Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    17/08/2024, 17:56

General

  • Target

    https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Spyware/HawkEye.exe

Malware Config

Signatures

  • Chimera 64 IoCs

    Ransomware which infects local and network files, often distributed via Dropbox links.

  • Chimera Ransomware Loader DLL 1 IoCs

    Drops/unpacks executable file which resembles Chimera's Loader.dll.

  • Renames multiple (933) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 64 IoCs
  • Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs

    When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 39 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Spyware/HawkEye.exe
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4528
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa1cd23cb8,0x7ffa1cd23cc8,0x7ffa1cd23cd8
      2⤵
        PID:1864
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1884,2070765843335429203,17368932091731582060,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1904 /prefetch:2
        2⤵
          PID:1408
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1884,2070765843335429203,17368932091731582060,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:72
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1884,2070765843335429203,17368932091731582060,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:8
          2⤵
            PID:2944
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,2070765843335429203,17368932091731582060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:1
            2⤵
              PID:1064
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,2070765843335429203,17368932091731582060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:1
              2⤵
                PID:776
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1884,2070765843335429203,17368932091731582060,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6020 /prefetch:8
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:3972
              • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1884,2070765843335429203,17368932091731582060,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5012 /prefetch:8
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:4284
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,2070765843335429203,17368932091731582060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1872 /prefetch:1
                2⤵
                  PID:2444
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,2070765843335429203,17368932091731582060,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6024 /prefetch:1
                  2⤵
                    PID:4796
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,2070765843335429203,17368932091731582060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:1
                    2⤵
                      PID:2084
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,2070765843335429203,17368932091731582060,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:1
                      2⤵
                        PID:1620
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1884,2070765843335429203,17368932091731582060,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4636 /prefetch:2
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2636
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,2070765843335429203,17368932091731582060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:1
                        2⤵
                          PID:4680
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1884,2070765843335429203,17368932091731582060,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6216 /prefetch:8
                          2⤵
                            PID:1060
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1884,2070765843335429203,17368932091731582060,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4972 /prefetch:8
                            2⤵
                            • Subvert Trust Controls: Mark-of-the-Web Bypass
                            • NTFS ADS
                            • Suspicious behavior: EnumeratesProcesses
                            PID:1264
                          • C:\Users\Admin\Downloads\HawkEye.exe
                            "C:\Users\Admin\Downloads\HawkEye.exe"
                            2⤵
                            • Chimera
                            • Executes dropped EXE
                            • Drops desktop.ini file(s)
                            • Drops file in Program Files directory
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3604
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:4768
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:4788

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Program Files\Java\jdk-1.8\jre\lib\YOUR_FILES_ARE_ENCRYPTED.HTML

                              Filesize

                              4KB

                              MD5

                              a71533aed10259910d6bb6bbc4bdfefa

                              SHA1

                              d2b60eab890b6a25bd7d965b9b24240f68319c8e

                              SHA256

                              3fe3177341ea37d82e47058afe37c08490723177c2e4f13a26304f0c49e61f50

                              SHA512

                              dd0c4405430964c27d3641d17019b9aac418634770eba22b5d63721e2e5b43bf13f416193e95b78a6e4964dc51c29d3ef12f54ed92b308f6a93287c0b0197a78

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              0487ced0fdfd8d7a8e717211fcd7d709

                              SHA1

                              598605311b8ef24b0a2ba2ccfedeecabe7fec901

                              SHA256

                              76693c580fd4aadce2419a1b80795bb4ff78d70c1fd4330e777e04159023f571

                              SHA512

                              16e1c6e9373b6d5155310f64bb71979601852f18ee3081385c17ffb943ab078ce27cd665fb8d6f3bcc6b98c8325b33403571449fad044e22aa50a3bf52366993

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              5578283903c07cc737a43625e2cbb093

                              SHA1

                              f438ad2bef7125e928fcde43082a20457f5df159

                              SHA256

                              7268c7d8375d50096fd5f773a0685ac724c6c2aece7dc273c7eb96b28e2935b2

                              SHA512

                              3b29531c0bcc70bfc0b1af147fe64ce0a7c4d3cbadd2dbc58d8937a8291daae320206deb0eb2046c3ffad27e01af5aceca4708539389da102bff4680afaa1601

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                              Filesize

