Analysis

  • max time kernel
    101s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/03/2025, 04:30

General

  • Target

    https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Spyware/HawkEye.exe

Malware Config

Signatures

  • Chimera 64 IoCs

    Ransomware which infects local and network files, often distributed via Dropbox links.

  • Chimera Ransomware Loader DLL 2 IoCs

    Drops/unpacks executable file which resembles Chimera's Loader.dll.

  • Chimera family
  • Renames multiple (3290) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Downloads MZ/PE file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 27 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Spyware/HawkEye.exe
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2604
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd8,0x104,0x7ffb6815dcf8,0x7ffb6815dd04,0x7ffb6815dd10
      2⤵
        PID:1388
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1964,i,4566313280520885534,17023911073015887973,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2412 /prefetch:3
        2⤵
        • Downloads MZ/PE file
        PID:5008
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2208,i,4566313280520885534,17023911073015887973,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2204 /prefetch:2
        2⤵
          PID:4892
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2220,i,4566313280520885534,17023911073015887973,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2700 /prefetch:8
          2⤵
            PID:4776
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3088,i,4566313280520885534,17023911073015887973,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3160 /prefetch:1
            2⤵
              PID:4896
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3096,i,4566313280520885534,17023911073015887973,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3180 /prefetch:1
              2⤵
                PID:5068
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4244,i,4566313280520885534,17023911073015887973,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4276 /prefetch:2
                2⤵
                  PID:4924
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5232,i,4566313280520885534,17023911073015887973,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5244 /prefetch:8
                  2⤵
                    PID:540
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5440,i,4566313280520885534,17023911073015887973,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5796 /prefetch:8
                    2⤵
                      PID:3068
                    • C:\Users\Admin\Downloads\HawkEye.exe
                      "C:\Users\Admin\Downloads\HawkEye.exe"
                      2⤵
                      • Chimera
                      • Executes dropped EXE
                      • Drops desktop.ini file(s)
                      • Drops file in Program Files directory
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2772
                      • C:\Program Files\Internet Explorer\iexplore.exe
                        "C:\Program Files\Internet Explorer\iexplore.exe" -k "C:\Users\Admin\Music\YOUR_FILES_ARE_ENCRYPTED.HTML"
                        3⤵
                        • Modifies Internet Explorer settings
                        • Suspicious use of SetWindowsHookEx
                        PID:1256
                        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1256 CREDAT:17410 /prefetch:2
                          4⤵
                          • System Location Discovery: System Language Discovery
                          • Modifies Internet Explorer settings
                          • Suspicious use of SetWindowsHookEx
                          PID:5652
                        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1256 CREDAT:17416 /prefetch:2
                          4⤵
                          • System Location Discovery: System Language Discovery
                          • Modifies Internet Explorer settings
                          • Suspicious use of SetWindowsHookEx
                          PID:3876
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5140,i,4566313280520885534,17023911073015887973,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5556 /prefetch:8
                      2⤵
                        PID:3972
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5780,i,4566313280520885534,17023911073015887973,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5772 /prefetch:8
                        2⤵
                          PID:1176
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5996,i,4566313280520885534,17023911073015887973,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6040 /prefetch:8
                          2⤵
                            PID:4024
                          • C:\Users\Admin\Downloads\HawkEye.exe
                            "C:\Users\Admin\Downloads\HawkEye.exe"
                            2⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4700
                        • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                          1⤵
                            PID:4912
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                            1⤵
                              PID:4120
                            • C:\Windows\system32\taskmgr.exe
                              "C:\Windows\system32\taskmgr.exe" /4
                              1⤵
                              • Checks SCSI registry key(s)
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of SendNotifyMessage
                              PID:3624

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Program Files\Java\jdk-1.8\jre\lib\YOUR_FILES_ARE_ENCRYPTED.HTML

                              Filesize

                              4KB

                              MD5

                              ffc936a0fd9a456fb3c8e8fe60d2f66b

                              SHA1

                              b948bf40d3624704e3881243cf1c4a5c907b5b1a

                              SHA256

                              7de80918d91bcbf96885f4a89bdcaf37588055a381774f001aedf6f4ea0a41f1

                              SHA512

                              e8c4015bddf401edbaf3418458636b2909195a39f3fbe31869830caabc3bb619cfbae88bbdc85c8af0bc41f2466c4e220fc19b6f5e5a2655e7996e88bb8a08af

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187

                              Filesize

                              471B

                              MD5

                              01fa3211165ca3e0dbd816e5389630bf

                              SHA1

                              2a6569707c8ea29cbf996a906855470bb7831f48

                              SHA256

                              ab165a9a5b25e6c05f6f2eac77c9dcc9b4157897524a0be4415cdae9cef5636f

                              SHA512

                              1848c476ebf00781299715f7c664465a071fa54e3bc14002df35a74aa27667788956bddc4b96b241ea2865f819cf5e33ed7907504a99342c2a0379a0964550ad

