Analysis

  • max time kernel
    77s
  • max time network
    83s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    01/02/2025, 20:19

General

  • Target

    https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Spyware/HawkEye.exe

Malware Config

Signatures

  • Chimera 64 IoCs

    Ransomware which infects local and network files, often distributed via Dropbox links.

  • Chimera Ransomware Loader DLL 1 IoCs

    Drops/unpacks executable file which resembles Chimera's Loader.dll.

  • Chimera family
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Renames multiple (3245) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Downloads MZ/PE file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 26 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 64 IoCs
  • Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs

    When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 44 IoCs
  • Suspicious use of SendNotifyMessage 16 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Spyware/HawkEye.exe
    1⤵
    • Chimera
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4160
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff963ff3cb8,0x7ff963ff3cc8,0x7ff963ff3cd8
      2⤵
        PID:2684
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1884,9428534619895497574,12959728318409881209,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1912 /prefetch:2
        2⤵
          PID:3932
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1884,9428534619895497574,12959728318409881209,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2028 /prefetch:3
          2⤵
          • Downloads MZ/PE file
          • Suspicious behavior: EnumeratesProcesses
          PID:4680
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1884,9428534619895497574,12959728318409881209,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:8
          2⤵
            PID:3132
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,9428534619895497574,12959728318409881209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:1
            2⤵
              PID:3032
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,9428534619895497574,12959728318409881209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:1
              2⤵
                PID:768
              • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1884,9428534619895497574,12959728318409881209,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:8
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:3020
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1884,9428534619895497574,12959728318409881209,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:8
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:2272
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,9428534619895497574,12959728318409881209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:1
                2⤵
                  PID:3196
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1884,9428534619895497574,12959728318409881209,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5888 /prefetch:8
                  2⤵
                    PID:3264
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1884,9428534619895497574,12959728318409881209,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5668 /prefetch:8
                    2⤵
                    • Subvert Trust Controls: Mark-of-the-Web Bypass
                    • NTFS ADS
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2696
                  • C:\Users\Admin\Downloads\HawkEye.exe
                    "C:\Users\Admin\Downloads\HawkEye.exe"
                    2⤵
                    • Chimera
                    • Executes dropped EXE
                    • Drops desktop.ini file(s)
                    • Drops file in Program Files directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4208
                    • C:\Program Files\Internet Explorer\iexplore.exe
                      "C:\Program Files\Internet Explorer\iexplore.exe" -k "C:\Users\Admin\Downloads\YOUR_FILES_ARE_ENCRYPTED.HTML"
                      3⤵
                      • Modifies Internet Explorer settings
                      PID:4488
                  • C:\Users\Admin\Downloads\HawkEye.exe
                    "C:\Users\Admin\Downloads\HawkEye.exe"
                    2⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4844
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,9428534619895497574,12959728318409881209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4084 /prefetch:1
                    2⤵
                      PID:1848
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,9428534619895497574,12959728318409881209,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:1
                      2⤵
                        PID:2316
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,9428534619895497574,12959728318409881209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:1
                        2⤵
                          PID:4052
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,9428534619895497574,12959728318409881209,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:1
                          2⤵
                            PID:4448
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,9428534619895497574,12959728318409881209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2996 /prefetch:1
                            2⤵
                              PID:3196
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,9428534619895497574,12959728318409881209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2744 /prefetch:1
                              2⤵
                                PID:1880
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1884,9428534619895497574,12959728318409881209,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5748 /prefetch:8
                                2⤵
                                  PID:2744
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,9428534619895497574,12959728318409881209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6704 /prefetch:1
                                  2⤵
                                    PID:4768
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:4832
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:2968
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\YOUR_FILES_ARE_ENCRYPTED.HTML
                                      1⤵
                                        PID:1608
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff963ff3cb8,0x7ff963ff3cc8,0x7ff963ff3cd8
                                          2⤵
                                            PID:3240
                                        • C:\Windows\system32\AUDIODG.EXE
                                          C:\Windows\system32\AUDIODG.EXE 0x00000000000004D4 0x00000000000004E8
                                          1⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2628
                                        • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
                                          "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n /f "C:\Users\Admin\Desktop\LimitOut.dot"
                                          1⤵
                                            PID:1652
                                            • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeC2RClient.exe
                                              OfficeC2RClient.exe /error PID=1652 ProcessName="Microsoft Word" UIType=3 ErrorSource=0x8b10082a ErrorCode=0x80004005 ShowUI=1
                                              2⤵
                                              • Process spawned unexpected child process
                                              • Suspicious use of SetWindowsHookEx
                                              PID:1048
                                          • C:\Windows\System32\rundll32.exe
                                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                            1⤵
                                              PID:3264

