Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
69s -
max time network
71s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2024, 13:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Spyware/HawkEye.exe
Resource
win10v2004-20241007-en
General
-
Target
https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Spyware/HawkEye.exe
Malware Config
Signatures
-
Chimera 64 IoCs
Ransomware which infects local and network files, often distributed via Dropbox links.
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\misc\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\da-dk\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\images\themes\dark\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ru-ru\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files\VideoLAN\VLC\lua\http\dialogs\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\ko-kr\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\cs-cz\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\ru-ru\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\fr-fr\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\pt-br\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files\dotnet\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\nb-no\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\sl-si\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\de-de\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\pl-pl\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\ja-jp\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\sv-se\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\sv-se\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\security\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\it-it\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\en-ae\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\fi-fi\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\ro-ro\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\fr-fr\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\cs-cz\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\fr-ma\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\ca-es\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\es-es\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\cs-cz\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\versions\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\sv-se\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\eu-es\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\fr-ma\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\ro-ro\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\es-es\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\ro-ro\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\da-dk\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\selection-action-plugins\cpdf\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\uk-ua\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\images\themes\dark\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\sv-se\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\uk-ua\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\fi-fi\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\zh-cn\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ro-ro\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\cs-cz\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\fr-ma\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ca-es\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\fr-fr\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\sl-si\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\da-dk\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\ja-jp\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files\Microsoft Office\PackageManifests\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\it-it\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\sv-se\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\ICU\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\ja-jp\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\root\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\fr-fr\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\eu-es\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\eu-es\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe -