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187

                              Filesize

                              412B

                              MD5

                              32b3083e7e75f2e03c69906e3434907b

                              SHA1

                              1fd8e4e94cd5813fa0373070ce5c5171771396fc

                              SHA256

                              c2b299e4fa817c74772e1a43207d396f910c75497974545f419435f52abe6e84

                              SHA512

                              8a4ada905ae07f427913e1ca19472a39147a0e0f11a28272dfcba1aab0728f306e22ee9ec2af49cb0d1d5a93858d1fc47fe900fbc9110fc5b155059d89c4c688

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                              Filesize

                              649B

                              MD5

                              5873a109f2e97d3ded9ff7c5f557a11b

                              SHA1

                              e4ad3a7f51f3438f3b211355cb45c021b4737bf4

                              SHA256

                              a013a17184fd38c98caf3bfb6e98caf0160ab6f100e922bb87efda33196ecd0c

                              SHA512

                              a989341bfd4c0de95623db144d88499c1f41ba9537424adb416a0cfe38a9cbb7131c75396e6eeea695cd0e67bb8df182b71c4d4d2bdeac603c64e0940f6713a8

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                              Filesize

                              1KB

                              MD5

                              ca2fdde67b00f528324b660a8032e9ba

                              SHA1

                              10203572d06a46d7e4e4e3a2ae36c9429fc1b1bc

                              SHA256

                              e7f402930966c23617d391de547e6adb09d16d768164ca1db0fce499f8fa929f

                              SHA512

                              2ab4fdf49cad179cda734643920d9d58ae32b52da9d30b1302acd5c8d9d0a1d2300a832aca86922b5ea94598891251ec674ac3a697ce05d1aa7aee582bee8aca

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              3KB

                              MD5

                              46ef85ad16227a44bac09eeb5ce79ec2

                              SHA1

                              faf564c73ce700358450428ec9cd4f6c11229094

                              SHA256

                              46052c27db2661b5629d0a5bfc9fd80e1da8853c8b0caff14b908a8bbce4d0a5

                              SHA512

                              edc280ca0607db5ecae26cbf08bdb7182386899defa0489cc63fa36a8f40766ad7acceecb1f6aa71143b0c273849eb92086aa9a74465563e52482f315dc3025e

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                              Filesize

                              2B

                              MD5

                              d751713988987e9331980363e24189ce

                              SHA1

                              97d170e1550eee4afc0af065b78cda302a97674c

                              SHA256

                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                              SHA512

                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              11KB

                              MD5

                              aa87e928b3df5c1bfbf0c5461cbb5825

                              SHA1

                              4d5449bc285f62a0059db2cf12a1de360749e19f

                              SHA256

                              5486622591c02dd696f6766c7b5393e3e16ea7892ab13c47a58b65097a747871

                              SHA512

                              2d3b27261e34015443c6f97b290e0e181610d3df72852f419817862f6a93c987a99a7d655fe3db0d71d7f8ae7b68abef4cffb13d224923f574629936822b483d

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              11KB

                              MD5

                              9d4dcc7cb4f6e1d2d419a620546dd1d5

                              SHA1

                              696eac2c9c8dc2a269ebdf1a9562d570ad991554

                              SHA256

                              5faeb0d89d8c08dd37c0e0b181eacad82fff01ebcd7b38d820b1ddcc00715e24

                              SHA512

                              7264b27156a8bb11223f8f8d1a712f81530e8a7453113cd800d3a13f7672a730465bee23f296081c1e9780f0ba1fcd4c38b2d1380152dd6ea290a970b15885be

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                              Filesize

                              11KB

                              MD5

                              e2230011af63ff53be77c47a7d82570f

                              SHA1

                              7470be444f04e659c9f90e31875c442230a539f4

                              SHA256

                              f8668832fe212dd245e632af3f8a3ab284ab17d29a0a4a9dd05779df81b9b3fe

                              SHA512

                              bdaa6e272c43374c075c31568626913e65b72380031d0410cde3102d23545ed451fbebdeacfb493dbbbb6eca69b8f90cb2ae7b10ad4e9ba0da97638f0a21a183

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                              Filesize

                              15KB

                              MD5

                              479bdb9e053135eba15da92973663bc8

                              SHA1

                              04445d497687d5f8af0490206114184230bebcd9

                              SHA256

                              260e6af3ae7ea680290e6459f4535b9e5e046330c8b7b739730a45b014f5ba47

                              SHA512

                              399cd2bef7fae6f9534462d0f5a0a254c85ecaa373633ec0aecedf5a0305a1582544961102be698ec97c59d998786b1114b69b199570305d38c944db3370d8d3

