Analysis

  • max time kernel
    65s
  • max time network
    66s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    08-12-2024 17:03

General

  • Target

    https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Spyware/HawkEye.exe

Malware Config

Signatures

  • Chimera 64 IoCs

    Ransomware which infects local and network files, often distributed via Dropbox links.

  • Chimera Ransomware Loader DLL 1 IoCs

    Drops/unpacks executable file which resembles Chimera's Loader.dll.

  • Chimera family
  • Renames multiple (3270) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 26 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 64 IoCs
  • Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs

    When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 43 IoCs
  • Suspicious use of SendNotifyMessage 16 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Spyware/HawkEye.exe
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2532
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff20773cb8,0x7fff20773cc8,0x7fff20773cd8
      2⤵
        PID:1328
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,13978649787077145576,12961830008380459191,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1936 /prefetch:2
        2⤵
          PID:128
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1924,13978649787077145576,12961830008380459191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4152
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1924,13978649787077145576,12961830008380459191,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1972 /prefetch:8
          2⤵
            PID:2804
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,13978649787077145576,12961830008380459191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:1
            2⤵
              PID:3752
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,13978649787077145576,12961830008380459191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:1
              2⤵
                PID:4128
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1924,13978649787077145576,12961830008380459191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:8
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:1844
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,13978649787077145576,12961830008380459191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:1
                2⤵
                  PID:3560
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1924,13978649787077145576,12961830008380459191,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5888 /prefetch:8
                  2⤵
                    PID:4700
                  • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1924,13978649787077145576,12961830008380459191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6124 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3868
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,13978649787077145576,12961830008380459191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:1
                    2⤵
                      PID:2496
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,13978649787077145576,12961830008380459191,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:1
                      2⤵
                        PID:580
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,13978649787077145576,12961830008380459191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:1
                        2⤵
                          PID:3432
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,13978649787077145576,12961830008380459191,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:1
                          2⤵
                            PID:1648
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1924,13978649787077145576,12961830008380459191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 /prefetch:8
                            2⤵
                            • Subvert Trust Controls: Mark-of-the-Web Bypass
                            • NTFS ADS
                            • Suspicious behavior: EnumeratesProcesses
                            PID:1820
                          • C:\Users\Admin\Downloads\HawkEye.exe
                            "C:\Users\Admin\Downloads\HawkEye.exe"
                            2⤵
                            • Chimera
                            • Executes dropped EXE
                            • Drops desktop.ini file(s)
                            • Drops file in Program Files directory
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3944
                            • C:\Program Files\Internet Explorer\iexplore.exe
                              "C:\Program Files\Internet Explorer\iexplore.exe" -k "C:\Users\Admin\Downloads\YOUR_FILES_ARE_ENCRYPTED.HTML"
                              3⤵
                              • Modifies Internet Explorer settings
                              PID:4996
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,13978649787077145576,12961830008380459191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1584 /prefetch:1
                            2⤵
                              PID:4692
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:2440
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:1104
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\YOUR_FILES_ARE_ENCRYPTED.HTML
                                1⤵
                                  PID:4412
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff20773cb8,0x7fff20773cc8,0x7fff20773cd8
                                    2⤵
                                      PID:992

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Program Files\Java\jdk-1.8\jre\lib\YOUR_FILES_ARE_ENCRYPTED.HTML

                                    Filesize

                                    4KB

                                    MD5

                                    ce728d330e7567ee769c71f9dcdecb0b

                                    SHA1

                                    e7cf88afaeac90b7fd2d559bac57e4fde52b1d8f

                                    SHA256

                                    e1bf0ad1a738ed1a1ece444cb02d943b8ac40a63408f125f2e16963640c81839

                                    SHA512

                                    4b1c995985e38ec4fe2168128721da143f842abfcf1cb006d42dc12f5d47916d192ce2b38bad5d3c0070a10c729344a499ecc29b6772b45a9552a97025255c58

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    fdee96b970080ef7f5bfa5964075575e