Chimera Ransomware Loader DLL 1 IoCs
Drops/unpacks executable file which resembles Chimera's Loader.dll.
resource yara_rule behavioral1/memory/5456-182-0x0000000010000000-0x0000000010010000-memory.dmp chimera_loader_dll -
Renames multiple (3282) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 5456 HawkEye.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 27 IoCs
description ioc Process File opened for modification C:\Users\Admin\Links\desktop.ini HawkEye.exe File opened for modification C:\Users\Admin\Music\desktop.ini HawkEye.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini HawkEye.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini HawkEye.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini HawkEye.exe File opened for modification C:\Users\Admin\Searches\desktop.ini HawkEye.exe File opened for modification C:\Users\Public\Videos\desktop.ini HawkEye.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini HawkEye.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini HawkEye.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini HawkEye.exe File opened for modification C:\Users\Admin\Videos\desktop.ini HawkEye.exe File opened for modification C:\Program Files\desktop.ini HawkEye.exe File opened for modification C:\Users\Public\Desktop\desktop.ini HawkEye.exe File opened for modification C:\Users\Public\Documents\desktop.ini HawkEye.exe File opened for modification C:\Users\Public\Music\desktop.ini HawkEye.exe File opened for modification C:\Users\Public\desktop.ini HawkEye.exe File opened for modification C:\Program Files (x86)\desktop.ini HawkEye.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini HawkEye.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini HawkEye.exe File opened for modification C:\Users\Public\Pictures\desktop.ini HawkEye.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini HawkEye.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini HawkEye.exe File opened for modification C:\Users\Public\Libraries\desktop.ini HawkEye.exe File opened for modification C:\Users\Public\Downloads\desktop.ini HawkEye.exe File opened for modification C:\Users\Admin\Documents\desktop.ini HawkEye.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini HawkEye.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini HawkEye.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 47 raw.githubusercontent.com 45 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 57 bot.whatismyipaddress.com -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\en-il\ui-strings.js HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\AppPackageAppList.targetsize-30_altform-unplated.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteNewNoteSmallTile.scale-100.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Assets\PhotosAppList.targetsize-80_altform-colorize.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\LinkedInboxMediumTile.scale-400.png HawkEye.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\SkypeForBusinessBasic2019_eula.txt HawkEye.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\svgCheckboxUnselected.svg HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\pt-br\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\AppIcon.targetsize-80.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Videos\Help\DialRotation.mp4 HawkEye.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ClientOSub_eula.txt HawkEye.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\jsse.jar HawkEye.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\da-dk\ui-strings.js HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_neutral_split.scale-200_8wekyb3d8bbwe\Win10\MicrosoftSolitaireAppList.scale-200.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxMailAppList.targetsize-72.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\FetchingMail.scale-100.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\InsiderHubMedTile.scale-100_contrast-black.png HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ko-kr\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ja-jp\ui-strings.js HawkEye.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-white\SmallLogo.scale-125_contrast-white.