d32c840734b9fceae98021d86f69cfba3db5e2d1130ddc4fd6fad0305b

                                        SHA512

                                        1ecda37e135d5bf8b8ba0d3166e26a857d81a708ecd14d22289485664273c235909b4739dba74a9641b1b1c7dbd444a0c407c0bd2649b85c8df5e819f03d7d67

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe5845de.TMP

                                        Filesize

                                        371B

                                        MD5

                                        8fe6321f813f40fe699ea471c7f1a8a7

                                        SHA1

                                        822af0920379d0b71205f77a5e2fdf5c707150bf

                                        SHA256

                                        42679545806e76d9461c0c5853fd736aa7fe77062735bcd69aa78b6cfad779a6

                                        SHA512

                                        247e7b07cd8426ae18fddff6ab6b5c58b24e5b18281b799d0b7627b241a836282a22d6da139c5c042d42a199d42348ea1f8a4a462f01281673f6feb9e5bc02ed

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                        Filesize

                                        16B

                                        MD5

                                        6752a1d65b201c13b62ea44016eb221f

                                        SHA1

                                        58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                        SHA256

                                        0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                        SHA512

                                        9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                        Filesize

                                        9KB

                                        MD5

                                        c52f38d3e54d28063347deb182336d36

                                        SHA1

                                        66e925af2c632c1711cc209cbe160b12f429161e

                                        SHA256

                                        9286c8b8fdbba56b4029d37676f584bbb78334cb9d9abaeadfc9a3dbfb3e4070

                                        SHA512

                                        2e9978c5a6a222cb076c946818615a82308d1bf8c67d6cd0230d986e72420f827b6b4723ba65e4955fc4d41536427801f8163eda3fdf8e76a6e731bab9bee962

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                        Filesize

                                        8KB

                                        MD5

                                        276b445f2feb592b9baff006be13ed51

                                        SHA1

                                        ef941876c6c296df0ba131ae3123de9f61920c13

                                        SHA256

                                        8a5b25ac6d3becd08afeaffe5c1f6ba935339243a54787207134b34c3c8a22cf

                                        SHA512

                                        238b6956d6adb24e6440f3be374097d03415cf48f0c484c2970eb0fb75d03e576c19143678322366d64dc1c8c6e71371441b4352e85da262fd55376a29bcec08

                                      • C:\Users\Admin\Downloads\Unconfirmed 511130.crdownload

                                        Filesize

                                        232KB

                                        MD5

                                        60fabd1a2509b59831876d5e2aa71a6b

                                        SHA1

                                        8b91f3c4f721cb04cc4974fc91056f397ae78faa

                                        SHA256

                                        1dacdc296fd6ef6ba817b184cce9901901c47c01d849adfa4222bfabfed61838

                                        SHA512

                                        3e842a7d47b32942adb936cae13293eddf1a6b860abcfe7422d0fb73098264cc95656b5c6d9980fad1bf8b5c277cd846c26acaba1bef441582caf34eb1e5295a

                                      • memory/3596-331-0x0000000010000000-0x0000000010010000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/3596-336-0x0000000005380000-0x000000000539A000-memory.dmp

                                        Filesize

                                        104KB