                                    SHA1

                                    2c821998dc2674d291bfa83a4df46814f0c29ab4

                                    SHA256

                                    a241023f360b300e56b2b0e1205b651e1244b222e1f55245ca2d06d3162a62f0

                                    SHA512

                                    20875c3002323f5a9b1b71917d6bd4e4c718c9ca325c90335bd475ddcb25eac94cb3f29795fa6476d6d6e757622b8b0577f008eec2c739c2eec71d2e8b372cff

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    46e6ad711a84b5dc7b30b75297d64875

                                    SHA1

                                    8ca343bfab1e2c04e67b9b16b8e06ba463b4f485

                                    SHA256

                                    77b51492a40a511e57e7a7ecf76715a2fd46533c0f0d0d5a758f0224e201c77f

                                    SHA512

                                    8472710b638b0aeee4678f41ed2dff72b39b929b2802716c0c9f96db24c63096b94c9969575e4698f16e412f82668b5c9b5cb747e8a2219429dbb476a31d297e

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                    Filesize

                                    1KB

                                    MD5

                                    02d43aabc515021a84035a74a608a2a3

                                    SHA1

                                    bec229575d033154c2a73ff275eec4b52315eb29

                                    SHA256

                                    b2603facfc56cb8d1563e5717b0ee32b4fe9c7e9943d072c7ba5a34fb78fa5ef

                                    SHA512

                                    700dcbd82fab4eaf8d8a84e6fe3fe04f87eb3491626393a52eeeb76e6946cae4c2ae9da7eee32ffc3abb7e580168e3e318600059e052ac76c8aec3b74df3a1f0

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    2ca92fd5990014293cd94da9ff8c0d56

                                    SHA1

                                    bcf99dda2ef3bc80b768107f73c8fe36ecf49398

                                    SHA256

                                    d50b3b829c5b30a76dc41eb5d9e48c1e77cf68014065b4d3c38c545224509d6a

                                    SHA512

                                    245e74ea9c95babbe4a121114a2e4b5e1e9264ad903b04743544c2ac1b9403f74fe94a9514335ec362881207130dafac80f16d85e1abafee4bc4de3e7e2eadf6

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    102664ea4b148512a5435d0bc7aa171a

                                    SHA1

                                    0d918696acac0ef00c1ab01436776a719e1d9cc9

                                    SHA256

                                    19b32918e10169223aec50a95d4ef9b0cc3d98e6077671b83608b4b2cc1f9cd8

                                    SHA512

                                    d16f117ffb0890c8a6f112012882133c670b82647b67e0937630fd6d09181dd5a2fb758774b91bba91e32c1dc9ca8304b218de514f9b88c6d2257dd64dcabaef

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    a2cd426739d4af8a2785f452e4343348

                                    SHA1

                                    e4dbbea6bbba8dc54da83d9740a593a44660ec98

                                    SHA256

                                    4c478ff591b53403dfdd132fcb21753fde085b0257e2b61a0d67d8e13433803a

                                    SHA512

                                    5786417d89c41f51ffe357f859363fb9bd846a0381d64b9032d38d9b64ba8002cdf04b2257529a2cd3d21f45f0cbab7751f84bb1ddc0901d71d0d52ceddcf9e4

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                    Filesize

                                    1KB

                                    MD5

                                    b611da4da48fb6dcd559c9e66a160322

                                    SHA1

                                    93a4175ef7bce46f14aa3c3b4d3f4f9564874146

                                    SHA256

                                    b89b9ed3c2e8bc4c41b66745b4c93bc3a85f2c96d63e13274fdf4f2f00957db4

                                    SHA512

                                    fadfe6ab894620f9bd17ac77c93a4fd4273e7d510304e9992f528854026d33c36889e3ec0431422a9047407ebd00666e0bc0afd54a6f8ed82f8f8e852eb3ccda

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                    Filesize

                                    1KB

                                    MD5

                                    a0dcd833513fd265dbf2b978083ab0b5

                                    SHA1

                                    393990b478dfb46adf4f95e31366a31baac9ca05

                                    SHA256

                                    4a40577ce47f8c8fe3121e9ac6dfdb57f7cb9c1863406ff5fe97f207dda647e4

                                    SHA512

                                    267fa21c495dfcaf01947d3ddd7f8e4ff7c333bc1f44f45cfc209b9edd0290e29221bdc87b10568cb5a0a7e8e1056b28ef3cb24d468ad41dc2539000b296d93d