                              2KB

                              MD5

                              fe2336a86f6de80c965e4f4a50305c4f

                              SHA1

                              dd374e93b9e64303502df0e3483b7867195d4ba6

                              SHA256

                              5c3507b1086c510f636a5f3a4540ba13b438d0f6cef0d2e441e0f018d4ae073f

                              SHA512

                              7507d1da90e991c935d3f2945587b340fcfbe838989a1044aba518cc2b0984b09db15609cec2fbf7333332960890b4b9a14be30411166b8b1cfc8f7c23a0833f

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                              Filesize

                              111B

                              MD5

                              807419ca9a4734feaf8d8563a003b048

                              SHA1

                              a723c7d60a65886ffa068711f1e900ccc85922a6

                              SHA256

                              aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631

                              SHA512

                              f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                              Filesize

                              496B

                              MD5

                              400254bc74a940e106ef367c6d86b29d

                              SHA1

                              6868b379c43d1e7afb4f734922451768bb73b579

                              SHA256

                              545504b1d8e2aa9643ef341737938d9dfb25c195040529a02024180e9c2ddbe1

                              SHA512

                              aa5d1d47b172ee28efdbae8621446360b67a72d10a12e595a00123d66b95935aba054fe2018c676717799a5d0886802fdca4e5ca1fced462c143519e70a58bea

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              e76a93dece57ea93363fb07619095499

                              SHA1

                              eaac84528e1357ae8f6fb77eecff90ec16c91355

                              SHA256

                              74962bc1cae0ae0935f609e40d37fdc432dc3005e83613d5427244674bc3bdad

                              SHA512

                              edd2f1a6e129bbf03b6810f8a00eea05f6c5d6fc59a6f7cb48f724e67246fab7c27330a7d0e22bd8cebee9cd2ecdf4ebcd3c3dd38036d902b25d06f009ee9b3e

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              969066a89fcc5108c8452d68d693ca55

                              SHA1

                              b200b0e54021b062a5918cb87b326573bb0e039b

                              SHA256

                              77321751e3d15c696fbb2e2991f478f2afd8e4fa7215f4cd22141448a29f8c24

                              SHA512

                              8cfd9ee6daee99aa24cd8f29c34ee9a47ff467ab22053fd85c90fe3b2cee2eb012affdef87a11799bd34ff3aa81462b24ecba1af12c2d38055eff03ad60773fe

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              60933c4615a5fb06bc191d60c8a4c759

                              SHA1

                              3a0666746ff84002159122b4e143fefe8f0937ea

                              SHA256

                              b6eda89cc2710eb081325bcda757c1b51e5363b0ace445fda4231f82bec4e86d

                              SHA512

                              1c9870296121df00437511fff4dcd32814bc754ba5eb246e90bfce9658eba8f6384f991db36f3aae3bd8faf86524e2833bf0ff3d21534207018651e6a107ba5c

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                              Filesize

                              371B

                              MD5

                              5e7bb1c331bc95447cdc3529846cebd2

                              SHA1

                              ff1a489ff8996533d25b396ece83f53b29a26b20

                              SHA256

                              da5d5b6e573596b71d9a70587701bad057be87bbcad80c078162f4ffa99e7d79

                              SHA512

                              e13dc36aa44381b78f03a23d342ff9dee3c8f6406c369c00a134e00c23f4d5e6b49b25894636eddedb7a57b247e934ad8d03ee633b934503fea607e23286826e

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                              Filesize

                              1KB

                              MD5

                              974614c05a25b93cafb3fc2356e03377

                              SHA1

                              2c4f606a448f6aba7d535b7dad700626970058d4

                              SHA256

                              568102842e2652ecc8345c6be08acf370471da2dab96f4c0ad8ef19069ddecc4

                              SHA512

                              f250bc29a8bfecc335e2143f22f90a17cd9760740673075a19db44d517e733896a53b2c57ff7a26df326b1e31faf74a17cbb8306d353f5797bb38c9d35272b2e

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                              Filesize

                              874B

                              MD5

                              67206e4a36c6ffccc474d7da9360139f

                              SHA1

                              12fa2b9f4673a271445c63ceb99198b5e85ccfef

                              SHA256

                              f3e5c434c1ff401d9220ac0a19ea2e1b1fa2e62810acd276a2aff558c7689f46

                              SHA512

                              28cc84d5a7cfa0afabc80078f09fb92af749beb85cd20474e897012b05bee9bbb6a7cc739398a6c84a1ac69f2547098e7f856a6f2773205b6566503ec2ad5ff2