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\AppxBundleManifest.xml HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Assets\PhotosAppList.contrast-black_targetsize-40.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-256_altform-unplated.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-36_altform-unplated_contrast-black.png HawkEye.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\images\themes\dark\rhp_world_icon_2x.png HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\cs-cz\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\LTR\contrast-black\MedTile.scale-125.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-white\StoreLogo.scale-400_contrast-white.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\Assets\contrast-black\PeopleAppList.targetsize-256_altform-unplated.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Home\contrast-white\WideTile.scale-100.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-white\LargeTile.scale-100_contrast-white.png HawkEye.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\images\cursors\win32_CopyDrop32x32.gif HawkEye.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\LTR\contrast-black\WideTile.scale-125.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\LinkedInboxLargeTile.scale-150.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\Glyph_0xe7d0.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\AppxBundleManifest.xml HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxCalendarSplashLogo.scale-125.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\StoreLargeTile.scale-200.png HawkEye.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsid.xml HawkEye.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\es-es\ui-strings.js HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\skype-to-phone-tiny.png HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\ru-ru\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\RTL\contrast-black\SmallTile.scale-125.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteNewNoteWideTile.scale-150.png HawkEye.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\jfr.jar HawkEye.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\ui-strings.js HawkEye.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ui-strings.js HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\LargeTile.scale-150.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.contrast-black_targetsize-20.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\ExchangeMediumTile.scale-200.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\Doughboy.scale-150.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-black\MapsWideTile.scale-100.png HawkEye.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\dcfmui.msi.16.en-us.tree.dat HawkEye.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\it-it\ui-strings.js HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteSectionMedTile.scale-100.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\AppIcon.targetsize-16_contrast-black.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-white\OrientationControlInnerCircle.png HawkEye.exe File opened for modification C:\Program Files\PublishHide.mpg HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\Square44x44\PaintAppList.targetsize-16_altform-unplated.png HawkEye.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteNotebookSmallTile.scale-200.png HawkEye.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\progress_spinner_dark2x.gif HawkEye.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\da-dk\YOUR_FILES_ARE_ENCRYPTED.HTML HawkEye.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HawkEye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{21A1D4C1-8EEB-11EF-A4B7-D6A59BC41F9D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 541911.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1392 msedge.exe 1392 msedge.exe 2352 msedge.exe 2352 msedge.exe 2524 identity_helper.exe 2524 identity_helper.exe 5352 msedge.exe 5352 msedge.exe 2880 msedge.exe 2880 msedge.exe 532 msedge.exe 532 msedge.exe 5196 identity_helper.exe 5196 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5456 HawkEye.exe -
Suspicious use of FindShellTrayWindow 62 IoCs