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                              Filesize

                              72B

                              MD5

                              a4c163769bda269dc51613f0a260f247

                              SHA1

                              4640b0304b945b4fecdc33fcb67d32d93874901b

                              SHA256

                              8c574747fb4c0fe7ef69ab40ba9a3e3c93036484651fb3ec840c5fc1d045b8e0

                              SHA512

                              4006f627051e0fe274c4b950ed2ac40f16f51f40a8e96307a0793fe83fc5e137fba727e725ef3f8eea4fe44e80679edf7e71cc6b07da5e6da93f9b2b1947b6cb

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57cc49.TMP

                              Filesize

                              48B

                              MD5

                              865294917847eb71d50dbc1c073900e7

                              SHA1

                              1ede1257132207ae6b22977c5522c1711a1728a7

                              SHA256

                              501c2fa1f29c40864b9383f3574e07f4d973845393b5706ecba1bc4489bf388e

                              SHA512

                              e7b92596878905aea9be80c376008abc04113229388439d072d8c757b1e8fde9fbf264df1aef161a40bc3c15275606a518cf04e2e5f051966981395d2f787d19

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              80KB

                              MD5

                              3267857fb88e08886e173afae327566c

                              SHA1

                              93ac93e399dc228f533c4f58f565ccef7031c460

                              SHA256

                              f7cb2a40807ac73828f1fa4e42116ded40f1f0326411a35cbdc7a5783ba143f4

                              SHA512

                              354263ce74771568307ddc32027047c37d269f1d00603aef7ea941ccd2bdcf42fa1543de53489776290500ecdbc235cb8a380f07a09628f705b39bffc58a03e6

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              81KB

                              MD5

                              e24c1f75d4d55cc28f92e6db285f76b0

                              SHA1

                              cf14ba085052855e8eee3b21fd0a3db15b73b5b8

                              SHA256

                              1b761f232b84d0a65559ae3aa97eaf43d74a61b8e8e2c3a88a09507d089a3bc0

                              SHA512

                              33f0e33c2bf67a554d03a4450f2a24744feb9523122c9200957c88d893d5b78d3d58932f2b023ac18d3b0d663b7d6e497780d39782472bc58cdcfd67cee4ec26

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                              Filesize

                              81KB

                              MD5

                              3c09b0f2bd51e8c462df5116bb63ba9f

                              SHA1

                              a4b1371f4c500a88b3788a9a0f5a1dfb63b523cb

                              SHA256

                              4f164871046c7717b8458dd9a14b672ef74fb3cf0ab88d9cfc95b32d5a32abd6

                              SHA512

                              b0ca31b5f90d421128776ac8b01724ffe5b5863ee005d3426d7b6b74c01d3cd1cf2b8557954969a41b08ea1c274e65288fb45c9b136fb85d8e5b88992659861e

                            • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\2ssspo4\imagestore.dat

                              Filesize

                              6KB

                              MD5

                              d389ec7e2e77ec2100a5f9ca913f5bcf

                              SHA1

                              298cbedb5bbfc96a35287a4426e17a2e40179047

                              SHA256

                              aadc7a156309d65520d9698fcac219a11648f3122408f7f5fdcf48c3150bf15e

                              SHA512

                              e0ea28722592d97b19c2b7d6305827df0ad869ab8783e2ec8942e3b7513f34de5802872be9cfe0946e53dd1a84a98051617b531bcfc280b68c24666a3e3a9cfa

                            • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\2ssspo4\imagestore.dat

                              Filesize

                              7KB

                              MD5

                              5692265e8f07a01b4ce6fcfacd5f3d7e

                              SHA1

                              418d9dd4daa049dd195cc79df700d7825b9e81b2

                              SHA256

                              fa733d4c7eb5601d0f1751f1d5d1792cc17db1e4258201705a29ad6b07ec327b

                              SHA512

                              104d104a3a52d0b73cfba929fae0ef72943d1e7e597105c68385d4e6d966abfe03a23bb084276872d85efa604483050e8fba89edea4a4c07e63b317926914eff

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\9W6G8CB5\favicon-16x16[1].png

                              Filesize

                              695B

                              MD5

                              7fc6324199de70f7cb355c77347f0e1a

                              SHA1

                              d94d173f3f5140c1754c16ac29361ac1968ba8e2

                              SHA256

                              97d4556f7e8364fb3e0f0ccf58ab6614af002dfca4fe241095cf645a71df0949

                              SHA512

                              09f44601fa449b1608eb3d338b68ea9fd5540f66ea4f3f21534e9a757355a6133ae8fb9b4544f943ca5c504e45a3431bf3f3d24de2302d0439d8a13a0f2d544f