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe581604.TMP

                              Filesize

                              371B

                              MD5

                              0912fd8e40d270fc0634bac779213f6b

                              SHA1

                              4a105023670a01ce19bc0e618ab0a9baa3149de9

                              SHA256

                              99b86076a52a285de1fcf8af7ab847cb5762e3b1735f25f2957c0ec872977ca6

                              SHA512

                              df347a65f8fa9f971e19c5b0c34c6f3650ce391e231f8de56978213b584137e6209355ed64df565b123f2c28cd1e4e7217966f77360d925a51d4ece89fee8b67

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                              Filesize

                              16B

                              MD5

                              46295cac801e5d4857d09837238a6394

                              SHA1

                              44e0fa1b517dbf802b18faf0785eeea6ac51594b

                              SHA256

                              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                              SHA512

                              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                              Filesize

                              16B

                              MD5

                              206702161f94c5cd39fadd03f4014d98

                              SHA1

                              bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                              SHA256

                              1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                              SHA512

                              0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                              Filesize

                              10KB

                              MD5

                              53ef990ec17705251a6dec9070b45dc6

                              SHA1

                              9e07ecc6caa360523fd1a5c6272849db4e979afb

                              SHA256

                              0ba8d111f840d12c1b2d3be52fe4566a96d553e776efbf9aede3398c721c6cd3

                              SHA512

                              40442dbce2371bfdf42ca8411a76c3e87ff36b1be3e11b1cf03f9cc4c9421b322950356837b85bc52c4e5593499f5aecdfbe6f7345466bfaeb721c6f0b4f73b7

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                              Filesize

                              11KB

                              MD5

                              6d8be276d153eeb5b1f30237aa46c7fd

                              SHA1

                              764b68f2ccbabc34345d218d44005594a9bcba6e

                              SHA256

                              bff6fcdb2f34260013defc3851a1859ebb1b5489687503f37fb98df3fb2c989d

                              SHA512

                              50b707a8e84fe55ea3ec98189da327f946297bd106b27e4c6cdd8954125381c4ebed0467de9bc3574a8c597f88b054f595ff216e3049296786a956262f4e276b

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                              Filesize

                              11KB

                              MD5

                              d190e6b8763686c26dca59e74dbc9b38

                              SHA1

                              1e8c8236c30f705d9a74c79b079cb463f7e68396

                              SHA256

                              e3ee16eb31286b6a1c55a6ee513e1125d920d8e6f7a02f327d71184098a720f6

                              SHA512

                              41a18e6387ddb836ee55a64caed4e830715954f85adb71ee41ee447e2f5c6f02a5b819909684d02f97f91a6b76519a57e606be15aa90e3673df46a5ad2e53725

                            • C:\Users\Admin\Downloads\HawkEye.exe:Zone.Identifier

                              Filesize

                              212B

                              MD5

                              90fa19dce57b5d2efe777b14b793c6ef

                              SHA1

                              cfab181379393cac45f63f22d65829fc65717821

                              SHA256

                              bd770b19f284b932b0642c9fbea3fe962470928eebc5fbd5611afd3dfa790102

                              SHA512

                              f39a577b06933a632c6434e68a77f47acaf02fb286a05438bc3f8e95f8abf5c626bf4d8ccc98998066e31108bcae3d671491d4ce8bcae3f20072fd65369c9380

                            • C:\Users\Admin\Downloads\Unconfirmed 815133.crdownload

                              Filesize

                              232KB

                              MD5

                              60fabd1a2509b59831876d5e2aa71a6b

                              SHA1

                              8b91f3c4f721cb04cc4974fc91056f397ae78faa

                              SHA256

                              1dacdc296fd6ef6ba817b184cce9901901c47c01d849adfa4222bfabfed61838

                              SHA512

                              3e842a7d47b32942adb936cae13293eddf1a6b860abcfe7422d0fb73098264cc95656b5c6d9980fad1bf8b5c277cd846c26acaba1bef441582caf34eb1e5295a

                            • memory/3604-329-0x0000000010000000-0x0000000010010000-memory.dmp

                              Filesize

                              64KB

                            • memory/3604-333-0x0000000005510000-0x000000000552A000-memory.dmp

                              Filesize

                              104KB