pid Process 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 4452 iexplore.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4452 iexplore.exe 4452 iexplore.exe 5176 IEXPLORE.EXE 5176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2352 wrote to memory of 4840 2352 msedge.exe 85 PID 2352 wrote to memory of 4840 2352 msedge.exe 85 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 4536 2352 msedge.exe 86 PID 2352 wrote to memory of 1392 2352 msedge.exe 87 PID 2352 wrote to memory of 1392 2352 msedge.exe 87 PID 2352 wrote to memory of 5012 2352 msedge.exe 88 PID 2352 wrote to memory of 5012 2352 msedge.exe 88 PID 2352 wrote to memory of 5012 2352 msedge.exe 88 PID 2352 wrote to memory of 5012 2352 msedge.exe 88 PID 2352 wrote to memory of 5012 2352 msedge.exe 88 PID 2352 wrote to memory of 5012 2352 msedge.exe 88 PID 2352 wrote to memory of 5012 2352 msedge.exe 88 PID 2352 wrote to memory of 5012 2352 msedge.exe 88 PID 2352 wrote to memory of 5012 2352 msedge.exe 88 PID 2352 wrote to memory of 5012 2352 msedge.exe 88 PID 2352 wrote to memory of 5012 2352 msedge.exe 88 PID 2352 wrote to memory of 5012 2352 msedge.exe 88 PID 2352 wrote to memory of 5012 2352 msedge.exe 88 PID 2352 wrote to memory of 5012 2352 msedge.exe 88 PID 2352 wrote to memory of 5012 2352 msedge.exe 88 PID 2352 wrote to memory of 5012 2352 msedge.exe 88 PID 2352 wrote to memory of 5012 2352 msedge.exe 88 PID 2352 wrote to memory of 5012 2352 msedge.exe 88 PID 2352 wrote to memory of 5012 2352 msedge.exe 88 PID 2352 wrote to memory of 5012 2352 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Spyware/HawkEye.exe1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8314946f8,0x7ff831494708,0x7ff8314947182⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,15879163671974689174,5452885979660796812,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,15879163671974689174,5452885979660796812,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,15879163671974689174,5452885979660796812,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15879163671974689174,5452885979660796812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15879163671974689174,5452885979660796812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,15879163671974689174,5452885979660796812,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5468 /prefetch:82⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,15879163671974689174,5452885979660796812,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5468 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2140,15879163671974689174,5452885979660796812,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=2328 /prefetch:82⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15879163671974689174,5452885979660796812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:12⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15879163671974689174,5452885979660796812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:12⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15879163671974689174,5452885979660796812,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5976 /prefetch:12⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2140,15879163671974689174,5452885979660796812,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6320 /prefetch:82⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15879163671974689174,5452885979660796812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:12⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15879163671974689174,5452885979660796812,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6444 /prefetch:12⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2140,15879163671974689174,5452885979660796812,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6060 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5352
-
-
C:\Users\Admin\Downloads\HawkEye.exe"C:\Users\Admin\Downloads\HawkEye.exe"2⤵
- Chimera
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5456 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -k "C:\Users\Admin\Music\YOUR_FILES_ARE_ENCRYPTED.HTML"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4452 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4452 CREDAT:17410 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:5176
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4000