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57f0b9.TMP

                                    Filesize

                                    1KB

                                    MD5

                                    b2908e07e82dd864f91a5db0c6867f60

                                    SHA1

                                    2d4d5b834ae34eb932f376bf2c9914e868c70603

                                    SHA256

                                    1b83c9f44a1152051a7db4b032168ac3340cf2cf2b212f15aba64e8559a66570

                                    SHA512

                                    fb05e72b4faa2168bc56d3a548016a04407a3b24b5bfeb9aa07efb918624d7c79ede1d33a7e7a6a8a2fda8c95ab37b645a05cf2f47f132ac97441cce174c2805

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    6752a1d65b201c13b62ea44016eb221f

                                    SHA1

                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                    SHA256

                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                    SHA512

                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    11KB

                                    MD5

                                    3f8b17c559281bf7fac7544a29965869

                                    SHA1

                                    b8eb5b5c67d77898c1c60c4bb8653b5f7bb7c43c

                                    SHA256

                                    2d9cc574d7e2ade39b005e02dfe3a68c9fd135df4c56eee797f1098c927a8485

                                    SHA512

                                    969cb79c504adf4af71f7905ad8c5c952884770f1c2408d214e420ca118ad0da7e93d73890776179e25f1788115ad1eac099caa4da5366b40a61fcf571ba894b

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    10KB

                                    MD5

                                    b1cd033a092f6c2abc57de79b0e12cb5

                                    SHA1

                                    a699c1836948bc2fd42846f7c635739618240aca

                                    SHA256

                                    82f48b2e36337a89b335b1c0072919d9891480cc6f5dd8f1d893b6faea71b266

                                    SHA512

                                    e14e74d93a3fe01afe8da149a910b190c586fe54edc3be298bbf2d3208f649b6880e947c7cb92ae6ffaa94cf408648136735cf3b4cad2593b69e2f75dc0c5fe0

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    10KB

                                    MD5

                                    9ab1e270fab4982dea77bc88559a0f85

                                    SHA1

                                    4ab1deec2a0e3ed7dcfcfd387943cd60523d1d27

                                    SHA256

                                    7dd0b7da58139d35e05547ac2800a9ff06ac698aa345f69588a26ce62c812c7f

                                    SHA512

                                    a9a4d169a3fc5f5bfe6254e27049d8ea617600bb0093d246c0e7f68b68e7a0eb3be9516aaf642b81d180826e4d1b108d7f3b15a2ab507fdb7d1231dd8026299d

                                  • C:\Users\Admin\Downloads\HawkEye.exe:Zone.Identifier

                                    Filesize

                                    55B

                                    MD5

                                    0f98a5550abe0fb880568b1480c96a1c

                                    SHA1

                                    d2ce9f7057b201d31f79f3aee2225d89f36be07d

                                    SHA256

                                    2dfb5f4b33e4cf8237b732c02b1f2b1192ffe4b83114bcf821f489bbf48c6aa1

                                    SHA512

                                    dbc1150d831950684ab37407defac0177b7583da0fe13ee8f8eeb65e8b05d23b357722246888189b4681b97507a4262ece96a1c458c4427a9a41d8ea8d11a2f6

                                  • C:\Users\Admin\Downloads\Unconfirmed 297615.crdownload

                                    Filesize

                                    232KB

                                    MD5

                                    60fabd1a2509b59831876d5e2aa71a6b

                                    SHA1

                                    8b91f3c4f721cb04cc4974fc91056f397ae78faa

                                    SHA256

                                    1dacdc296fd6ef6ba817b184cce9901901c47c01d849adfa4222bfabfed61838

                                    SHA512

                                    3e842a7d47b32942adb936cae13293eddf1a6b860abcfe7422d0fb73098264cc95656b5c6d9980fad1bf8b5c277cd846c26acaba1bef441582caf34eb1e5295a

                                  • memory/3944-218-0x0000000010000000-0x0000000010010000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3944-222-0x0000000005380000-0x000000000539A000-memory.dmp

                                    Filesize

                                    104KB