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Program Files\Java\jdk-1.8\jre\lib\YOUR_FILES_ARE_ENCRYPTED.HTML

                                              Filesize

                                              4KB

                                              MD5

                                              6ea8685280a6e8e85e152bef27402965

                                              SHA1

                                              36395132302f34f2f1bb82b85dd0a851c05f252b

                                              SHA256

                                              d84371725bdc62c4dd0d59300de5224ff67f94878e1350437c5bfe24d94c5bb8

                                              SHA512

                                              55aea338ec0530e5368097b19c6074956bfcf8ed8fbcff8f9e341b4eec9677a500660b0c24229baf46ae420904997a82c0b7529050df49b14a76dff711be8f90

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              e9a2c784e6d797d91d4b8612e14d51bd

                                              SHA1

                                              25e2b07c396ee82e4404af09424f747fc05f04c2

                                              SHA256

                                              18ddbb93c981d8006071f9d26924ce3357cad212cbb65f48812d4a474c197ce6

                                              SHA512

                                              fc35688ae3cd448ed6b2069d39ce1219612c54f5bb0dd7b707c9e6f39450fe9fb1338cf5bd0b82a45207fac2fbab1e0eae77e5c9e6488371390eab45f76a5df1

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              1fc959921446fa3ab5813f75ca4d0235

                                              SHA1

                                              0aeef3ba7ba2aa1f725fca09432d384b06995e2a

                                              SHA256

                                              1b1e89d3b2f3da84cc8494d07cf0babc472c426ccb1c4ae13398243360c9d02c

                                              SHA512

                                              899d1e1b0feece25ac97527daddcaaeb069cb428532477849eba43a627502c590261f2c26fef31e4e20efd3d7eb0815336a784c4d2888e05afcf5477af872b06

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                              Filesize

                                              1KB

                                              MD5

                                              0e7c79f57acf10674561b7c0990867cd

                                              SHA1

                                              b4d7b4e1ecc43436bd4c8167b410ee7e446a2510

                                              SHA256

                                              cc015b81e33f842a607f5adc70bbffff2594ab213ee1a0e094cd72666620d34d

                                              SHA512

                                              9b5efb9afe6d2c88fe1c6927e24be65a61327d49eb59ec57aa3d4a584ca4b004b3e5349d8e1818f028c6f2595404e8dce72bc9299477eef5db8ab2731a02cb62

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                              Filesize

                                              1KB

                                              MD5

                                              02d26f71f10ff5e3ac7239a3b70386fc

                                              SHA1

                                              105ecb8d68944a623efd83124f10638ef7563246

                                              SHA256

                                              e7b1e460776884158619944eda7b8edb9ee4daa7127839a4819ad9fca479573c

                                              SHA512

                                              993745d561c7e3011e20bc88a58905682d0cf3f4ced6868994d0bca94de9e811a7ba95ea33e39bd010bb3db07fae6c4d749f8ed09096788148dde8dc34f57400

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                              Filesize

                                              869B

                                              MD5

                                              5da4fc0df92a837df03bc3781d2f5326

                                              SHA1

                                              a24aa826130eeaa683d40f66841777ad3661d25c

                                              SHA256

                                              642de95091407a71877ee7b774481018e00c28a4751b38c46b16e5b8e72a0edc

                                              SHA512

                                              d0807fa43e3873150493d4cd86eaae73e49f2ac23488b34380e64d197f16eb21d57dd46c10afa2d6433b1e625eb5381e23e5ae20cf484fc5a4ad1c4c01001938

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                              Filesize

                                              111B

                                              MD5

                                              807419ca9a4734feaf8d8563a003b048

                                              SHA1

                                              a723c7d60a65886ffa068711f1e900ccc85922a6

                                              SHA256

                                              aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631

                                              SHA512

                                              f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              6KB

                                              MD5

                                              77916306fb793b976cc6f9bb2e2d6135

                                              SHA1

                                              47129ee2e6dd0076d86e9c42ce0a86bf771055b3

                                              SHA256

                                              31e2566686f15b5a812cfcac65b8035b72cbc0e4ff5dcb1e742256932d9fd3a2

                                              SHA512

                                              42187577067658a2c94bd651485ef7cb8c2df43cb14ebf53e711216794616146708724c3f15a12fb30a6db5d4fb20cc24c1bd9244affa99a1ad3a2d18eb0e3e6

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              5KB

                                              MD5

                                              89738f27d0e63133f44dd563a22d1686

                                              SHA1

                                              d260825070bf4f6ddf2e4186f7f9116d0a153b6a

                                              SHA256

                                              7f9630ceb57a546d630eb5b5dfefec1522d51e939a7dc7b73c77c1d700131764

                                              SHA512

                                              ee46d723fc353fe8a86f0b7d694c6b5ca7f1a15904e24885c4d4334cde16101e8f6ddf69c283db462c154d8978ae00232a174d6ed921ed7ae10236646644453f