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3144
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\YOUR_FILES_ARE_ENCRYPTED.HTML1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:532 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0x40,0x128,0x7ff8314946f8,0x7ff831494708,0x7ff8314947182⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2248,11800162534201252921,10814603278825243238,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2260 /prefetch:22⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2248,11800162534201252921,10814603278825243238,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2248,11800162534201252921,10814603278825243238,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,11800162534201252921,10814603278825243238,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,11800162534201252921,10814603278825243238,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,11800162534201252921,10814603278825243238,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3940 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,11800162534201252921,10814603278825243238,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:5732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2248,11800162534201252921,10814603278825243238,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5508 /prefetch:82⤵PID:5188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2248,11800162534201252921,10814603278825243238,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5508 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,11800162534201252921,10814603278825243238,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:5860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,11800162534201252921,10814603278825243238,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:5896
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5012
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1664
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD525d20af82739c24641ff3331d6c0f75b
SHA1aaffa1d5ffc0af5cf88ad358eb2d9b906545f37c
SHA2565a1b5d9af4b3ff316d954c97a5270cc6ae9133bf8e23e1c93a23f0d535d62598
SHA5125ad67a312f72e579c4f21f22a486b598a1e9b40e374285ddd1b76eef4bb228edc97103e16934d8d99d45b5953cd8d28505b1413809696ab09973a2142a4a873a
-
Filesize
152B
MD59dafc9a353533b99db251977ac6ae013
SHA17813f294eaee953cf4ab0c9e75b09a770a1f0e48
SHA25600d3f47872f058260b936d3942acd436439bec9da636ae3f2c50cf2fc5c29603
SHA51227536e364d2e7ac6ab52870343ed6183dc9da5244d2fcb435c5e4c92f74d5911c509d0ab70781ce3ea901ee39b8861ba8d493deef253addb2026dae83ec58438
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
152B
MD57ba31ffe9032d3d164efcb05d06e4257
SHA18fa98630e1a15ede4625dadbb332bc8fdf097a9c
SHA25653e15fd4c5755ba5ec92e040f27489b9a93312da22d03a6369e2fb8bf49e3980
SHA51216ec09d07a8c7f786b51b820b7855c6b6e8f2f3cf68b7542c5a2e6b512571f7c98d90014f5f2fa1de2371c8d7eae36a9e1e4ddb3baa5b9e4fcce3adee5e04395
-
Filesize
44KB
MD5ebfd89a45e1e2d38c3b29cb4c6d3eb3f
SHA13747aedd0c4385f519e6f0f633eb0016461c0ee9
SHA2568534d1a9dd52f776e89e94c51f7be767adff39d50ed78ab9fa127d9d49a675f0
SHA512e912092df53335f466df4675e73fc94c5d8b9638ea78c9098fba13671eb6f0e6ffff000f7e4cb1e072c715cc5caf844b6e5c9146ad04006d61359aef1135ab5f
-
Filesize
264KB
MD591e3fed49a39d87fdf6cf2089fa06de9
SHA15d4794ec0c2923434b0f9a9f965ce5223e95627f
SHA25636e0c0c286f25a0d1d808a4836557fdfc064a91952fc189c8aafae4bf84f8682
SHA5123ec874d44a8fd2967f172442a5035bea57667f5155e2e52bbae88c6bdeb7b02b2feaa401a6db341f73164b0e29ec774252a95567356faa1174e39efedc9605e9
-
Filesize
1.0MB
MD5800866e70df758c407dbc0d1394fa45a
SHA1fafc2b9a991ac05edc110c29d00b7c25ae159d27
SHA25692884c75f46374710f99bf7f7bdd8c057d938165499d78abfd5a6da98f1c77b6
SHA512ab808f767ca1b7768643521bd75a8c1e5d2d3a15b813c40bbbdea18f9e3e50cd993c9a2d993c61cc5d2c0b4df6a771402e82d7ce5488228f3134d3df14d873dd
-
Filesize
4.0MB
MD5b20ff372aa11de800010c30b7564d0f9
SHA10485d2b58640d5376a5de0e0a8208d566b1222c9
SHA256cf7842858aa8158841b8e543f5c48f01268a64efdc509eb0e1b5bf01f9114c22
SHA5120574dd010ca647475977151ef8168bdffd4ebccd23ac2a78cd40d704613e8e9c813ebed10c518d8576c6228800066bd08683c7ac3ac1ff58c4deceb196521fd1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5326a39d341fb20491e35933f955ff74a
SHA1a22cee8071921b6368ed27ee6a5da6a5e426c1d0