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\9W6G8CB5\favicon[2].ico

                              Filesize

                              6KB

                              MD5

                              72f13fa5f987ea923a68a818d38fb540

                              SHA1

                              f014620d35787fcfdef193c20bb383f5655b9e1e

                              SHA256

                              37127c1a29c164cdaa75ec72ae685094c2468fe0577f743cb1f307d23dd35ec1

                              SHA512

                              b66af0b6b95560c20584ed033547235d5188981a092131a7c1749926ba1ac208266193bd7fa8a3403a39eee23fcdd53580e9533803d7f52df5fb01d508e292b3

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\HB1UXX3T\main.min[1].css

                              Filesize

                              123KB

                              MD5

                              5a6235e9efdf530d26452309f531d199

                              SHA1

                              e0580ec1dc054b16741e943282ca6379a382766d

                              SHA256

                              c94cd8d9d175bc4df56bdc51704955bab3639e72b05017cd23bc21f7d5e3cdf6

                              SHA512

                              898d7d123bccaefcb86e9efbfd98a7961ab3f93b0827812a5263289e021ead7af72674542148f4c7b84f421a612313f5dd25383b5ded6009843f37506e829c36

                            • C:\Users\Admin\Downloads\HawkEye.exe

                              Filesize

                              232KB

                              MD5

                              60fabd1a2509b59831876d5e2aa71a6b

                              SHA1

                              8b91f3c4f721cb04cc4974fc91056f397ae78faa

                              SHA256

                              1dacdc296fd6ef6ba817b184cce9901901c47c01d849adfa4222bfabfed61838

                              SHA512

                              3e842a7d47b32942adb936cae13293eddf1a6b860abcfe7422d0fb73098264cc95656b5c6d9980fad1bf8b5c277cd846c26acaba1bef441582caf34eb1e5295a

                            • memory/2772-346-0x0000000010000000-0x0000000010010000-memory.dmp

                              Filesize

                              64KB

                            • memory/2772-1011-0x0000000074692000-0x0000000074693000-memory.dmp

                              Filesize

                              4KB

                            • memory/2772-1012-0x0000000074690000-0x0000000074C41000-memory.dmp

                              Filesize

                              5.7MB

                            • memory/2772-343-0x0000000074692000-0x0000000074693000-memory.dmp

                              Filesize

                              4KB

                            • memory/2772-344-0x0000000074690000-0x0000000074C41000-memory.dmp

                              Filesize

                              5.7MB

                            • memory/2772-345-0x0000000074690000-0x0000000074C41000-memory.dmp

                              Filesize

                              5.7MB

                            • memory/2772-352-0x0000000004E50000-0x0000000004E6A000-memory.dmp

                              Filesize

                              104KB

                            • memory/2772-351-0x0000000074690000-0x0000000074C41000-memory.dmp

                              Filesize

                              5.7MB

                            • memory/3624-2490-0x0000018DEA390000-0x0000018DEA391000-memory.dmp

                              Filesize

                              4KB

                            • memory/3624-2489-0x0000018DEA390000-0x0000018DEA391000-memory.dmp

                              Filesize

                              4KB

                            • memory/3624-2484-0x0000018DEA390000-0x0000018DEA391000-memory.dmp

                              Filesize

                              4KB

                            • memory/3624-2488-0x0000018DEA390000-0x0000018DEA391000-memory.dmp

                              Filesize

                              4KB

                            • memory/3624-2487-0x0000018DEA390000-0x0000018DEA391000-memory.dmp

                              Filesize

                              4KB

                            • memory/3624-2486-0x0000018DEA390000-0x0000018DEA391000-memory.dmp

                              Filesize

                              4KB

                            • memory/3624-2485-0x0000018DEA390000-0x0000018DEA391000-memory.dmp

                              Filesize

                              4KB

                            • memory/3624-2466-0x0000018DEA390000-0x0000018DEA391000-memory.dmp

                              Filesize

                              4KB

                            • memory/3624-2467-0x0000018DEA390000-0x0000018DEA391000-memory.dmp

                              Filesize

                              4KB

                            • memory/3624-2468-0x0000018DEA390000-0x0000018DEA391000-memory.dmp

                              Filesize

                              4KB

                            • memory/4700-1422-0x0000000074690000-0x0000000074C41000-memory.dmp

                              Filesize

                              5.7MB

                            • memory/4700-1022-0x0000000074690000-0x0000000074C41000-memory.dmp

                              Filesize

                              5.7MB

                            • memory/4700-1023-0x0000000074690000-0x0000000074C41000-memory.dmp

                              Filesize

                              5.7MB

                            • memory/4700-1015-0x0000000074690000-0x0000000074C41000-memory.dmp

                              Filesize

                              5.7MB

                            • memory/4700-1014-0x0000000074690000-0x0000000074C41000-memory.dmp

                              Filesize

                              5.7MB