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              6KB

                                              MD5

                                              fe83cc39f8cfd5af45fdc10b740429c6

                                              SHA1

                                              465f445a2c1097cfbe989ba5e59eec0322cd3855

                                              SHA256

                                              1c8dfb8b3f0bfbd8edc08ac1f71140994652a4e8fc751a3999d4ad3b5386c76b

                                              SHA512

                                              924374e75477efcb1b2337fd8b36e587c5bf25779a4f391d9a99ab48673ad35181aaf6e77c073e0398e32cdd6b8339ef7523acd4b0e128f4520c2bd63c3744a2

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              6KB

                                              MD5

                                              da8c4730ebc3a46980ccaa96e4c3f1ad

                                              SHA1

                                              c514acaec0c575cd777ffc1a41285897101682e4

                                              SHA256

                                              862b9bb100d41d57544b8250dd68165169b7957b03ed0543cd1763047cd12338

                                              SHA512

                                              f5f43c347e0f8657caef5e75f98dd21dedae878dc0343c37726502f347ed71f0f944e02fde5a3d36d23884fe36ac4917d515677f1d6814dd031012fa2c822ead

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              6KB

                                              MD5

                                              db0d34981dc7c8c6484a61480521851c

                                              SHA1

                                              05443d487d44b9a93dfdc8725c045967b0b76884

                                              SHA256

                                              4ab640b5765c91813d6c2f0131c5eddd0ee6116c313fb79d11788bb749412fca

                                              SHA512

                                              8466f4bca66f099d8d0316db26c99d824e1040a6c1f007b303c3e667f4c9695a8b1c94572d53bc603426b867faa89ed1f2f518b6dcf71607db96b96274f2d38d

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001

                                              Filesize

                                              41B

                                              MD5

                                              5af87dfd673ba2115e2fcf5cfdb727ab

                                              SHA1

                                              d5b5bbf396dc291274584ef71f444f420b6056f1

                                              SHA256

                                              f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                              SHA512

                                              de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                              Filesize

                                              72B

                                              MD5

                                              64cbe73bc01c37b1f2de160c5238f633

                                              SHA1

                                              27c5c05104c57917840db4e4c4a694f9d51e755f

                                              SHA256

                                              de60e76fab3cd383868969ab0dbd52255bf0ea81e3a416dc7449e1fc340c704c

                                              SHA512

                                              1dbbfc7f201ac39ce3d0078193d26e3badde887d1c4473668d608f0e5f4d8ea859570843e54e5785a99773b6f7a1a4cf675e8301093bd41ad7618403dccd091c

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe587ed0.TMP

                                              Filesize

                                              48B

                                              MD5

                                              225d2ac210b9e4420390bc07b5fe2d00

                                              SHA1

                                              30978d867952a6689b4b56e3f8407b91bf5a7e38

                                              SHA256

                                              9895700abf42439e34907f2d985fbb062a1be5866b636ff9c7c30b8f20038e56

                                              SHA512

                                              af2504d2dbaae2631dd0a08f19be991f15f698a61b2bc929973b5724120911cf784891a632d0094b5eb6a00799edcb91a497fd73b093c3559a8fb1e6ca5e3a20

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                              Filesize

                                              1KB

                                              MD5

                                              291aa3ecda795bdff4112a35c31fa88b

                                              SHA1

                                              a938d6c8333bd2259034cc14eba53064cd4be2f5

                                              SHA256

                                              3df715824e4b5e3e17a6b97e1bd14f8c5f4b551fd31558863c938290c9bdda2c

                                              SHA512

                                              c8ce03473abd5c8d90125b879d0b1a4e7e0a140343b1767c232ce4dedbfec9a59cab74508fbbbb2c9cdbaa8d3d8e39d7948cae56824b0e6f4186985df6438344

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                              Filesize

                                              1KB

                                              MD5

                                              78bfe67c48a56b12cb68a356f09b58ec

                                              SHA1

                                              2487b6dd58cdefad0fcc892e98c44a30cd12dda8

                                              SHA256

                                              344a7b220462b169d82556f020031347436fadff9a553ed2cad0cd8f93d3df7c

                                              SHA512

                                              24b4bc813dac7d2d0ea71cceeeacb6ed59f520230f12da02d8fbfda113c93c75f3beb16dd3ab50b961d83a97d4f22167806fba48cbc143eedb8365e4d7ab1062

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                              Filesize