SHA2560e4dadb474ccaaa5fcbb9b8e68db9271aba7f67c05ba53039c757b2294a7d733
SHA5123f702bccf12f2bb1239579e754d03389c20ae96b6358859b32097c7ae3850149f20176254a59e50c0ff6f19fd93f450bdc62793079f687a74219ba93c6ba9778
-
Filesize
20KB
MD52b9b7a1d69d1f1ecfb8438f255c16b12
SHA15d867bee3716ace9f6da3081504601eb5770e86c
SHA256b7a357c87a0bfe4fc9e8e63d8e12b38007ef03a6554301b2e675e2c94c0f51db
SHA512896e5b3fe811917cd6f3b7e522886f97d67e4845bee6bafbc2671da9d124513fdcbc53bd044f51a297f83c51811bdc4a7b1133bddd3e583c5a16b59d8e713601
-
Filesize
319B
MD533172d5eebc53853ff0e6640ad89b644
SHA10dc35f20dd1665d1685630e178bb02f5a61df3d2
SHA256015f47bb194376a04f2447cfea4616679beb1ced0a226f242dba10bc75481321
SHA512b26e6a4a4b00cb7ed8fc36775e20b54738e3a98c6bfaec6eb489ac3d1bab9f55b68f30211762bac8dd9ce9bdbfd735c8ffd9b578f3ee76829226224215301039
-
Filesize
20KB
MD581b3b0251f934a878f6167053aa302e6
SHA1d9d024a418f4732250ec09e5febf00a8cb6fa79b
SHA2566ca230863df9216200b5f83cd8b51f199fac547fd8c37770be58a4917bdf7f54
SHA512110c6cc833eb68942d5b06dddf4b3c453bb1a1d99500bb5309880966626942c63a81fa030d2dc8bbe59fafc6d5bca2657457a3b028ba41c95fcaebed67f26b4a
-
Filesize
124KB
MD5e275028c78fd1477f865ff11ccc5390e
SHA13a5b605a81ce5fc37a01e72f661ea5053c1ac79b
SHA2568b7f34e941bf08bcf03e819931fce1f98d774e26eaa32e0ed8ed4c15afe5f8e6
SHA51289f6380663fc2d625d0249522dea633c6c6bebdfeffa7f602b9b6a70e4fbe60a2c2ef90ddc7017920c3d34a618257aa86a818c926fb3c26ea44b576b93892f0c
-
Filesize
894B
MD5c89a89c61b812321b5caaf54ac8444b9
SHA134f82f90eb3078a817c72f72b581f5305fca92c6
SHA256873790b6d93d613ac51928389b50572f51c5e4d0ae8df013ee6f9451dee72fc4
SHA512524ccfcaefbac5d38ebdf9477f7a86578a729054a30df1639aad9ee319eeeb04160810839fddea72483c717cf8def390d9676163ecfb102d2af05d014180f981
-
Filesize
28KB
MD508be7302997972398b4ccc00c332d2b4
SHA1f96468b6c901b836b19e6ed02361e2e0b85479ab
SHA256c2ac1a437ca1402e7dd286c21a39a65b3fb16724db707a93027fc9c535986aa7
SHA512ad13b79a6285ca7b0c69383376dad9e39322d3ebb6f63dcc1a250191a4803d74a35ed386349843041d1c831c4d189b7ae7af9baf9dc43242757bf9bdb4b684ce
-
Filesize
12KB
MD5c1322eecd833e9f09899a1ef2ea268ed
SHA1e2b303efe6e6ccd8251af57da1a69ee011628ef1
SHA256ba2a1ce902a61479e841bd7b57fac60186f66c9f60283c3c594fbb3694935d49
SHA5122fc0d12876a8e8183aaa8b17d6f7bbb2e1d9e6ca9c7b6c4ef5a8ab3b82833b3a20035e889b7dcd8d03917c235f12bb5e1f29b81bdea449ee8bfb541849f783f7
-
Filesize
331B
MD5941fc851c8fba416803d7c26cf7a9c64
SHA1196203f37e7e5f3c1de12741e40cf0e8cbb1d834
SHA2566a5d1f02aa8ab1edbedd66d4c09e3f17774beeefb179e54134322a65b7183978
SHA5121e297b27f5f8088116883d15851f57d3f09b587da74b6e176d80e88ea651969a7a71516ccc79912ea8b21666c41b087aafbb67dfaf40df389a693717701b4f12
-
Filesize
579B
MD5f6b24ad07edab42c88540a87562c81de
SHA1dd8691937a6a089fd58b9db56b6f599022b48168
SHA256ab8d2b9c88df9ac33fbf60ee72a5d8c84d0dbb28ebc1de08a4bae02a8af8071f
SHA5125fa8a1df39ee12048ba5817c1962cb897a3454d69d78ad4c40e0f72fe04c4ccfca674a2d629dba8376f2862ca587163435318d4cd7b5ab5c64ec03703322ae1c
-
Filesize
5KB
MD5e26f3c6ad0e14de3cb017ef8a4f7a4e8
SHA192239e3d10cf59a50af4f97cbbea5284f6079a74
SHA2560ca30161182dcd5be38958089ced2f13a8e33b2f9367fb9e981d8304222673a9
SHA5123948bd6239bee68916fb51967b7b3b9188346516b8730ff97007b018b3a7fdb3d0c189d4fafa8f9b5f36dc36410908db20d02fabf70b6e88998128f86e0b6ff2
-
Filesize
6KB
MD54635bd7aa8b20089916c8d5b1c78ad67
SHA125c82f8b6de88c328dbcf5787410f2daba8732a5
SHA25659df3815c931e291019e9fc36a8ddf30d7bab602e0fce98ecea1df5919c5cea1
SHA512bad23c60bc2c0fcb2b9f0486b7bd92dcf6e0ff287eae0ebdcc61bb14eb5ad0028e0bb3bf5ae35b0b91f11076b3e33c7e9e60539d2a3e9072e889270125c0c88c
-
Filesize
6KB
MD5d68f14990cfa9bf65b35db6a8aa3f0e2
SHA1acff358a0e801e2f9c64bdfada25b4c48e76eec3
SHA256e7abd019f706639e5bb0e6ce722691c43b245141549c64890c1a953ec933add0
SHA512207101b062fc679d21d5a9a0a089a72e9c3d00c917ebacba428f5d537b2f8b4a351ac93faa8b782d3de8ab01f2ecba7a76c3164a30a3f08dc619a9ccad6da8d1
-
Filesize
6KB
MD5681c2d4d12ead1810e30780b2460074e
SHA183d23a17da3c8fc3873798ead5256f11f4e024f6
SHA256a251ad33d38f02666c5bdf3b57f7cfb99e45b922e3d6a88af20db3f873dcaef6
SHA512d6da11eb6aca8d09e91dc582b0f5854e58ae39e2ae4aaf7a1d0b0b2683526cb30ac8ae68498d329485c2c8daf17e6b7d05791e7ad30fbe1d621810cbbb030797
-
Filesize
6KB
MD5deaee9d9a362eec8648f51260c55cd72
SHA1ddcc2a5ba50a9042ea109f4565afd00312c0f84f
SHA2567048cf1900ea383246d1524e0726cf83874e462324787207100598a9a0d03dab
SHA512c82768464e85bb9553e15e335181c761d5e39300266d3018c7bdbcf423eca650c073d804923a775e961bb37978f474b69ad42b5b74d3ad55b01dd56a17069c14
-
Filesize
33B
MD52b432fef211c69c745aca86de4f8e4ab
SHA14b92da8d4c0188cf2409500adcd2200444a82fcc
SHA25642b55d126d1e640b1ed7a6bdcb9a46c81df461fa7e131f4f8c7108c2c61c14de
SHA512948502de4dc89a7e9d2e1660451fcd0f44fd3816072924a44f145d821d0363233cc92a377dba3a0a9f849e3c17b1893070025c369c8120083a622d025fe1eacf
-
Filesize
415B
MD5d5e2c5da9ce638a4af407a454dccedd3
SHA1ac45df904fc1b5ce275d0ed6785a0fa2962b1ea4
SHA25698727e65d36746a27bbbffd5917f0ddbce2327b72ae2d8a8fac00bcb88365e72
SHA512bbc3655f2e53d6bbc6a3cbc3e6f38a2db9cd9af18013e595a20b544109ca244e247a66c8bdcf0a99ebc6f4b4edd2e740a95128327c228950ad8c0c43adf9a718
-
Filesize
319B
MD53f4c50aa156afde630c7aeae3f373b4c
SHA111658e185ffb0da403577908f9edc8accf00cdc3
SHA25629539d800cedaa8e569dd28252786caa298236043d2d3db847e8b4ec06214bf2
SHA51251ce9ebe4b96fffb66539649ddee87b624df96dc83601e1acc587157be9d99b9a19d31580490befe6b4c92db434fb56b98396fa1682ab54beff1d43d96b15519
-
Filesize
4KB
MD5a6ecf7622f5d763489666e6cc15867ef
SHA1f0f80aae157865dfc94b166fb0c2160f269afd6c
SHA25635108fc86b2d1957f13229ff6d202258184d08926f35d74447805d541d601e48
SHA512b60545d6a5cec6adc94f88d626f1c08171e7ec03857a781685c6ce9949f8df3707f266877beb3d756facfe61eada6e6a893a60b9148316f11119bd7ccbabeb75
-
Filesize
3KB
MD5ac1dbc2d92ca06729e647d1600caf51e
SHA1d1c22750ba33cc41dd62fdd653e785ab9432fb67
SHA256da2d45eef760e5f149ef05fe1da364e129d3fb2fde1e8b75015c899ef62a5de9
SHA5123a3a56bc6d089a962557fa910900df1a0303775aff3ccb124913238694796d6f60ba7282845de1c34de5ca25802297b42ee80556d8148609ecdcbece1670684c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\000003.log
Filesize112B
MD542d903a580f9cd576ebaf435e8f20d33
SHA1e0b88a29f2bb73273c4c58056a3df89ddade7e07
SHA2561783f259ded122d9485a077e62d45918fe8a4198ea97d44240e0e278e84d19d5
SHA5122ed0854d73d6620f9870cf66b0eec86f222e3a7eb7031a422ae5e02e1764f83869db60aaa4e6825df9b52b453ee4443228698a30c853866ac5739ab80e2e2246
-
Filesize
347B
MD57ddafbf778e548e891dc01e0115dfbc0
SHA1fb7d1189bd2a905b0b9754a6a4b2ac3f22a304d7
SHA256b792653222a5f3416da3d3853c5a6aff7c0c308b495df1e5810684c14aacb425
SHA512badbfae22e3aebf2701fb7474172b01dd1f9d2fab1107f1dd1c5ccdee4742a1f2a2fe7b4660ae019202224afd0a180442cc39af7edbca38d8ad7a8dd75edd91f
-
Filesize
323B
MD55b0884de98e03a9cfb2353ebb6e788e7
SHA1d590bd0ee69a94edaa44e1d04904f7e29de90fb0
SHA256ad2e6de9b90c7c2ee623aafb7dfe585e0261bc0ee677084c410ff938c9845afb
SHA51261f42e5f61bd1c25a5f21d96f81bed4d076825bfd8bca2da6f0914f207bb6deb6326b22053159f8982aa185dcc1267de09eba781e8487d9d82c7cb54572a7a28
-
Filesize
1KB
MD51ca818730d843076fb1370f94bcfaf48
SHA127d774ec552897bd85245432f5c94eba6b90267e
SHA256d83b8efa8daf39cfb11a084f844bdd3cd164e0f9fde54e0b6c6f32697e6f1d80
SHA512c9fe03dd23585aa65e13a3cf53395d1b6e9e3527cf5417139cc9ebbde6f05bd976b17bb2689789d15ffc74f67e063c0d5bb723522e7bf8d82b2fdefc8ba94f00
-
Filesize
1KB
MD56f01bd53426ace3de7aa4a1f632f70f8
SHA11e5617bb1e9128cfbac5498b8898b33655ca7df7
SHA2568cb7d6da803faaf02ff26366d1ff48a19a2f3e292a50633a0aec1fd7c5a2bd67
SHA512e6cebc3440e5e2522f7f397f2bfbb32fc80e9c03f1cf50a70bc351d669e47a130f7ebd72e19f19127576c561e42304a5682f0744e175617fedad48a96611f316
-
Filesize
128KB
MD571306e0d8077a8e2bf3fef9c36d65f7f
SHA12d8e736e96ae810623aa103d3c037bb29ddbd226
SHA256970b306de3fa8917eec0eb75070b2a6a3f6cfb5fad37ffd13d700a63a3703e1d
SHA512122ccedfb3e138d914ecf7a7f66653b154265ac648e02a72e3c89f57624cda6b4721a237aee8ef1558548d3371aaffa55a478f17489256d676c212b3b3835ae1
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
136B
MD54d5bb2b20024c23520afa2c461019dec
SHA11e4a6920d43c37fcd3221e95216b0feff0eb5768
SHA256e9d8e2789fdd303f52e0de64070dfb453ae2c6c5e4334ac3de07f8cceb2cb418
SHA512c36df5a427ee6e3d8e386789db3f7ad5a728f5343552de9b18b5e92187eb42d0981cfd8c8ae522f5d1eab91b86da7e6cb1856ed8cac07e0642eb63a207f973b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\MANIFEST-000004
Filesize50B
MD5031d6d1e28fe41a9bdcbd8a21da92df1
SHA138cee81cb035a60a23d6e045e5d72116f2a58683
SHA256b51bc53f3c43a5b800a723623c4e56a836367d6e2787c57d71184df5d24151da
SHA512e994cd3a8ee3e3cf6304c33df5b7d6cc8207e0c08d568925afa9d46d42f6f1a5bdd7261f0fd1fcdf4df1a173ef4e159ee1de8125e54efee488a1220ce85af904
-
Filesize
60KB