                                              1KB

                                              MD5

                                              87a36ec834fce85c174724de3a2546a8

                                              SHA1

                                              6e99fbe90b31988a880904499ad5ab388a2b00f4

                                              SHA256

                                              5881d44702ce801d850eb3055e2b9c0df46ec7a7f46183a3a0b34cace0272102

                                              SHA512

                                              2e886141c78eed3902ad7dfd58e3f402beaad7d6dfbe4db3a628e41537b60f478bbaa4e9f2e260a549738e73c0e566ddd95ec5c085b80e06f18109c7155fe257

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57e927.TMP

                                              Filesize

                                              1KB

                                              MD5

                                              a579235e4e58c02290435d0602d61f8e

                                              SHA1

                                              eff95776e07a098a10c5d40fdab639ee81b81c51

                                              SHA256

                                              9e2b6e71d77c87ca8dd42435145564ba22d8fdfdb2213387e98520a53929234d

                                              SHA512

                                              7ad203961f5272e35e8ab8ed3a9c50e90df12c3872b195a30698f931660d347eee85ff2090838769a8e80bc09aabab764bc7d27631ac5f214859e8aeea2430d1

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                              Filesize

                                              16B

                                              MD5

                                              46295cac801e5d4857d09837238a6394

                                              SHA1

                                              44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                              SHA256

                                              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                              SHA512

                                              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                              Filesize

                                              16B

                                              MD5

                                              206702161f94c5cd39fadd03f4014d98

                                              SHA1

                                              bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                              SHA256

                                              1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                              SHA512

                                              0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              11KB

                                              MD5

                                              744d910edd773aed0f7e89803a8ec182

                                              SHA1

                                              1d1e95d7bd4cff4d357c7c31972bae495f8bfaf8

                                              SHA256

                                              99449c20455bfe9fca855b1a136064a24640befba80b220a79535b8536489e20

                                              SHA512

                                              7d8ad415927e6741cb94ed88c227f020e47d10d5248d57da673e24716df99b111364a9d2b7885ef44c6aeacd9f49e6109642cd9278a59f4a1833c3ec16db1414

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              10KB

                                              MD5

                                              714e531eef2e506cbda4fec919e5e762

                                              SHA1

                                              64eb90160b2113e2669fe4c0e3ecda35d42dc96f

                                              SHA256

                                              81a48d50472bfc000f28afc45fb1257550d74de232f1fbfdf22120079dc5f265

                                              SHA512

                                              79fa534f898f9d5644446a5488c7fdcf8fdcc4fdf12d4297f1ead82739bf58300447df3b82deb93864fe88217a375815bae4799b4ee39f0d2bf57ef7a0e10796

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              10KB

                                              MD5

                                              7df000ba4784c04fd57c7353031fd031

                                              SHA1

                                              4c467e0f454bd06f8e03fb485c82f9d616f40de0

                                              SHA256

                                              5c4061376bc72c3474cb4e95f0a3a878366977320bef86987a74fd823559b67f

                                              SHA512

                                              26bd9cfccf9363c2b98458795d7d5da5ee31dec471fe271ff0aad55d16546179cb8c1e6724f32180a85eff0cb86e38df809df727b5b529051b24766ebcdee27a

                                            • C:\Users\Admin\Downloads\HawkEye.exe:Zone.Identifier

                                              Filesize

                                              55B

                                              MD5

                                              0f98a5550abe0fb880568b1480c96a1c

                                              SHA1

                                              d2ce9f7057b201d31f79f3aee2225d89f36be07d

                                              SHA256

                                              2dfb5f4b33e4cf8237b732c02b1f2b1192ffe4b83114bcf821f489bbf48c6aa1

                                              SHA512

                                              dbc1150d831950684ab37407defac0177b7583da0fe13ee8f8eeb65e8b05d23b357722246888189b4681b97507a4262ece96a1c458c4427a9a41d8ea8d11a2f6

                                            • C:\Users\Admin\Downloads\Unconfirmed 739873.crdownload

                                              Filesize

                                              232KB

                                              MD5

                                              60fabd1a2509b59831876d5e2aa71a6b

                                              SHA1

                                              8b91f3c4f721cb04cc4974fc91056f397ae78faa

                                              SHA256

                                              1dacdc296fd6ef6ba817b184cce9901901c47c01d849adfa4222bfabfed61838

                                              SHA512

                                              3e842a7d47b32942adb936cae13293eddf1a6b860abcfe7422d0fb73098264cc95656b5c6d9980fad1bf8b5c277cd846c26acaba1bef441582caf34eb1e5295a

                                            • memory/4208-202-0x0000000004930000-0x000000000494A000-memory.dmp

                                              Filesize

                                              104KB

                                            • memory/4208-194-0x0000000010000000-0x0000000010010000-memory.dmp

                                              Filesize

                                              64KB