MD56f72773cb916ef907e85022fdf6c1fe2
SHA142893a648706ca15380c65cec902b3d3e269ea24
SHA256b3ad2142c72e08fcb9b35a766517fb5bb0ea40f76069c4bee022067bc6cf6703
SHA5128e22a7b1c4ca69820b79ebbd02034071bff3e05f183819ff6fb33a325ca174d4f4acb8d8ac3f51bd5d2f021b472574c8a7db1143db2668b193cc6ecdca762437
-
Filesize
3KB
MD56408176ebc1d9d8d84f724222c30fe3f
SHA1cf4ca339a450d1f9b39e10f561ad69b048cb538f
SHA256aa9a42a7c5c204aac4c43537c74eeee2978b89c27d9ed2277f5f462eb32df3ea
SHA5125ed3979643b484a2c279147b84e2ca886758b540698d692d97490ef03e8cf930013929bc528b260e28ebf6dc7c2bf1072ee9cdf52b16c3e6941d91c9b763d754
-
Filesize
319B
MD5fbdb82efdc82237039a12344fe5f55b3
SHA1d3c5dd77a92527a53d51da6ebe39e75cf3364718
SHA256d9b02d379df33d4d5c53bb386446f1a0ab924c5a1de830d6c3bfb24539f004eb
SHA51277f7795d904d614463e98cbec14884082c1b9af6cbc5eccaf7cc21fa5ea83d9c30bbe989de12438b8549d37296d1e7513f0500a001598e8072b07b8997f22acb
-
Filesize
536B
MD53495381d182daec8163bb1f3e81fd176
SHA1aaa550594ce12969b8474762fe33739e5da1a0fd
SHA256fd41b1fd881c33f861167cb0b1640e25ba2886f0d6a928e2dfe21a0a7279cd17
SHA512eb50003cc3b8ad78497755a63f042648d603c9430fbce6815e283fd925e279d852c8fb74df6e8e2f97f273fd97862bfd9a603e1ab94ec568fb2583e312105440
-
Filesize
337B
MD5e775b289740cf69a373cf0064a924b63
SHA10fa971774db7a49d7a29fba7279b3eece9b5bb6f
SHA2566ef0db89ccbfbf3a736416031d93ae3c5af3b2966b78011f0d0696595345a50d
SHA51245ccf2f300264fb3e0c4c8fb7585d8a0ee52c0e0f2ae7749ce6086c2c417b645afd487ce7b83a11a2dd6db8e3d58a76c5260f197b92af9182e28a32b7bffbb21
-
Filesize
44KB
MD5f1136dc4d35523a224e89d21f0e479ac
SHA116c23acdeba075459d847999ad15f2eb76cbf27e
SHA256a8e1fb19830763135a26c46ef80cb702c71eb8f79a19df0fcda19d639a515898
SHA51210d8d9139fd1490d2ea6e0d45d8ba34a20451709dcf3b6dc9c2c532d5549fe6662db760ba3be1ab2159a4a3d41f11aa8e76ea35dc44f7b1c2c181ff4d3b507a2
-
Filesize
264KB
MD5d3b29752d6cb78964ebb920e46e3a2b9
SHA138acdb5f0ad75aeb1f4659e3ef0b41d4793e0840
SHA2566ce321a9cb52b373cb3bdc2d4344c40543c7d6471d68e9062f5e3b4897ffa346
SHA512cca4980a080e86a9d4ad7aad95a9c776c62e8c7ef563460ab8d7ee8b961629f22bd250a3d271dc42770f60b784edfc9c0f68bca8ead03a5d1fbe0585f23f6acd
-
Filesize
4.0MB
MD5d5b3c7d054a7827c05df3f626aba80a0
SHA1aa550ce87b02c9d76a2ca6c58c938c3f05be1eee
SHA256809aef5a29f82febdc053274f1565b2fd3157030ee1b9c7004bb19eaa563ea9d
SHA512ff5ed6f851e69320bff3784a8f28812e52a5790e0d4945f5192e50fec0b7126c9340737fd135fb3b838096d1ab47b74f045634890d8d99c657d1d9de8e55968c
-
Filesize
11B
MD5838a7b32aefb618130392bc7d006aa2e
SHA15159e0f18c9e68f0e75e2239875aa994847b8290
SHA256ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa
SHA5129e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9
-
Filesize
11KB
MD5563d5e7cbcfec30d9e361cceeaf03690
SHA1c0b6350e3ba310f011e63f9e42d613c07a0a496b
SHA256182e5290d59c36a92236bcb35a32fd26ed451eb1de457020b869acf04e27c8ff
SHA512b52e65165e90146fdac3a5a802b9e46805e9c50a6eff5c416f80a81a6781834257d1116d95786f61c7dac7e4df2a5884b99c8b8a0472a426a83f8e5503b3074b
-
Filesize
11KB
MD5ee4bcf793b3c58a09cb269e67bd71bbe
SHA10a5ffd6b73d38581ec5887a07b880671b2b7d6f5
SHA25606d0e8e57171f06fc8603310303960a0ec5c846ce25c93e64d65f3924f0ba03b
SHA5121f1e1ac7a0e5212104bbbff0260889690c29fb4849d5f7f5b19c76012a145e0e3e323a119bdd30ebc721c73735232a6cb57eabe3a1e4bc710c5401a6364a7273
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
4B
MD5dbb8812d62fd765a0d6beb9a373f14ff
SHA17d71361ebddf61a5015a355da76e7a3645c3205a
SHA2569e0fb20752c34481f5d640bf55371f2eeac725aa98edffbabed9e7605dfa5aa8
SHA51211696247871dd6a70890182423073939732cf91176e3a6896047dc6b388ddf225e3cf5334b009ac8f08bd508c80e68a1e52c7b8c5142b77c1391e2e7c59c752b
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\9cd93bc6dcf544bae69531052e64647ec02f2bb4.tbres
Filesize4KB
MD5dca574f25d34d72ab995882f2f836926
SHA1197251c21c22d7f5fdae495ebb6d988bf57b52ae
SHA2568abc659dde7b9b830d78e609055a692bc6af70b119856cd1d4e4958935edfb5e
SHA51200296c321e973e0c6bd7593caa00d6d1775fddea7cc246f0acc3cb8f5ced7e9a9c826070287446c22b9d7d4b4070cef55778bf4fa26fdb2f0600216e5509d234
-
Filesize
232KB
MD560fabd1a2509b59831876d5e2aa71a6b
SHA18b91f3c4f721cb04cc4974fc91056f397ae78faa
SHA2561dacdc296fd6ef6ba817b184cce9901901c47c01d849adfa4222bfabfed61838
SHA5123e842a7d47b32942adb936cae13293eddf1a6b860abcfe7422d0fb73098264cc95656b5c6d9980fad1bf8b5c277cd846c26acaba1bef441582caf34eb1e5295a